Total
                    111 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 | 
|---|---|---|---|---|---|
| CVE-2023-4257 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 7.6 HIGH | 
| Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows. | |||||
| CVE-2023-3725 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 7.6 HIGH | 
| Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem | |||||
| CVE-2023-2234 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 6.8 MEDIUM | 
| Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host. | |||||
| CVE-2023-1902 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 5.9 MEDIUM | 
| The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer. | |||||
| CVE-2023-1901 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 5.9 MEDIUM | 
| The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer. | |||||
| CVE-2023-0779 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 6.7 MEDIUM | 
| At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible. | |||||
| CVE-2023-0397 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 9.6 CRITICAL | 
| A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete. | |||||
| CVE-2023-0359 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 5.9 MEDIUM | 
| A missing nullptr-check in handle_ra_input can cause a nullptr-deref. | |||||
| CVE-2022-2741 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 8.2 HIGH | 
| The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa). | |||||
| CVE-2022-1841 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 7.2 HIGH | 
| In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero. | |||||
| CVE-2022-1042 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 8.2 HIGH | 
| In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning. | |||||
| CVE-2022-1041 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 8.2 HIGH | 
| In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning. | |||||
| CVE-2022-0553 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 6.5 MEDIUM | 
| There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily. | |||||
| CVE-2021-3966 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | N/A | 9.6 CRITICAL | 
| usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem. | |||||
| CVE-2021-3861 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | 7.2 HIGH | 8.2 HIGH | 
| The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj | |||||
| CVE-2021-3835 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | 5.8 MEDIUM | 8.2 HIGH | 
| Buffer overflow in usb device class. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf | |||||
| CVE-2021-3625 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | 7.5 HIGH | 9.6 CRITICAL | 
| Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363 | |||||
| CVE-2021-3581 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | 5.8 MEDIUM | 7.0 HIGH | 
| Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5 | |||||
| CVE-2021-3510 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH | 
| Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4 | |||||
| CVE-2021-3455 | 1 Zephyrproject | 1 Zephyr | 2024-11-21 | 5.0 MEDIUM | 4.3 MEDIUM | 
| Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp | |||||
