In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique
References
Link | Resource |
---|---|
https://attack.mitre.org/techniques/T1444/ | Third Party Advisory |
https://documentation.mersive.com/content/pages/release-notes.htm | Release Notes Vendor Advisory |
https://github.com/aress31/solstice-pod-cves | Third Party Advisory |
https://www.mersive.com/uk/products/solstice/ | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2020-12-23 16:15
Updated : 2024-07-03 01:36
NVD link : CVE-2020-35587
Mitre link : CVE-2020-35587
CVE.ORG link : CVE-2020-35587
JSON object : View
Products Affected
mersive
- solstice
- solstice_firmware
CWE