#VU29311 Improper access control in ENTTEC products - CVE-2019-12775
Published: June 26, 2020
Datagate Mk2
Storm 24
Pixelator
E-Streamer Mk2
ENTTEC
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to the affected products enable high privileged root access via sudo capability without requiring appropriate access control. A remote authenticated attacker can bypass implemented security restrictions and gain unauthorized access to the application.