Show filters
98 Total Results
Displaying 11-20 of 98
Sort by:
Attacker Value
Unknown
CVE-2024-9491
Disclosure Date: January 24, 2025 (last updated January 25, 2025)
DLL hijacking vulnerabilities, caused by an uncontrolled search path in Configuration Wizard 2 installer can lead to privilege escalation and arbitrary code execution when running the impacted installer.
0
Attacker Value
Unknown
CVE-2024-9490
Disclosure Date: January 24, 2025 (last updated January 25, 2025)
DLL hijacking vulnerabilities, caused by an uncontrolled search path in Silicon Labs (8-bit) IDE installer can lead to privilege escalation and arbitrary code execution when running the impacted installer.
0
Attacker Value
Unknown
CVE-2024-7322
Disclosure Date: January 15, 2025 (last updated January 15, 2025)
A ZigBee coordinator, router, or end device may change their node ID when an unsolicited encrypted rejoin response is received, this change in node ID causes Denial of Service (DoS). To recover from this DoS, the network must be re-established
0
Attacker Value
Unknown
CVE-2024-6352
Disclosure Date: January 13, 2025 (last updated January 14, 2025)
A malformed packet can cause a buffer overflow in the APS layer of the Ember ZNet stack and lead to an assert
0
Attacker Value
Unknown
CVE-2024-10106
Disclosure Date: January 09, 2025 (last updated January 10, 2025)
A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer.
0
Attacker Value
Unknown
CVE-2024-6350
Disclosure Date: January 08, 2025 (last updated January 09, 2025)
A malformed 802.15.4 packet causes a buffer overflow to occur leading to an assert and a denial of service. A watchdog reset clears the error condition automatically.
0
Attacker Value
Unknown
CVE-2024-8361
Disclosure Date: January 07, 2025 (last updated January 08, 2025)
In SiWx91x devices, the SHA2/224 algorithm returns a hash of 256 bits instead of 224 bits. This incorrect hash length triggers a software assertion, which subsequently causes a Denial of Service (DoS).
If a watchdog is implemented, device will restart after watch dog expires. If watchdog is not implemented, device can be recovered only after a hard reset
0
Attacker Value
Unknown
CVE-2024-7139
Disclosure Date: December 19, 2024 (last updated December 20, 2024)
Due to an unchecked buffer length, a specially crafted L2CAP packet can cause a buffer overflow. This buffer overflow triggers an assert, which results in a temporary denial of service.
If a watchdog timer is not enabled, a hard reset is required to recover the device.
0
Attacker Value
Unknown
CVE-2024-7138
Disclosure Date: December 19, 2024 (last updated December 20, 2024)
An assert may be triggered, causing a temporary denial of service when a peer device sends a specially crafted malformed L2CAP packet. If a watchdog timer is not enabled, a hard reset is required to recover the device.
0
Attacker Value
Unknown
CVE-2024-7137
Disclosure Date: December 19, 2024 (last updated December 20, 2024)
The L2CAP receive data buffer for L2CAP packets is restricted to packet sizes smaller than the maximum supported packet size. Receiving a packet that exceeds the restricted buffer length may cause a crash. A hard reset is required to recover the crashed device.
0