// For flags

CVE-2023-48229

Out-of-bounds write in the radio driver for Contiki-NG nRF platforms

Severity Score

7.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds write exists in the driver for IEEE 802.15.4 radios on nRF platforms in the Contiki-NG operating system. The problem is triggered when parsing radio frames in the `read_frame` function in the `arch/cpu/nrf/net/nrf-ieee-driver-arch.c` module. More specifically, the `read_frame` function performs an incomplete validation of the payload length of the packet, which is a value that can be set by an external party that sends radio packets to a Contiki-NG system. Although the value is validated to be in the range of the MTU length, it is not validated to fit into the given buffer into which the packet will be copied. The problem has been patched in the "develop" branch of Contiki-NG and is expected to be included in subsequent releases. Users are advised to update their develop branch or to update to a subsequent release when available. Users unable to upgrade should consider manually applying the changes in PR #2741.

Contiki-NG es un sistema operativo multiplataforma de código abierto para dispositivos IoT de próxima generación. Existe una escritura fuera de los límites en el controlador para radios IEEE 802.15.4 en plataformas nRF en el sistema operativo Contiki-NG. El problema se desencadena al analizar tramas de radio en la función `read_frame` en el módulo `arch/cpu/nrf/net/nrf-ieee-driver-arch.c`. Más específicamente, la función `read_frame` realiza una validación incompleta de la longitud de el payload del paquete, que es un valor que puede establecer una parte externa que envía paquetes de radio a un sistema Contiki-NG. Aunque se valida que el valor esté en el rango de longitud de MTU, no se valida para que quepa en el búfer dado en el que se copiará el paquete. El problema ha sido solucionado en la rama "desarrollo" de Contiki-NG y se espera que se incluya en versiones posteriores. Se recomienda a los usuarios que actualicen su rama de desarrollo o que actualicen a una versión posterior cuando esté disponible. Los usuarios que no puedan actualizar deben considerar aplicar manualmente los cambios en PR #2741.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-11-13 CVE Reserved
  • 2024-02-14 CVE Published
  • 2024-02-15 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Contiki-ng
Search vendor "Contiki-ng"
Contiki-ng
Search vendor "Contiki-ng" for product "Contiki-ng"
<= 4.9
Search vendor "Contiki-ng" for product "Contiki-ng" and version " <= 4.9"
en
Affected