Sony PS4/PS5 exFAT UVFAT_readupcasetable dataLength heap-based overflow

CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.4 | $0-$5k | 0.11 |
Summary
A vulnerability was found in Sony PS4 and PS5. It has been declared as critical. This vulnerability affects the function UVFAT_readupcasetable
of the component exFAT Handler. The manipulation of the argument dataLength leads to heap-based overflow.
This vulnerability was named CVE-2022-3349. It is possible to launch the attack on the physical device. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Details
A vulnerability was found in Sony PS4 and PS5 (Game Console) (affected version unknown). It has been classified as critical. This affects the function UVFAT_readupcasetable
of the component exFAT Handler. The manipulation of the argument dataLength
with an unknown input leads to a heap-based overflow vulnerability. CWE is classifying the issue as CWE-122. A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). This is going to have an impact on confidentiality, integrity, and availability.
The weakness was shared 09/28/2022 by Andy Nguyen as #1340942. It is possible to read the advisory at hackerone.com. This vulnerability is uniquely identified as CVE-2022-3349. Technical details and a exploit are known.
It is declared as proof-of-concept.
Upgrading eliminates this vulnerability. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.8VulDB Meta Temp Score: 6.4
VulDB Base Score: 6.8
VulDB Temp Score: 6.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 6.8
CNA Vector (VulDB): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Heap-based overflowCWE: CWE-122 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
12/10/2021 🔍09/28/2022 🔍
09/28/2022 🔍
09/28/2022 🔍
10/24/2022 🔍
Sources
Advisory: #1340942Researcher: Andy Nguyen
Status: Confirmed
CVE: CVE-2022-3349 (🔍)
GCVE (CVE): GCVE-0-2022-3349
GCVE (VulDB): GCVE-100-209679
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 09/28/2022 10:20Updated: 10/24/2022 18:01
Changes: 09/28/2022 10:20 (44), 10/24/2022 17:54 (2), 10/24/2022 18:01 (11)
Complete: 🔍
Cache ID: 216:9DA:103
No comments yet. Languages: en.
Please log in to comment.