First published: Fri Jun 21 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPDM_wemCmdCreatSHA256Hash function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Alpine Halo9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-846 is considered high due to the potential for arbitrary code execution without authentication.
To fix ZDI-24-846, update your Alpine Halo9 devices to the latest firmware version provided by Alpine.
ZDI-24-846 affects all installations of Alpine Halo9 devices that have not applied the necessary security updates.
No, ZDI-24-846 requires physical access to the affected Alpine Halo9 devices for exploitation.
The specific function involved in the ZDI-24-846 vulnerability is the UPDM_wemCmdCreatSHA256Hash function.