First published: Tue Sep 17 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE BlueZ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1229 is critical due to the ability for unauthenticated network-adjacent attackers to execute arbitrary code.
Fixing ZDI-24-1229 involves updating BlueZ to the latest version provided by the vendor that addresses this vulnerability.
ZDI-24-1229 affects various installations of BlueZ, but exact versions can vary; it is essential to consult the vendor's advisory for specifics.
Yes, ZDI-24-1229 can be exploited remotely as it allows network-adjacent attackers to execute arbitrary code without authentication.
The potential impacts of ZDI-24-1229 include unauthorized access to system resources and complete control over the affected installations.