Vulnerability Description
The `Toybox.Ant.GenericChannel.enableEncryption` API method in CIQ API version 3.2.0 through 4.1.7 does not validate its parameter, which can result in buffer overflows when copying various attributes. A malicious application could call the API method with specially crafted object and hijack the execution of the device's firmware.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Garmin | Connect-Iq | >= 3.2.0, <= 4.1.7 |
Related Weaknesses (CWE)
References
- https://developer.garmin.com/connect-iq/api-docs/Toybox/Ant/GenericChannel.html#Product
- https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-Exploit
- https://developer.garmin.com/connect-iq/api-docs/Toybox/Ant/GenericChannel.html#Product
- https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-Exploit
FAQ
What is CVE-2023-23303?
CVE-2023-23303 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The `Toybox.Ant.GenericChannel.enableEncryption` API method in CIQ API version 3.2.0 through 4.1.7 does not validate its parameter, which can result in buffer overflows when copying various attributes...
How severe is CVE-2023-23303?
CVE-2023-23303 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-23303?
Check the references section above for vendor advisories and patch information. Affected products include: Garmin Connect-Iq.