This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.
The specific flaw exists within the PBAP_DecodeVCARD function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-850/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Aug 2025, 18:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:alpine-usa:ilx-f509_firmware:*:*:*:*:*:*:*:* |
cpe:2.3:o:alpsalpine:ilx-f509_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:alpsalpine:ilx-f509:-:*:*:*:*:*:*:* |
First Time |
Alpsalpine
Alpsalpine ilx-f509 Firmware Alpsalpine ilx-f509 |
30 Jun 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
24 Jun 2025, 17:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
Alpine-usa ilx-f509 Firmware
Alpine-usa ilx-f509 Alpine-usa |
|
CPE | cpe:2.3:h:alpine-usa:ilx-f509:-:*:*:*:*:*:*:* cpe:2.3:o:alpine-usa:ilx-f509_firmware:*:*:*:*:*:*:*:* |
|
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-850/ - Third Party Advisory |
31 Jan 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-31 00:15
Updated : 2025-08-12 18:13
NVD link : CVE-2024-23963
Mitre link : CVE-2024-23963
JSON object : View
Products Affected
alpsalpine
- ilx-f509_firmware
- ilx-f509
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')