A restricted environment escape vulnerability exists in the “kiosk mode” function of Capsule Technologies SmartLinx Neuron 2 medical information collection devices running versions 9.0.3 or lower. A specific series of keyboard inputs can escape the restricted environment, resulting in full administrator access to the underlying operating system. An attacker can connect to the device via USB port with a keyboard or other HID device to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 | Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785 - Third Party Advisory |
26 Apr 2022, 20:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:capsuletech:smartlinx_neuron_2_firmware:*:*:*:*:*:*:*:* |
19 Apr 2022, 18:16
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
Information
Published : 2019-04-11 18:29
Updated : 2024-11-21 04:44
NVD link : CVE-2019-5024
Mitre link : CVE-2019-5024
CVE.ORG link : CVE-2019-5024
JSON object : View
Products Affected
capsuletech
- smartlinx_neuron_2_firmware
- smartlinx_neuron_2
CWE