The MagicJack device, a VoIP solution for internet phone calls, contains a hidden NAND flash memory partition allowing unauthorized read/write access. Attackers can exploit this by replacing the original software with a malicious version, leading to ransomware deployment on the host computer. Affected devices have firmware versions prior to magicJack A921 USB Phone Jack Rev 3.0 V1.4.
References
Link | Resource |
---|---|
https://drive.google.com/drive/folders/1cKd8hksThK610GPtBQ3du8DEkwKywlAi?usp=sharing | Exploit |
https://pastebin.com/raw/irWcawp8 | Third Party Advisory |
https://samuraisecurity.co.uk/red-teaming-0x01-click-rce-via-voip-usb/ | Exploit Technical Description Third Party Advisory |
https://www.magicjack.com/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-04-28 13:15
Updated : 2023-05-12 12:15
NVD link : CVE-2023-30024
Mitre link : CVE-2023-30024
CVE.ORG link : CVE-2023-30024
JSON object : View
Products Affected
magicjack
- a921_firmware
- a921
CWE
CWE-269
Improper Privilege Management