First published: Fri Jun 21 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPDM_wemCmdCreatSHA256Hash function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Alpine Halo9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23105 is critical due to its potential for arbitrary code execution by unauthenticated attackers.
To fix ZDI-CAN-23105, users should apply the latest firmware update provided by Alpine for the Halo9 devices.
ZDI-CAN-23105 affects users of Alpine Halo9 devices that have not been updated to mitigate the vulnerability.
No, ZDI-CAN-23105 requires physical access to the device to exploit the vulnerability.
The impact of ZDI-CAN-23105 includes the ability of an attacker to execute arbitrary code on the affected devices.