First published: Tue May 23 2023(Updated: )
The GarminOS TVM component in CIQ API version 2.1.0 through 4.1.7 allows applications with a specially crafted head section to use the `Toybox.SensorHistory` module without permission. A malicious application could call any functions from the `Toybox.SensorHistory` module without the user's consent and disclose potentially private or sensitive information.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Garmin Connect IQ | >=2.1.0<=4.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23304 is considered a high-severity vulnerability due to its potential for unauthorized access to sensitive sensor data.
To fix CVE-2023-23304, update the Garmin Connect IQ application to version 4.1.8 or later that addresses this vulnerability.
CVE-2023-23304 affects the Garmin Connect IQ API for versions 2.1.0 through 4.1.7, specifically the TVM component.
Yes, CVE-2023-23304 can be exploited remotely by malicious applications without user consent.
The impact of CVE-2023-23304 on user privacy could be significant, as it allows unauthorized applications to access personal sensor history.