Use-after-free Vulnerability in Alpine Halo9 Infotainment Unit

This security advisory introduces the vulnerability that allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices.

Authentication is not required to exploit this vulnerability.

Read time:00:08

Release date:10.8.2024

Use-after-free Vulnerability in Alpine Halo9 Infotainment Unit

ZDI-24-844

ZDI-CAN-22945

CVE ID: CVE-2024-23923
CVSS SCORE: 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AFFECTED VENDORS: Alpine
AFFECTED PRODUCTS: Halo9

VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.

SPECIFIC FLAW

The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

Alpine conducted a Threat Assessment and Remediation Analysis (TARA) in accordance with ISO21434, and concluded that the vulnerability is classified as "Sharing the Risk". Alpine states that they will continue to use the current software without releasing a patch.

DISCLOSURE TIMELINE

2024-02-01 - Vulnerability reported to vendor
2024-06-21 - Coordinated public release of advisory
2024-08-15 - Advisory Updated

Article tags

alpine

alpinehalo9

security advisory

pcautomotive

Popular tags

security advisory

pcautomotive

keo eebus

alpine

alpinehalo9

enel x juicebox

ev charger vulnerability

skoda

skoda backend

vulnerabilities

Credits

Mikhail Evdokimov

Mikhail Evdokimov

Senior Security Researcher