CVE-2024-7537

5.5 MEDIUM

📋 TL;DR

This vulnerability in oFono's QMI SMS handling allows local attackers to read beyond allocated buffer boundaries, potentially disclosing sensitive information. Attackers could combine this with other vulnerabilities to execute arbitrary code as root. Systems running vulnerable oFono installations are affected.

💻 Affected Systems

Products:
  • oFono
Versions: Versions prior to the fix (specific version not provided in advisory)
Operating Systems: Linux-based systems using oFono
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using oFono for mobile telephony services, particularly those handling SMS via QMI interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root leading to complete system compromise via arbitrary code execution

🟠

Likely Case

Information disclosure of sensitive memory contents, potentially including credentials or other system data

🟢

If Mitigated

Limited information disclosure with no privilege escalation due to proper isolation and security controls

🌐 Internet-Facing: LOW - Requires local access to exploit
🏢 Internal Only: MEDIUM - Local attackers on affected systems can exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and may need to be combined with other vulnerabilities for full exploitation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version with fix for ZDI-CAN-23157 (check vendor advisory)

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1077/

Restart Required: Yes

Instructions:

1. Check oFono vendor advisory for patched version
2. Update oFono to the latest patched version
3. Restart oFono services
4. Verify the fix is applied

🔧 Temporary Workarounds

Disable SMS functionality

linux

Temporarily disable SMS message processing in oFono if not required

systemctl stop ofono
Disable SMS in oFono configuration

Restrict local access

linux

Limit local user access to systems running oFono

Implement strict user access controls
Use SELinux/AppArmor to restrict oFono processes

🧯 If You Can't Patch

  • Isolate affected systems from critical networks
  • Implement strict monitoring for unusual oFono process behavior

🔍 How to Verify

Check if Vulnerable:

Check oFono version and compare against patched versions in vendor advisory

Check Version:

ofonod --version or check package manager (apt list --installed | grep ofono)

Verify Fix Applied:

Verify oFono version is updated to patched version and restart services

📡 Detection & Monitoring

Log Indicators:

  • Unusual oFono process crashes
  • SMS processing errors in oFono logs
  • Memory access violation logs

Network Indicators:

  • Unusual SMS traffic patterns to/from affected systems

SIEM Query:

Process:ofonod AND (EventID:1000 OR "segmentation fault" OR "out of bounds")

🔗 References

📤 Share & Export