First published: Tue May 23 2023(Updated: )
The permission system implemented and enforced by the GarminOS TVM component in CIQ API version 1.0.0 through 4.1.7 can be bypassed entirely. A malicious application with specially crafted code and data sections could access restricted CIQ modules, call their functions and disclose sensitive data such as user profile information and GPS coordinates, among others.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Garmin Connect IQ | >=1.0.0<=4.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23299 is considered a high-severity vulnerability due to its ability to allow unauthorized access to sensitive data.
To fix CVE-2023-23299, update your Garmin Connect IQ applications to versions beyond 4.1.7.
CVE-2023-23299 is a bypass vulnerability affecting the permission system in the GarminOS TVM component.
All applications developed using Garmin Connect IQ API versions 1.0.0 through 4.1.7 are affected by CVE-2023-23299.
An attacker can exploit CVE-2023-23299 to access restricted CIQ modules and potentially disclose sensitive data.