Garmin Forerunner 235 before 8.20 is affected by: Integer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check for overflow when allocating the array for the NEWA instruction. This a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.
References
Link | Resource |
---|---|
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0004.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2020-11-16 21:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-27484
Mitre link : CVE-2020-27484
CVE.ORG link : CVE-2020-27484
JSON object : View
Products Affected
garmin
- forerunner_235
- forerunner_235_firmware
CWE
CWE-190
Integer Overflow or Wraparound