Description
Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27701 | Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike |
References
| Link | Providers |
|---|---|
| https://twitter.com/ROPsicle/status/1438216078103044107?s=20 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T02:44:10.850Z
Reserved: 2021-09-06T00:00:00.000Z
Link: CVE-2021-40526
No data.
Status : Modified
Published: 2021-10-25T11:15:07.653
Modified: 2024-11-21T06:24:19.470
Link: CVE-2021-40526
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD