### [CVE-2018-1000621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000621) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Mycroft AI mycroft-core version 18.2.8b and earlier contains a Incorrect Access Control vulnerability in Websocket configuration that can result in code execution. This impacts ONLY the Mycroft for Linux and "non-enclosure" installs - Mark 1 and Picroft unaffected. This attack appear to be exploitable remote access to the unsecured websocket server. This vulnerability appears to have been fixed in No fix currently available. ### POC #### Reference - https://github.com/Nhoya/MycroftAI-RCE - https://github.com/Nhoya/MycroftAI-RCE #### Github No PoCs found on GitHub currently.