CVE-2022-32504

An issue was discovered on certain Nuki Home Solutions devices. The code used to parse the JSON objects received from the WebSocket service provided by the device leads to a stack buffer overflow. An attacker would be able to exploit this to gain arbitrary code execution on a KeyTurner device. This affects Nuki Smart Lock 3.0 before 3.3.5 and 2.0 before 2.12.4, as well as Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.
Configurations

No configuration.

History

03 Jul 2024, 01:38

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) Se ha descubierto un problema en determinados dispositivos de Nuki Home Solutions. El código utilizado para analizar los objetos JSON recibidos del servicio WebSocket proporcionado por el dispositivo provoca un desbordamiento del búfer de pila. Un atacante podría aprovechar esto para obtener la ejecución de código arbitrario en un dispositivo KeyTurner. Esto afecta a Nuki Smart Lock 3.0 anterior a 3.3.5 y 2.0 anterior a 2.12.4, así como a Nuki Bridge v1 anterior a 1.22.0 y v2 anterior a 2.13.2.

14 May 2024, 10:43

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 10:43

Updated : 2024-07-03 01:38


NVD link : CVE-2022-32504

Mitre link : CVE-2022-32504

CVE.ORG link : CVE-2022-32504


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')