Mycroft AI mycroft-core version 18.2.8b and earlier contains a Incorrect Access Control vulnerability in Websocket configuration that can result in code execution. This impacts ONLY the Mycroft for Linux and "non-enclosure" installs - Mark 1 and Picroft unaffected. This attack appear to be exploitable remote access to the unsecured websocket server. This vulnerability appears to have been fixed in No fix currently available.
References
Link | Resource |
---|---|
https://community.mycroft.ai/t/zero-click-remote-code-execution-in-mycroft-ai-vocal-assistant/3930/13 | Vendor Advisory |
https://github.com/Nhoya/MycroftAI-RCE | Exploit Third Party Advisory |
https://community.mycroft.ai/t/zero-click-remote-code-execution-in-mycroft-ai-vocal-assistant/3930/13 | Vendor Advisory |
https://github.com/Nhoya/MycroftAI-RCE | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.mycroft.ai/t/zero-click-remote-code-execution-in-mycroft-ai-vocal-assistant/3930/13 - Vendor Advisory | |
References | () https://github.com/Nhoya/MycroftAI-RCE - Exploit, Third Party Advisory |
Information
Published : 2018-07-09 20:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000621
Mitre link : CVE-2018-1000621
CVE.ORG link : CVE-2018-1000621
JSON object : View
Products Affected
linux
- linux_kernel
mycroft
- mycroft-core
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource