First published: Fri Jun 21 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the Apple CarPlay protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Affected Software | Affected Version | How to fix |
---|---|---|
Sony XAV-AX5500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23238 is critical due to its ability to allow arbitrary code execution by an attacker with physical access.
To fix ZDI-CAN-23238, ensure that your Sony XAV-AX5500 device is updated with the latest firmware provided by Sony.
Users of Sony XAV-AX5500 devices are affected by ZDI-CAN-23238.
Exploitation of ZDI-CAN-23238 requires physical access to the affected device.
ZDI-CAN-23238 involves a specific flaw in the implementation of the Apple CarPlay protocol.