On boot, the Pillar container checks for /config/authorized_keys. If present with a valid public key, it enables SSH on port 22 with root login. The /config partition is not protected by measured boot, is mutable and unencrypted.
This enables an attacker with physical access to the device to take out the disk, modify the /config partition using a separate server, then insert it, without the inserted key being flagged as an integrity voilation my measured boot and remote attestation.
Patched in 9.4.3-lts
None (apart from preventing physical access to the device)
0.0.0-20220708121648-5fef4d92e758Exploitability
AV:PAC:LPR:LUI:NScope
S:CImpact
C:LI:HA:N5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N