Show filters
50 Total Results
Displaying 1-10 of 50
Sort by:
Attacker Value
Unknown
CVE-2024-24731
Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the http_download command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
0
Attacker Value
Unknown
CVE-2024-23973
Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of HTTP GET requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
0
Attacker Value
Unknown
CVE-2024-23937
Disclosure Date: January 31, 2025 (last updated January 31, 2025)
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the debug interface. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device.
0
Attacker Value
Unknown
CVE-2024-23938
Disclosure Date: September 28, 2024 (last updated October 04, 2024)
Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the debug interface. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Was ZDI-CAN-23184
0
Attacker Value
Unknown
CVE-2024-4013
Disclosure Date: June 06, 2024 (last updated June 07, 2024)
A bug exists in the API, mesh_node_power_off(), which fails to copy the contents of the Replay Protection
List (RPL) from RAM to NVM before powering down, resulting in the ability to replay unsaved messages. Note that as of June 2024, the Gecko SDK was renamed to the Simplicity SDK, and the versioning scheme
was changed from Gecko SDK vX.Y.Z to Simplicity SDK YYYY.MM.Patch#.
0
Attacker Value
Unknown
CVE-2024-22473
Disclosure Date: February 21, 2024 (last updated February 13, 2025)
TRNG is used before initialization by ECDSA signing driver when exiting EM2/EM3 on Virtual Secure Vault (VSE) devices. This defect may allow Signature Spoofing by Key Recreation.This issue affects Gecko SDK through v4.4.0.
0
Attacker Value
Unknown
CVE-2023-45318
Disclosure Date: February 20, 2024 (last updated February 13, 2025)
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP git commit 80d4004. A specially crafted network packet can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2024-0240
Disclosure Date: February 15, 2024 (last updated February 06, 2025)
A memory leak in the Silicon Labs' Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop.
0
Attacker Value
Unknown
CVE-2023-6874
Disclosure Date: February 05, 2024 (last updated February 10, 2024)
Prior to v7.4.0, Ember ZNet is vulnerable to a denial of service attack through manipulation of the NWK sequence number
0
Attacker Value
Unknown
CVE-2023-6387
Disclosure Date: February 02, 2024 (last updated February 10, 2024)
A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution
0