Advisory Details

September 17th, 2024

BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability

ZDI-24-1229
ZDI-CAN-25177

CVE ID CVE-2024-8805
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS BlueZ
AFFECTED PRODUCTS BlueZ
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user.

ADDITIONAL DETAILS

https://patchwork.kernel.org/project/bluetooth/patch/20240912204458.3037144-1-luiz.dentz@gmail.com/

https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=370e38c32529e0899bb387a70d5d92dfb5a2b3c5


DISCLOSURE TIMELINE
  • 2024-09-10 - Vulnerability reported to vendor
  • 2024-09-17 - Coordinated public release of advisory
  • 2024-10-09 - Advisory Updated
CREDIT MICHAEL RANDRIANANTENAINA [https://elkamika.blogspot.com/]
BACK TO ADVISORIES