First published: Fri Jun 21 2024(Updated: )
This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPDM_wemCmdUpdFSpeDecomp function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Alpine Halo9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-23306 is considered a high-severity vulnerability due to the potential for arbitrary code execution.
To mitigate ZDI-CAN-23306, it is recommended to apply the latest security updates from Alpine for the Halo9 devices.
ZDI-CAN-23306 affects installations of the Alpine Halo9 devices that are physically accessible to attackers.
No, authentication is not required to exploit ZDI-CAN-23306, making it particularly dangerous.
An attacker exploiting ZDI-CAN-23306 could execute arbitrary code on the affected Alpine Halo9 devices.