#VU54141 Security features bypass in Bike+


Published: 2021-06-16

Vulnerability identifier: #VU54141

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-254

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Bike+
Hardware solutions / Other hardware appliances

Vendor: Peloton

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the security features bypass. An attacker with physical access can use a USB key to upload a fake boot image file and gain control of bikes. 

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Bike+: All versions


External links
http://gizmodo.com/peloton-bike-was-vulnerable-to-remote-hacking-researc-1847105097


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability