First published: Mon Aug 05 2024(Updated: )
This vulnerability allows local attackers to disclose sensitive information on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of responses from AT+CMGR commands. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
oFono oFono |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1082 is classified as high due to the potential for local attackers to disclose sensitive information.
To fix ZDI-24-1082, users should apply the latest security patches released by the vendor for oFono.
The attack vector for ZDI-24-1082 requires local access to the target modem, typically by an authenticated user.
ZDI-24-1082 can lead to unauthorized access to sensitive information, compromising system confidentiality.
ZDI-24-1082 affects installations of oFono that have not been updated to mitigate this vulnerability.