First published: Fri Jun 21 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the USB host driver. A crafted USB configuration descriptor can trigger an overflow of a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Affected Software | Affected Version | How to fix |
---|---|---|
Sony XAV-AX5500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-876 is considered critical due to the potential for arbitrary code execution.
ZDI-24-876 specifically affects Sony XAV-AX5500 devices.
By exploiting ZDI-24-876, physically present attackers can execute arbitrary code on the affected devices.
No, authentication is not required to exploit the ZDI-24-876 vulnerability.
Mitigating ZDI-24-876 involves applying the latest firmware updates provided by Sony for the XAV-AX5500 device.