CVE-2020-25860
MEDIUMrauc < 1.5 - Time-of-check Time-of-use Race Condition in install.c
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2020-25860. PoCs published by rauc.
AI-analyzed exploit summary This repository provides integration examples and patches for RAUC 1.5, addressing CVE-2020-25860. It includes instructions for OpenEmbedded/Yocto, PTXdist, and Buildroot, along with patches for OpenSSL and kernel compatibility.
Description
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
Exploits (1)
This repository provides integration examples and patches for RAUC 1.5, addressing CVE-2020-25860. It includes instructions for OpenEmbedded/Yocto, PTXdist, and Buildroot, along with patches for OpenSSL and kernel compatibility.
References (2)
Scores
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H