Mycroft AI mycroft-core version 18.2.8b and earlier contains a Incorrect Access Control vulnerability in Websocket configuration that can result in code execution. This impacts ONLY the Mycroft for Linux and "non-enclosure" installs - Mark 1 and Picroft unaffected. This attack appear to be exploitable remote access to the unsecured websocket server. This vulnerability appears to have been fixed in No fix currently available.
References
Link | Resource |
---|---|
https://community.mycroft.ai/t/zero-click-remote-code-execution-in-mycroft-ai-vocal-assistant/3930/13 | Vendor Advisory |
https://github.com/Nhoya/MycroftAI-RCE | Exploit Third Party Advisory |
https://community.mycroft.ai/t/zero-click-remote-code-execution-in-mycroft-ai-vocal-assistant/3930/13 | Vendor Advisory |
https://github.com/Nhoya/MycroftAI-RCE | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2018-07-09 20:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000621
Mitre link : CVE-2018-1000621
CVE.ORG link : CVE-2018-1000621
JSON object : View
Products Affected
mycroft
- mycroft-core
linux
- linux_kernel
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource