OMVA Vulnerability Early Warning
After the computer restarts, OMVA allows using an already connected unauthorized USB device
Vulnerability
OPSWAT Media Validation Agent (OMVA) had a vulnerability that allowed the use of an unauthorized USB device after a computer restart.
An actor (attacker or a victim) who has access to a computer that is protected by OMVA and can insert USB media, after a system restarts the actor will be able to use the non-authorized USB key and its content.
Attack vectors
Attack vector #1:
The attacker must get physical access to the computer, insert the unauthorized device (like a USB key), and reboot the system. After the reboot, the attacker can use the attached device, because OMVA does not block that.
Attack vector #2:
The attacker convinces the victim via social engineering to insert the media, restart the computer, and start to use the media device (e.g opening a file).
Affected Versions
OMVA Up to version 2.0.10.247
Solution
Update to newest (preferably most updated) version of the OMVA.
In all versions starting OMVA 2.0.10.247 access to Removable and Peripheral Media will also be restricted during bootup
For more details about OPSWAT Media Validation Tool (OMVA) please refer OPSWAT OMVA Documentation.
CVE-2024-37604 was reserved for the aforementioned vulnerability, an update be provided once a CVE will be available.
Credits
Reported-by: Cybersecurity Group – Emerson