Heap-based Buffer Overflow

CVE-2023-45591

Summary

A CWE-122 “Heap-based Buffer Overflow” vulnerability in the “logger_generic” function of the “Ax_rtu” binary allows a remote authenticated attacker to trigger a memory corruption in the context of the binary. This may result in a Denial-of-Service (DoS) condition, possibly in the execution of arbitrary code with the same privileges of the process (root), or have other unspecified impacts on the device.

Impact

A remote authenticated attacker may induce Denial-of-Service conditions, obtain access to secret information, or, in the worst-case, achieve root Remote Code Execution.

Issue Date

March 4, 2024

Affects

This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2.

CVE Name

CVE-2023-45591

CVSS Details

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS Score

7.5

Solution

Update to imx6 bundle version imx6_1.0.7-2.

Mitigations

Acknowledgements

Andrea Palanca of Nozomi Networks

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Iranian APT Activity During Geopolitical Escalation: Recommendations for Nozomi Customers and Critical Infrastructure Owners

Read

Detecting New OT Threats: How To Do It Proactively 

Read

Smile, You’re Being Hacked: Nozomi Networks Labs Finds Five New Flaws in Hanwha Wisenet Cameras

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.