Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:zephyrproject:zephyr:1.5.0:-:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-5055 |
Possible variant of CVE-2021-3434 in function le_ecred_reconf_req. Published: November 21, 2023; 1:15:09 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-4424 |
An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device. Published: November 21, 2023; 2:15:10 AM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-5139 |
Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver Published: October 26, 2023; 1:15:26 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-5753 |
Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c Published: October 25, 2023; 2:17:44 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-4257 |
Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows. Published: October 13, 2023; 6:15:10 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-4263 |
Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver Published: October 13, 2023; 5:15:51 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-5563 |
The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception. Published: October 12, 2023; 8:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-3725 |
Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem Published: October 06, 2023; 5:15:10 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-5184 |
Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers. Published: September 27, 2023; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-4264 |
Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem. Published: September 27, 2023; 11:19:40 AM -0400 |
V4.0:(not available) V3.1: 9.6 CRITICAL V2.0:(not available) |
CVE-2023-4262 |
Possible buffer overflow in Zephyr mgmt subsystem when asserts are disabled Published: September 27, 2023; 11:19:40 AM -0400 |
V4.0:(not available) V3.1: 10.0 CRITICAL V2.0:(not available) |
CVE-2023-4260 |
Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system. Published: September 27, 2023; 11:19:40 AM -0400 |
V4.0:(not available) V3.1: 10.0 CRITICAL V2.0:(not available) |
CVE-2023-4259 |
Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code. Published: September 25, 2023; 8:15:11 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-4258 |
In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee. Published: September 25, 2023; 6:15:11 PM -0400 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-4265 |
Potential buffer overflow vulnerabilities in the following locations: https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841 Published: August 12, 2023; 7:15:08 PM -0400 |
V4.0:(not available) V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2023-2234 |
Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host. Published: July 10, 2023; 12:15:51 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-1902 |
The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer. Published: July 10, 2023; 12:15:49 PM -0400 |
V4.0:(not available) V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2023-1901 |
The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer. Published: July 10, 2023; 12:15:49 PM -0400 |
V4.0:(not available) V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2023-0359 |
A missing nullptr-check in handle_ra_input can cause a nullptr-deref. Published: July 10, 2023; 12:15:48 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-0779 |
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible. Published: May 30, 2023; 5:15:08 PM -0400 |
V4.0:(not available) V3.1: 7.7 HIGH V2.0:(not available) |