// For flags

CVE-2023-23609

contiki-ng BLE-L2CAP contains Improper size validation of L2CAP frames

Severity Score

7.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to and including 4.8 are vulnerable to an out-of-bounds write that can occur in the BLE-L2CAP module. The Bluetooth Low Energy - Logical Link Control and Adaptation Layer Protocol (BLE-L2CAP) module handles fragmentation of packets up the configured MTU size. When fragments are reassembled, they are stored in a packet buffer of a configurable size, but there is no check to verify that the packet buffer is large enough to hold the reassembled packet. In Contiki-NG's default configuration, it is possible that an out-of-bounds write of up to 1152 bytes occurs. The vulnerability has been patched in the "develop" branch of Contiki-NG, and will be included in release 4.9. The problem can be fixed by applying the patch in Contiki-NG pull request #2254 prior to the release of version 4.9.

Contiki-NG es un sistema operativo multiplataforma de código abierto para dispositivos IoT de próxima generación. Las versiones anteriores a la 4.8 incluida son vulnerables a una escritura fuera de los límites que puede ocurrir en el módulo BLE-L2CAP. El módulo Bluetooth de baja energía: protocolo de capa de adaptación y control de enlace lógico (BLE-L2CAP) maneja la fragmentación de paquetes hasta el tamaño de MTU configurado. Cuando se vuelven a ensamblar los fragmentos, se almacenan en un búfer de paquetes de un tamaño configurable, pero no se verifica que el búfer de paquetes sea lo suficientemente grande para contener el paquete reensamblado. En la configuración predeterminada de Contiki-NG, es posible que se produzca una escritura fuera de los límites de hasta 1152 bytes. La vulnerabilidad ha sido parcheada en la rama "desarrollo" de Contiki-NG y se incluirá en la versión 4.9. El problema se puede solucionar aplicando el parche en la solicitud de extracción #2254 de Contiki-NG antes del lanzamiento de la versión 4.9.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-01-16 CVE Reserved
  • 2023-01-25 CVE Published
  • 2024-07-07 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Contiki-ng
Search vendor "Contiki-ng"
Contiki-ng
Search vendor "Contiki-ng" for product "Contiki-ng"
<= 4.8
Search vendor "Contiki-ng" for product "Contiki-ng" and version " <= 4.8"
-
Affected