漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Oxford Nanopore Technologies MinKNOW Insufficiently Protected Credentials
Vulnerability Description
Oxford Nanopore Technologies' MinKNOW software at or prior to version 24.11 stores authentication tokens in a file located in the system's temporary directory (/tmp) on the host machine. This directory is typically world-readable, allowing any local user or application to access the token. If the token is leaked (e.g., via malware infection or other local exploit), and remote access is enabled, it can be used to establish unauthorized remote connections to the sequencer. Remote access must be enabled for remote exploitation to succeed. This may occur either because the user has enabled remote access for legitimate operational reasons or because malware with elevated privileges (e.g., sudo access) enables it without user consent. This vulnerability can be chained with remote access capabilities to generate a developer token from a remote device. Developer tokens can be created with arbitrary expiration dates, enabling persistent access to the sequencer and bypassing standard authentication mechanisms.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
不充分的凭证保护机制
Vulnerability Title
Oxford Nanopore Technologies MinKNOW 安全漏洞
Vulnerability Description
Oxford Nanopore Technologies MinKNOW是英国Oxford Nanopore Technologies公司的一个数据采集控制和监测软件。 Oxford Nanopore Technologies MinKNOW 24.11之前版本存在安全漏洞,该漏洞源于认证令牌存储在系统临时目录中,可能导致未经授权的远程连接。
CVSS Information
N/A
Vulnerability Type
N/A