#VU29312 Permissions, Privileges, and Access Controls in ENTTEC products - CVE-2019-12777
Published: June 26, 2020
Datagate Mk2
Storm 24
Pixelator
E-Streamer Mk2
ENTTEC
Description
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to the system replaces permissions by the underlying operating system with highly insecure read, write, and execute directory permissions for all users. A remote authenticated attacker can gain elevated privileges on the target system.