First published: Fri Aug 30 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Visteon Infotainment systems. Authentication is not required to exploit this vulnerability. The specific flaw exists within the REFLASH_DDU_FindFile function. A crafted software update file can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the device.
Affected Software | Affected Version | How to fix |
---|---|---|
Visteon Infotainment |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-24-1191 is considered critical due to its ability to allow arbitrary code execution without authentication.
To mitigate ZDI-24-1191, update the Visteon Infotainment system to the latest security patch provided by the vendor.
ZDI-24-1191 affects users of Visteon's Infotainment systems that have not applied recent updates.
ZDI-24-1191 can be exploited by physically present attackers who have access to the affected system.
The specific flaw in ZDI-24-1191 resides within the REFLASH_DDU_FindFile function, which is vulnerable to exploitation.