First published: Mon Sep 23 2024(Updated: )
Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the Apple CarPlay protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23238
Credit: cve@asrg.io
Affected Software | Affected Version | How to fix |
---|---|---|
Sony XAV-AX5500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23933 has a high severity rating due to its potential for remote code execution.
To fix CVE-2024-23933, users should update their Sony XAV-AX5500 devices to the latest firmware version provided by Sony.
CVE-2024-23933 affects users of Sony XAV-AX5500 devices where physical access is possible.
CVE-2024-23933 allows for arbitrary code execution through a stack-based buffer overflow.
No, authentication is not required to exploit CVE-2024-23933, making it particularly risky.