Vulnerabilities (CVE)

Filtered by vendor Zephyrproject Subscribe
Total 91 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-0359 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 5.9 MEDIUM
A missing nullptr-check in handle_ra_input can cause a nullptr-deref.
CVE-2022-3806 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 9.8 CRITICAL
Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.
CVE-2022-2993 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 8.6 HIGH
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.
CVE-2022-2741 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 8.2 HIGH
The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).
CVE-2022-1841 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 7.2 HIGH
In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero.
CVE-2022-1042 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 8.2 HIGH
In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.
CVE-2022-1041 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 8.2 HIGH
In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.
CVE-2022-0553 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 6.5 MEDIUM
There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily.
CVE-2021-3966 1 Zephyrproject 1 Zephyr 2024-11-21 N/A 9.6 CRITICAL
usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.
CVE-2021-3861 1 Zephyrproject 1 Zephyr 2024-11-21 7.2 HIGH 8.2 HIGH
The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj
CVE-2021-3835 1 Zephyrproject 1 Zephyr 2024-11-21 5.8 MEDIUM 8.2 HIGH
Buffer overflow in usb device class. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf
CVE-2021-3625 1 Zephyrproject 1 Zephyr 2024-11-21 7.5 HIGH 9.6 CRITICAL
Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363
CVE-2021-3581 1 Zephyrproject 1 Zephyr 2024-11-21 5.8 MEDIUM 7.0 HIGH
Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5
CVE-2021-3510 1 Zephyrproject 1 Zephyr 2024-11-21 5.0 MEDIUM 7.5 HIGH
Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4
CVE-2021-3455 1 Zephyrproject 1 Zephyr 2024-11-21 5.0 MEDIUM 4.3 MEDIUM
Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp
CVE-2021-3454 1 Zephyrproject 1 Zephyr 2024-11-21 5.0 MEDIUM 4.3 MEDIUM
Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3
CVE-2021-3436 1 Zephyrproject 1 Zephyr 2024-11-21 6.4 MEDIUM 4.3 MEDIUM
BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63
CVE-2021-3435 1 Zephyrproject 1 Zephyr 2024-11-21 2.1 LOW 4.0 MEDIUM
Information leakage in le_ecred_conn_req(). Zephyr versions >= v2.4.0 Use of Uninitialized Resource (CWE-908). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh
CVE-2021-3434 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 4.9 MEDIUM
Stack based buffer overflow in le_ecred_conn_req(). Zephyr versions >= v2.5.0 Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm
CVE-2021-3433 1 Zephyrproject 1 Zephyr 2024-11-21 2.1 LOW 4.0 MEDIUM
Invalid channel map in CONNECT_IND results to Deadlock. Zephyr versions >= v2.5.0 Improper Check or Handling of Exceptional Conditions (CWE-703). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp