Vulnerability Description
The `Toybox.Cryptography.Cipher.initialize` API method in CIQ API version 3.0.0 through 4.1.7 does not validate its parameters, which can result in buffer overflows when copying data. A malicious application could call the API method with specially crafted parameters and hijack the execution of the device's firmware.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Garmin | Connect-Iq | >= 3.0.0, <= 4.1.7 |
Related Weaknesses (CWE)
References
- https://developer.garmin.com/connect-iq/api-docs/Toybox/Cryptography/Cipher.htmlProduct
- https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-Exploit
- https://developer.garmin.com/connect-iq/api-docs/Toybox/Cryptography/Cipher.htmlProduct
- https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-Exploit
FAQ
What is CVE-2023-23300?
CVE-2023-23300 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The `Toybox.Cryptography.Cipher.initialize` API method in CIQ API version 3.0.0 through 4.1.7 does not validate its parameters, which can result in buffer overflows when copying data. A malicious appl...
How severe is CVE-2023-23300?
CVE-2023-23300 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-23300?
Check the references section above for vendor advisories and patch information. Affected products include: Garmin Connect-Iq.