The MagicJack device, a VoIP solution for internet phone calls, contains a hidden NAND flash memory partition allowing unauthorized read/write access. Attackers can exploit this by replacing the original software with a malicious version, leading to ransomware deployment on the host computer. Affected devices have firmware versions prior to magicJack A921 USB Phone Jack Rev 3.0 V1.4.
References
Link | Resource |
---|---|
https://drive.google.com/drive/folders/1cKd8hksThK610GPtBQ3du8DEkwKywlAi?usp=sharing | Exploit |
https://pastebin.com/raw/irWcawp8 | Third Party Advisory |
https://samuraisecurity.co.uk/red-teaming-0x01-click-rce-via-voip-usb/ | Exploit Technical Description Third Party Advisory |
https://www.magicjack.com/ | Product |
https://drive.google.com/drive/folders/1cKd8hksThK610GPtBQ3du8DEkwKywlAi?usp=sharing | Exploit |
https://pastebin.com/raw/irWcawp8 | Third Party Advisory |
https://samuraisecurity.co.uk/red-teaming-0x01-click-rce-via-voip-usb/ | Exploit Technical Description Third Party Advisory |
https://www.magicjack.com/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
31 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 |
21 Nov 2024, 07:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://drive.google.com/drive/folders/1cKd8hksThK610GPtBQ3du8DEkwKywlAi?usp=sharing - Exploit | |
References | () https://pastebin.com/raw/irWcawp8 - Third Party Advisory | |
References | () https://samuraisecurity.co.uk/red-teaming-0x01-click-rce-via-voip-usb/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://www.magicjack.com/ - Product |
Information
Published : 2023-04-28 13:15
Updated : 2025-01-31 17:15
NVD link : CVE-2023-30024
Mitre link : CVE-2023-30024
CVE.ORG link : CVE-2023-30024
JSON object : View
Products Affected
magicjack
- a921_firmware
- a921