// For flags

CVE-2020-27483

 

Severity Score

9.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution.

Garmin Forerunner 235 versiones anteriores a 8.20, está afectado por: un Error de Índice de Matriz. El componente es: ConnectIQ TVM. El vector de ataque es: Para explotar la vulnerabilidad, el atacante debe cargar una aplicación de ConnectIQ maliciosa en la tienda ConnectIQ. El intérprete del programa ConnectIQ confía en el desplazamiento proporcionado para la instrucción de duplicación del valor de pila, DUP. El desplazamiento no está marcado y la memoria antes del inicio de la pila de ejecución puede ser leída y tratada como un objeto TVM. Una explotación con éxito podría usar la vulnerabilidad para filtrar información de tiempo de ejecución, como el manejador de pila o el puntero para una serie de variables del contexto de TVM. Algunos valores alcanzables pueden controlarse lo suficiente para falsificar un objeto TVM en la pila, conllevando a una posible ejecución de código remota

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-21 CVE Reserved
  • 2020-11-16 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2024-09-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-129: Improper Validation of Array Index
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Garmin
Search vendor "Garmin"
Forerunner 235 Firmware
Search vendor "Garmin" for product "Forerunner 235 Firmware"
>= 7.90 < 8.20
Search vendor "Garmin" for product "Forerunner 235 Firmware" and version " >= 7.90 < 8.20"
-
Affected
in Garmin
Search vendor "Garmin"
Forerunner 235
Search vendor "Garmin" for product "Forerunner 235"
--
Safe