Heap-based Buffer Overflow

CVE-2023-45591

Summary

A CWE-122 “Heap-based Buffer Overflow” vulnerability in the “logger_generic” function of the “Ax_rtu” binary allows a remote authenticated attacker to trigger a memory corruption in the context of the binary. This may result in a Denial-of-Service (DoS) condition, possibly in the execution of arbitrary code with the same privileges of the process (root), or have other unspecified impacts on the device.

Impact

A remote authenticated attacker may induce Denial-of-Service conditions, obtain access to secret information, or, in the worst-case, achieve root Remote Code Execution.

Issue Date

March 4, 2024

Affects

This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.

CVE Name

CVE-2023-45591

CVSS Details

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS Score

7.5

Solution

Update to imx6 bundle version imx6_1.0.7-2.

Mitigations

Acknowledgements

Andrea Palanca of Nozomi Networks

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Breaking the Encryption: Analyzing the AutomationDirect CLICK Plus PLC Protocol 

Read

Lights Out: How One Tiny Message Can Crash Your Shelly Pro 4PM and Lock You Out of Your Smart Home

Read

Hacking the Engineer’s Workstation: Compromising AutomationDirect Productivity Suite to Breach the OT Perimeter

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.