CVE-2022-2741

The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).
Configurations

Configuration 1 (hide)

cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.2
References () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8 - Patch, Third Party Advisory () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8 - Patch, Third Party Advisory

Information

Published : 2022-10-31 18:15

Updated : 2024-11-21 07:01


NVD link : CVE-2022-2741

Mitre link : CVE-2022-2741

CVE.ORG link : CVE-2022-2741


JSON object : View

Products Affected

zephyrproject

  • zephyr
CWE
CWE-400

Uncontrolled Resource Consumption