Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Oxford Nanopore Technologies MinKNOW Insufficiently Protected Credentials
Vulnerability Description
Oxford Nanopore Technologies' MinKNOW software at or prior to version 24.11 stores authentication tokens in a file located in the system's temporary directory (/tmp) on the host machine. This directory is typically world-readable, allowing any local user or application to access the token. If the token is leaked (e.g., via malware infection or other local exploit), and remote access is enabled, it can be used to establish unauthorized remote connections to the sequencer. Remote access must be enabled for remote exploitation to succeed. This may occur either because the user has enabled remote access for legitimate operational reasons or because malware with elevated privileges (e.g., sudo access) enables it without user consent. This vulnerability can be chained with remote access capabilities to generate a developer token from a remote device. Developer tokens can be created with arbitrary expiration dates, enabling persistent access to the sequencer and bypassing standard authentication mechanisms.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
不充分的凭证保护机制
Vulnerability Title
Oxford Nanopore Technologies MinKNOW 安全漏洞
Vulnerability Description
Oxford Nanopore Technologies MinKNOW是英国Oxford Nanopore Technologies公司的一个数据采集控制和监测软件。 Oxford Nanopore Technologies MinKNOW 24.11之前版本存在安全漏洞,该漏洞源于认证令牌存储在系统临时目录中,可能导致未经授权的远程连接。
CVSS Information
N/A
Vulnerability Type
N/A