Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22945
History

Thu, 03 Oct 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Alpsalpine
Alpsalpine ilx-f509
Alpsalpine ilx-f509 Firmware
CPEs cpe:2.3:h:alpsalpine:ilx-f509:-:*:*:*:*:*:*:*
cpe:2.3:o:alpsalpine:ilx-f509_firmware:6.0.000:*:*:*:*:*:*:*
Vendors & Products Alpsalpine
Alpsalpine ilx-f509
Alpsalpine ilx-f509 Firmware

Thu, 03 Oct 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Alpine
Alpine halo9
CPEs cpe:2.3:a:alpine:halo9:6.0.000:*:*:*:*:*:*:*
Vendors & Products Alpine
Alpine halo9
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 28 Sep 2024 06:30:00 +0000

Type Values Removed Values Added
Description Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22945
Title Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ASRG

Published: 2024-09-28T06:22:22.014Z

Updated: 2024-10-03T14:18:13.418Z

Reserved: 2024-01-23T21:45:25.299Z

Link: CVE-2024-23923

cve-icon Vulnrichment

Updated: 2024-10-03T14:17:45.968Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-28T07:15:02.440

Modified: 2024-10-03T18:07:35.977

Link: CVE-2024-23923

cve-icon Redhat

No data.