Show filters
50 Total Results
Displaying 1-10 of 50
Sort by:
Attacker Value
Unknown

CVE-2024-24731

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the http_download command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
0
Attacker Value
Unknown

CVE-2024-23973

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.  The specific flaw exists within the handling of HTTP GET requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
0
Attacker Value
Unknown

CVE-2024-23937

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the debug interface. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device.
0
Attacker Value
Unknown

CVE-2024-23938

Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the debug interface. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23184
Attacker Value
Unknown

CVE-2024-4013

Disclosure Date: June 06, 2024 (last updated June 07, 2024)
A bug exists in the API, mesh_node_power_off(), which fails to copy the contents of the Replay Protection List (RPL) from RAM to NVM before powering down, resulting in the ability to replay unsaved messages. Note that as of June 2024, the Gecko SDK was renamed to the Simplicity SDK, and the versioning scheme was changed from Gecko SDK vX.Y.Z to Simplicity SDK YYYY.MM.Patch#.
0
Attacker Value
Unknown

CVE-2024-22473

Disclosure Date: February 21, 2024 (last updated February 13, 2025)
TRNG is used before initialization by ECDSA signing driver when exiting EM2/EM3 on Virtual Secure Vault (VSE) devices. This defect may allow Signature Spoofing by Key Recreation.This issue affects Gecko SDK through v4.4.0.
Attacker Value
Unknown

CVE-2023-45318

Disclosure Date: February 20, 2024 (last updated February 13, 2025)
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP git commit 80d4004. A specially crafted network packet can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
Attacker Value
Unknown

CVE-2024-0240

Disclosure Date: February 15, 2024 (last updated February 06, 2025)
A memory leak in the Silicon Labs' Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop.
Attacker Value
Unknown

CVE-2023-6874

Disclosure Date: February 05, 2024 (last updated February 10, 2024)
Prior to v7.4.0, Ember ZNet is vulnerable to a denial of service attack through manipulation of the NWK sequence number
Attacker Value
Unknown

CVE-2023-6387

Disclosure Date: February 02, 2024 (last updated February 10, 2024)
A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution