"value":"The affected product is vulnerable to an attacker modifying the bootloader by using custom arguments to bypass authentication and gain access to the file system and obtain password hashes."
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"value":"\n\n<br>\n\n<p>Motorola Solutions recommends the following for each identified vulnerability:</p><p>CVE-2024-38279:</p><ul><li>Use secure boot implementation with an edit-resistant GRUB partition.</li><li>Additional mitigation consists in limiting the physical access to the device by following the best practices for device mounting.</li></ul><p>Edit-resistant grub partition has been remediated for all vulnerable systems. Motorola Solutions<br>will release a secure boot implementation in Fall 2024. All customers will receive the update<br>through OTA (over the air) mechanisms. No further actions are required by customers.</p>\n\n<br>"
}
],
"value":"Motorola Solutions recommends the following for each identified vulnerability:\n\nCVE-2024-38279:\n\n * Use secure boot implementation with an edit-resistant GRUB partition.\n * Additional mitigation consists in limiting the physical access to the device by following the best practices for device mounting.\n\n\nEdit-resistant grub partition has been remediated for all vulnerable systems. Motorola Solutions\nwill release a secure boot implementation in Fall 2024. All customers will receive the update\nthrough OTA (over the air) mechanisms. No further actions are required by customers."
}
],
"credits":[
{
"lang":"en",
"value":"The Michigan State Police Michigan Cyber Command Center (MC3)"