CVE-2019-5024

A restricted environment escape vulnerability exists in the “kiosk mode” function of Capsule Technologies SmartLinx Neuron 2 medical information collection devices running versions 9.0.3 or lower. A specific series of keyboard inputs can escape the restricted environment, resulting in full administrator access to the underlying operating system. An attacker can connect to the device via USB port with a keyboard or other HID device to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:capsuletech:smartlinx_neuron_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:capsuletech:smartlinx_neuron_2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:44

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 - Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 - Third Party Advisory

26 Apr 2022, 20:27

Type Values Removed Values Added
CPE cpe:2.3:o:capsuletech:smartlinx_neuron_2_firmware:6.9.1:*:*:*:*:*:*:* cpe:2.3:o:capsuletech:smartlinx_neuron_2_firmware:*:*:*:*:*:*:*:*

19 Apr 2022, 18:16

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo

Information

Published : 2019-04-11 18:29

Updated : 2024-11-21 04:44


NVD link : CVE-2019-5024

Mitre link : CVE-2019-5024

CVE.ORG link : CVE-2019-5024


JSON object : View

Products Affected

capsuletech

  • smartlinx_neuron_2_firmware
  • smartlinx_neuron_2
CWE
CWE-693

Protection Mechanism Failure

NVD-CWE-noinfo