CVE-2025-70342

Plain English Summary

AI-powered analysis for quick understanding

An attacker can capture admin credentials entered during system reinstall or erase operations because the software saves this sensitive information in a publicly accessible file. This vulnerability can be exploited by an unauthenticated user who creates a specific type of communication channel on the system.

Technical Description

erase-install prior to v40.4 commit 2c31239 writes swiftDialog credential output to a hardcoded path /var/tmp/dialog.json. This allows an unauthenticated attacker to intercept admin credentials entered during reinstall/erase operations via creating a named pipe.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$948($500-$1K)
Vendor Response
Grade APatched in 5 days

Quick Information

Published

Mar 4, 2026

about 1 month ago

Last Modified

Mar 9, 2026

29 days ago

Vendor

grahampugh

Product

erase-install