Remote Hard Reset Data Wipe and DoS of Pocket Controller v5.0

Credit: Jonathan Read
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other

CVSS Base Score: 7.8/10
Impact Subscore: 6.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

------------------------------------- Airscanner Mobile Security Advisory: (#AS05080401) (Critical) ------------------------------------- Remote Hard Reset Data Wipe and DoS of Pocket Controller v5.0 (#AS05080401) Date of discovery: August 4, 2005 Product: Pocket Controller-Professional V5 (latest edition) Platform: Windows Mobile .NET, Windows Mobile Pocket PC Requirements: Windows Mobile Credits: Jonathan Read (CISSP) and Seth Fogie Airscanner Mobile Security Mobile Antivirus Researcher's Association Severity: Medium to High since any PDA running the application can be "hard reset" (up to complete loss of all data and installed applications) using a remote connection. This vulnerability can also be exploited over a wireless connection. Summary: Pocket Controller Professional is a popular, powerful remote control and management program that allows a user to remotely control a PDA from their PC computer. See for more information. Several feature of this program is that it can remotely turn off, reboot, and reset the PDA. We discovered that these commands can be performed without the client program sending only three packets to the target PDA. Details: Connect to port 5492 on PDA that is running the target client program. First send an initialization packet to the PDA. Next send a packet containing the desired command (turn off, reboot, hard reset) to the PDA. Finally, create a new socket and reset the intitialization packet. Upon receipt, the PDA will perform the selected function. PoC is available for MARA members. Workaround: No work around available. Initial Vendor Notification: August 4, 2005 Initial Vendor Response: Awaiting response. -------------------------------------------------------------------- Legal: Copyright (c) 2005 Airscanner Corp. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of Airscanner Corp. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please contact Airscanner Corp. for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use on an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. -------------------------------------------------------------------- This advisory can be viewed online at

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top