First published: Fri Jun 21 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the DecodeUTF7 function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Alpine Halo9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23249 is critical due to the possibility of arbitrary code execution.
To fix ZDI-CAN-23249, update the Alpine Halo9 device to the latest firmware version available from the manufacturer.
ZDI-CAN-23249 affects installations of Alpine Halo9 devices that are vulnerable to Bluetooth pairing exploits.
No, ZDI-CAN-23249 requires an attacker to be in close proximity to the device to exploit the vulnerability.
Exploitation of ZDI-CAN-23249 could allow an attacker to execute arbitrary code, potentially compromising the device and its data.