First published: Fri Jun 21 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the USB host driver. A crafted USB configuration descriptor can trigger an overflow of a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Affected Software | Affected Version | How to fix |
---|---|---|
Sony XAV-AX5500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23185 is high due to the potential for arbitrary code execution without requiring authentication.
To fix ZDI-CAN-23185, ensure that your Sony XAV-AX5500 device firmware is updated to the latest version provided by Sony.
ZDI-CAN-23185 is a vulnerability that allows arbitrary code execution via the USB host driver on affected Sony XAV-AX5500 devices.
The vulnerability ZDI-CAN-23185 affects all users with Sony XAV-AX5500 devices where the flaw exists in the USB host driver.
No, authentication is not required to exploit the vulnerability ZDI-CAN-23185, making it accessible to physically present attackers.