Show filters
26 Total Results
Displaying 11-20 of 26
Sort by:
Attacker Value
Unknown

CVE-2024-9490

Disclosure Date: January 24, 2025 (last updated January 25, 2025)
DLL hijacking vulnerabilities, caused by an uncontrolled search path in Silicon Labs (8-bit) IDE installer can lead to privilege escalation and arbitrary code execution when running the impacted installer.
0
Attacker Value
Unknown

CVE-2024-7322

Disclosure Date: January 15, 2025 (last updated January 15, 2025)
A ZigBee coordinator, router, or end device may change their node ID when an unsolicited encrypted rejoin response is received, this change in node ID causes Denial of Service (DoS). To recover from this DoS, the network must be re-established
0
Attacker Value
Unknown

CVE-2024-6352

Disclosure Date: January 13, 2025 (last updated January 14, 2025)
A malformed packet can cause a buffer overflow in the APS layer of the Ember ZNet stack and lead to an assert
0
Attacker Value
Unknown

CVE-2024-10106

Disclosure Date: January 09, 2025 (last updated January 10, 2025)
A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer.
0
Attacker Value
Unknown

CVE-2024-6350

Disclosure Date: January 08, 2025 (last updated January 09, 2025)
A malformed 802.15.4 packet causes a buffer overflow to occur leading to an assert and a denial of service. A watchdog reset clears the error condition automatically.
0
Attacker Value
Unknown

CVE-2024-8361

Disclosure Date: January 07, 2025 (last updated January 08, 2025)
In SiWx91x devices, the SHA2/224 algorithm returns a hash of 256 bits instead of 224 bits. This incorrect hash length triggers a software assertion, which subsequently causes a Denial of Service (DoS). If a watchdog is implemented, device will restart after watch dog expires. If watchdog is not implemented, device can be recovered only after a hard reset
0
Attacker Value
Unknown

CVE-2024-7139

Disclosure Date: December 19, 2024 (last updated December 20, 2024)
Due to an unchecked buffer length, a specially crafted L2CAP packet can cause a buffer overflow. This buffer overflow triggers an assert, which results in a temporary denial of service.  If a watchdog timer is not enabled, a hard reset is required to recover the device.
0
Attacker Value
Unknown

CVE-2024-7138

Disclosure Date: December 19, 2024 (last updated December 20, 2024)
An assert may be triggered, causing a temporary denial of service when a peer device sends a specially crafted malformed L2CAP packet. If a watchdog timer is not enabled, a hard reset is required to recover the device.
0
Attacker Value
Unknown

CVE-2024-7137

Disclosure Date: December 19, 2024 (last updated December 20, 2024)
The L2CAP receive data buffer for L2CAP packets is restricted to packet sizes smaller than the maximum supported packet size. Receiving a packet that exceeds the restricted buffer length may cause a crash. A hard reset is required to recover the crashed device.
0
Attacker Value
Unknown

CVE-2024-6657

Disclosure Date: October 11, 2024 (last updated October 30, 2024)
A denial of service may be caused to a single peripheral device in a BLE network when multiple central devices continuously connect and disconnect to the peripheral. A hard reset is required to recover the peripheral device.
0