Read time:00:08
Release date:10.8.2024
Use-after-free Vulnerability in Alpine Halo9 Infotainment Unit
ZDI-24-844
ZDI-CAN-22945
CVE ID: CVE-2024-23923
CVSS SCORE: 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS: Alpine
AFFECTED PRODUCTS: Halo9
VULNERABILITY DETAILS
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.
SPECIFIC FLAW
The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root.
ADDITIONAL DETAILS
Alpine conducted a Threat Assessment and Remediation Analysis (TARA) in accordance with ISO21434, and concluded that the vulnerability is classified as "Sharing the Risk". Alpine states that they will continue to use the current software without releasing a patch.
DISCLOSURE TIMELINE
2024-02-01 - Vulnerability reported to vendor
2024-06-21 - Coordinated public release of advisory
2024-08-15 - Advisory Updated
Article tags
alpine
alpinehalo9
security advisory
pcautomotive
Latest Advisories
November 22, 2023
December 9, 2024
Popular tags
security advisory
pcautomotive
keo eebus
alpine
alpinehalo9
enel x juicebox
ev charger vulnerability
skoda
skoda backend
vulnerabilities
Credits
Mikhail Evdokimov
Senior Security Researcher