Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363
9.8CVSS
9.6AI Score
0.003EPSS
Buffer overflow in usb device class. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf
8.8CVSS
8.8AI Score
0.001EPSS
The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj
8.2CVSS
6.9AI Score
0.001EPSS
usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.
9.6CVSS
8.8AI Score
0.001EPSS
There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily.
6.5CVSS
4.8AI Score
0.001EPSS
In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.
8.8CVSS
8.6AI Score
0.001EPSS
In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.
8.8CVSS
8.6AI Score
0.001EPSS
In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero.
7.2CVSS
5.3AI Score
0.001EPSS
The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain th...
8.2CVSS
7.4AI Score
0.001EPSS
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.
9.8CVSS
9.5AI Score
0.002EPSS
Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.
9.8CVSS
9.3AI Score
0.003EPSS
7.5CVSS
7.4AI Score
0.001EPSS
A malicious / defective bluetooth controller can cause buffer overreads in the most functions that process HCI command responses.
6.8CVSS
6.8AI Score
0.001EPSS
A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete.
9.6CVSS
6.3AI Score
0.001EPSS
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
7.7CVSS
7.5AI Score
0.001EPSS
The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
8CVSS
7.8AI Score
0.0004EPSS
The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
8CVSS
7.6AI Score
0.0004EPSS
Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host.
8.8CVSS
8.9AI Score
0.001EPSS
9.8CVSS
9.7AI Score
0.001EPSS
Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.
9.8CVSS
9.5AI Score
0.001EPSS
In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee.
8.6CVSS
6.4AI Score
0.001EPSS
Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.
8.8CVSS
9AI Score
0.001EPSS
10CVSS
9.6AI Score
0.001EPSS
8.8CVSS
8.9AI Score
0.001EPSS
9.6CVSS
9.6AI Score
0.001EPSS
Potential buffer overflow vulnerabilities in the following locations:https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359https://github.com/zephyrproj...
6.8CVSS
7AI Score
0.001EPSS
An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device.
8.8CVSS
8.9AI Score
0.001EPSS
9.8CVSS
8.1AI Score
0.001EPSS
Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver
7.8CVSS
7.8AI Score
0.0004EPSS
Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.
8.8CVSS
9AI Score
0.0004EPSS
The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception.
7.5CVSS
7.4AI Score
0.001EPSS
Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c
8.8CVSS
8.7AI Score
0.001EPSS
8.2CVSS
8.2AI Score
0.0004EPSS
6.5CVSS
6.4AI Score
0.0004EPSS
7.6CVSS
7AI Score
0.0004EPSS
7.6CVSS
7AI Score
0.0004EPSS
6.8CVSS
6.7AI Score
0.0004EPSS
7.6CVSS
7.6AI Score
0.0004EPSS