CVE-2024-7547

7.8 HIGH

📋 TL;DR

This is a stack-based buffer overflow vulnerability in oFono's SMS PDU decoder that allows local attackers to execute arbitrary code with service account privileges. Attackers need initial code execution capability on the target modem to exploit this flaw. Systems using vulnerable versions of oFono for SMS processing are affected.

💻 Affected Systems

Products:
  • oFono
Versions: Versions prior to the fix (specific version not specified in advisory)
Operating Systems: Linux-based systems running oFono
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using oFono for SMS processing, typically in embedded/IoT devices, mobile infrastructure, or telecommunication systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to service account, enabling persistence, data theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation allowing attackers to gain higher privileges on the affected system, potentially leading to service disruption or further exploitation.

🟢

If Mitigated

Contained impact limited to the service account with no lateral movement if proper isolation and least privilege controls are implemented.

🌐 Internet-Facing: LOW - Requires local access and initial code execution on the modem, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Requires local access to the modem system, but could be exploited by compromised internal devices or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute code on the target modem first. The buffer overflow itself is straightforward once initial access is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - check oFono repository for latest version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1087/

Restart Required: Yes

Instructions:

1. Check oFono repository for security updates. 2. Update to the latest patched version. 3. Restart oFono services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Disable SMS functionality

linux

Temporarily disable SMS processing if not required

systemctl stop ofono
systemctl disable ofono

Implement strict access controls

all

Restrict local access to modem systems and oFono services

🧯 If You Can't Patch

  • Implement network segmentation to isolate modem systems from critical infrastructure
  • Apply strict least privilege principles to service accounts and monitor for unusual activity

🔍 How to Verify

Check if Vulnerable:

Check oFono version and compare against patched versions in security advisories

Check Version:

ofonod --version 2>/dev/null || dpkg -l | grep ofono || rpm -qa | grep ofono

Verify Fix Applied:

Verify oFono has been updated to a version after the vulnerability disclosure date

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawning from oFono service
  • Multiple failed SMS parsing attempts
  • Service crashes or restarts

Network Indicators:

  • Unusual SMS traffic patterns to modem systems

SIEM Query:

source="ofono.log" AND ("segmentation fault" OR "buffer overflow" OR "SMS decode error")

🔗 References

📤 Share & Export