Enomaly ECP versions up to and including 3.0.4 are believed to contain an insecure silent update mechanism that could allow a remote attacker to execute arbitrary code as root, and to inject or modify VM workloads for execution within user environment or to replay older, insecure workloads. Both the Enomaly ECP implementation and the VMcasting protocol itself are believed to be vulnerable.
e16285c2f1ba9ebc8fd42584526dc51cf5c5ff2063e048b6d25545b604a2ead0
All versions of Enomaly ECP/Enomalism before 2.2.1 have multiple issues relating to the use of temporary files in an insecure manner.
461388d5af9b086c1ea7698c7c71be0f51f4b95fd1d2fce9bd1ff0fe15f9f6d3
All versions of Enomaly ECP/Enomalism have an insecure silent update mechanism that could allow a remote attacker to execute arbitrary code as root.
9f314c7d809a33fd1f2f922ca6d89e8825901419404addfcf7d0d5e4c2e48bca
Enomaly ECP/Enomalism versions prior to 2.1.1 use temporary files in an insecure manner, allowing for symlink and command injection attacks.
c2f83d754ab9d6bdb0af2e41fc5bf6c46034f1807d705f25738a759685b5720d