Loading
Generated remediation guidance and an executive summary. No account required.
The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.
Use CWE-367, Pengutronix vendor hub and Rauc product page to widen CVE-2020-25860 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-34155 for nearby disclosures in the same product family.