Sept. 21, 2023, 2:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

On boot, the Pillar eve container checks for the existence and content of
“/config/GlobalConfig/global.json�.

If the file exists, it overrides the existing configuration on the device on boot.

This allows an attacker to change the system’s configuration, which also includes some
debug functions.

This could be used to unlock the ssh with custom “authorized_keys� via the
“debug.enable.ssh� key, similar to the “authorized_keys� finding that was noted before.

Other usages include unlocking the usb to enable the keyboard via the “debug.enable.usbâ€� …

attacker boot change configuration container cve debug device enable eve file functions global key ssh unlock

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC