Loading HuntDB...

Vulnerabilities

CVE-2024-8798

HIGH

No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.

Published Dec 15, 2024

CVE-2024-11263

CRITICAL

When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols.

Published Nov 15, 2024

CVE-2024-6444

MEDIUM

No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.

Published Oct 04, 2024

CVE-2024-6443

MEDIUM

In utf8_trunc in zephyr/lib/utils/utf8.c, last_byte_p can point to one byte before the string pointer if the string is empty.

Published Oct 04, 2024

CVE-2024-6442

MEDIUM

In ascs_cp_rsp_add in /subsys/bluetooth/audio/ascs.c, an unchecked tailroom could lead to a global buffer overflow.

Published Oct 04, 2024

CVE-2024-6259

HIGH

BT: HCI: adv_ext_report Improper discarding in adv_ext_report

Published Sep 13, 2024

CVE-2024-6137

HIGH

BT: Classic: SDP OOB access in get_att_search_list

Published Sep 13, 2024

CVE-2024-6135

HIGH

BT:Classic: Multiple missing buf length checks

Published Sep 13, 2024

CVE-2024-5931

MEDIUM

BT: Unchecked user input in bap_broadcast_assistant

Published Sep 13, 2024

CVE-2024-6258

MEDIUM

BT: Missing length checks of net_buf in rfcomm_handle_data

Published Sep 13, 2024

CVE-2024-5754

HIGH

BT: Encryption procedure host vulnerability

Published Sep 13, 2024

CVE-2024-4785

HIGH

BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero

Published Aug 19, 2024

CVE-2024-3332

MEDIUM

A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device

Published Jul 03, 2024

CVE-2024-3077

MEDIUM

An malicious BLE device can crash BLE victim device by sending malformed gatt packet

Published Mar 29, 2024

CVE-2023-7060

HIGH

Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address.

Published Mar 15, 2024

CVE-2023-6881

HIGH

Possible buffer overflow in is_mount_point

Published Feb 20, 2024

CVE-2024-1638

HIGH

The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read.

Published Feb 19, 2024

CVE-2023-5779

MEDIUM

can: out of bounds in remove_rx_filter function

Published Feb 18, 2024

CVE-2023-6249

HIGH

Signed to unsigned conversion esp32_ipm_send

Published Feb 18, 2024

CVE-2023-6749

HIGH

Unchecked length coming from user input in settings shell

Published Feb 18, 2024

CVE-2023-5055

HIGH

Possible variant of CVE-2021-3434 in function le_ecred_reconf_req.

Published Nov 21, 2023

CVE-2023-4257

HIGH

Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.

Published Oct 13, 2023

CVE-2023-4263

HIGH

Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver

Published Oct 13, 2023

CVE-2023-5563

HIGH

The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception.

Published Oct 12, 2023

CVE-2023-3725

HIGH

Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem

Published Oct 06, 2023

CVE-2023-5184

HIGH

Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.

Published Sep 27, 2023

CVE-2023-4260

MEDIUM

Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.

Published Sep 26, 2023

CVE-2023-4264

HIGH

Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem.

Published Sep 26, 2023

CVE-2023-4259

HIGH

Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.

Published Sep 25, 2023

CVE-2023-4258

HIGH

In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee.

Published Sep 25, 2023

CVE-2023-4265

MEDIUM

Potential buffer overflow vulnerabilities in the following locations: https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841

Published Aug 12, 2023

CVE-2023-1901

MEDIUM

The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.

Published Jul 10, 2023

CVE-2023-2234

MEDIUM

Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host.

Published Jul 10, 2023

CVE-2023-1902

MEDIUM

The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.

Published Jul 10, 2023

CVE-2023-0359

MEDIUM

A missing nullptr-check in handle_ra_input can cause a nullptr-deref.

Published Jul 10, 2023

CVE-2023-0779

MEDIUM

At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.

Published May 30, 2023

CVE-2021-3329

CRITICAL

Lack of proper validation in HCI Host stack initialization can cause a crash of the bluetooth stack

Published Feb 26, 2023

CVE-2022-3806

UNKNOWN

Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.

Published Jan 19, 2023

CVE-2023-0397

CRITICAL

A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete.

Published Jan 19, 2023

CVE-2023-0396

UNKNOWN

A malicious / defective bluetooth controller can cause buffer overreads in the most functions that process HCI command responses.

Published Jan 19, 2023

CVE-2021-3966

CRITICAL

usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.

Published Jan 11, 2023

CVE-2022-0553

MEDIUM

There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily.

Published Jan 11, 2023

CVE-2022-2993

HIGH

There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.

Published Dec 12, 2022

CVE-2022-2741

HIGH

The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).

Published Oct 31, 2022

CVE-2022-1841

HIGH

In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero.

Published Aug 31, 2022

CVE-2022-1042

HIGH

In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.

Published Jul 26, 2022

CVE-2022-1041

HIGH

In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.

Published Jul 26, 2022

CVE-2021-3435

MEDIUM

Information leakage in le_ecred_conn_req(). Zephyr versions >= v2.4.0 Use of Uninitialized Resource (CWE-908). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh

Published Jun 28, 2022

CVE-2021-3434

MEDIUM

Stack based buffer overflow in le_ecred_conn_req(). Zephyr versions >= v2.5.0 Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm

Published Jun 28, 2022

CVE-2021-3433

MEDIUM

Invalid channel map in CONNECT_IND results to Deadlock. Zephyr versions >= v2.5.0 Improper Check or Handling of Exceptional Conditions (CWE-703). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp

Published Jun 28, 2022