PT-2024-5006 · Google · Google Nest Wifi

Published

2024-03-25

·

Updated

2024-04-08

·

CVE-2024-22004

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions: Google Nest Wifi (affected versions not specified) Linux Nonsecure operating system (affected versions not specified)
Description: The issue is related to a length check that allows an attacker with privilege access to trigger a vulnerability. This can lead to the leakage of secure memory from the Trusted Application. Additionally, there is a buffer overflow operation in the Google Nest Wifi microprogram that can be exploited by a remote attacker, potentially impacting the confidentiality, integrity, and availability of protected information.
Recommendations: For Google Nest Wifi, at the moment, there is no information about a newer version that contains a fix for this vulnerability. For Linux Nonsecure operating system, consider restricting access to sensitive areas of the system until a patch is available. As a temporary workaround, consider disabling any functions related to the Trusted Application on the Linux Nonsecure operating system until a patch is available.

Out of bounds Read

Weakness Enumeration

Related Identifiers

BDU:2024-05530
CVE-2024-22004

Affected Products

Google Nest Wifi