Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

silabs

Source -

NVDADP

BOS Name -

N/A

CNA CVEs -

0

ADP CVEs -

16

CISA CVEs -

0

NVD CVEs -

84
Related CVEsRelated ProductsRelated AssignersReports
91Vulnerabilities found

CVE-2025-2838
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 13.26%
||
7 Day CHG-0.14%
Published-26 Mar, 2025 | 21:16
Updated-08 Aug, 2025 | 01:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs Gecko OS DNS Response Processing Infinite Loop Denial-of-Service Vulnerability

Silicon Labs Gecko OS DNS Response Processing Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of DNS responses. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23392.

Action-Not Available
Vendor-silabsSilicon Labs
Product-gecko_osGecko OS
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2025-2837
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.11%
||
7 Day CHG-0.06%
Published-26 Mar, 2025 | 21:16
Updated-08 Aug, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability

Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HTTP requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23245.

Action-Not Available
Vendor-silabsSilicon Labs
Product-gecko_osGecko OS
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-23937
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-4.3||MEDIUM
EPSS-0.08% / 25.24%
||
7 Day CHG~0.00%
Published-31 Jan, 2025 | 00:07
Updated-01 Jul, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs Gecko OS Debug Interface Format String

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the debug interface. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device.

Action-Not Available
Vendor-silabsSilicon Labs
Product-gecko_osGecko OS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-23973
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.8||HIGH
EPSS-0.16% / 36.92%
||
7 Day CHG~0.00%
Published-30 Jan, 2025 | 23:28
Updated-26 Aug, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs Gecko OS HTTP GET Request Handling Stack-based Buffer Overflow

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.  The specific flaw exists within the handling of HTTP GET requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.

Action-Not Available
Vendor-silabsSilicon Labs
Product-gecko_osGecko OS
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-24731
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.18%
||
7 Day CHG~0.00%
Published-30 Jan, 2025 | 23:25
Updated-27 Aug, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs Gecko OS http_download Stack-based Buffer Overflow

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the http_download command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.

Action-Not Available
Vendor-silabsSilicon Labs
Product-gecko_osGecko OS
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-50931
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.05% / 14.83%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 00:00
Updated-01 Jul, 2025 | 14:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to contain insecure permissions.

Action-Not Available
Vendor-silabsn/a
Product-z-wave_software_development_kitzm5202zm5101n/a
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2024-50928
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 16.51%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 00:00
Updated-01 Jul, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to change the wakeup interval of end devices in controller memory, disrupting the device's communications with the controller.

Action-Not Available
Vendor-silabsn/a
Product-z-wave_software_development_kitefr32zg23a020f512gm40efr32zg23b010f512im48efr32zg14p231f256gm32zgm230sa27hgnefr32zg23b010f512im40efr32zg23b020f512im40efr32zg23b011f512im40efr32zg23b020f512im48efr32zg23a010f512gm48efr32zg23a020f512gm48zgm130s037hgnefr32zg23b021f512im40zgm230sb27hgnefr32zg23a010f512gm40n/a
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2024-50921
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.14%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 00:00
Updated-01 Jul, 2025 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause a Denial of Service (DoS) via repeatedly sending crafted packets to the controller.

Action-Not Available
Vendor-silabsn/a
Product-z-wave_software_development_kitefr32zg23a020f512gm40efr32zg23b010f512im48efr32zg14p231f256gm32zgm230sa27hgnefr32zg23b010f512im40efr32zg23b020f512im40efr32zg23b011f512im40efr32zg23b020f512im48efr32zg23a010f512gm48efr32zg23a020f512gm48zgm130s037hgnefr32zg23b021f512im40zgm230sb27hgnefr32zg23a010f512gm40n/a
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2024-50920
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.03% / 5.79%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 00:00
Updated-01 Jul, 2025 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to create a fake node via supplying crafted packets.

Action-Not Available
Vendor-silabsn/a
Product-z-wave_software_development_kitefr32zg23a020f512gm40efr32zg23b010f512im48efr32zg14p231f256gm32zgm230sa27hgnefr32zg23b010f512im40efr32zg23b020f512im40efr32zg23b011f512im40efr32zg23b020f512im48efr32zg23a010f512gm48efr32zg23a020f512gm48zgm130s037hgnefr32zg23b021f512im40zgm230sb27hgnefr32zg23a010f512gm40n/a
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2024-50930
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 18.31%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 00:00
Updated-01 Jul, 2025 | 14:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows attackers to execute arbitrary code.

Action-Not Available
Vendor-silabsn/a
Product-z-wave_software_development_kitzm5202zm5101n/a
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2024-50929
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.05% / 16.36%
||
7 Day CHG-0.01%
Published-10 Dec, 2024 | 00:00
Updated-01 Jul, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to arbitrarily change the device type in the controller's memory, leading to a Denial of Service (DoS).

Action-Not Available
Vendor-silabsn/a
Product-z-wave_software_development_kitefr32zg23a020f512gm40efr32zg23b010f512im48efr32zg14p231f256gm32zgm230sa27hgnefr32zg23b010f512im40efr32zg23b020f512im40efr32zg23b011f512im40efr32zg23b020f512im48efr32zg23a010f512gm48efr32zg23a020f512gm48zgm130s037hgnefr32zg23b021f512im40zgm230sb27hgnefr32zg23a010f512gm40n/a
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2024-50924
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 5.61%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 00:00
Updated-01 Jul, 2025 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 700 and 800 v7.21.1 allow attackers to cause disrupt communications between the controller and the device itself via repeatedly sending crafted packets to the controller.

Action-Not Available
Vendor-silabsn/a
Product-z-wave_software_development_kitefr32zg23a020f512gm40efr32zg23b010f512im48efr32zg14p231f256gm32zgm230sa27hgnefr32zg23b010f512im40efr32zg23b020f512im40efr32zg23b011f512im40efr32zg23b020f512im48efr32zg23a010f512gm48efr32zg23a020f512gm48zgm130s037hgnefr32zg23b021f512im40zgm230sb27hgnefr32zg23a010f512gm40n/a
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2024-23938
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-8.8||HIGH
EPSS-1.83% / 82.17%
||
7 Day CHG~0.00%
Published-28 Sep, 2024 | 06:06
Updated-03 Oct, 2024 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability

Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the debug interface. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23184

Action-Not Available
Vendor-silabsSilicon Labssilabs
Product-gecko_osGecko OSgecko_os
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-41093
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-3.1||LOW
EPSS-0.15% / 35.96%
||
7 Day CHG+0.10%
Published-12 Jul, 2024 | 19:56
Updated-10 Sep, 2024 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Loss of confidentiality due to potential race condition in Bluetooth controller Connection_Handle reuse

Use After Free vulnerability in Silicon Labs Bluetooth SDK on 32 bit, ARM may allow an attacker with precise timing capabilities to intercept a small number of packets intended for a recipient that has left the network.This issue affects Silabs Bluetooth SDK: through 8.0.0.

Action-Not Available
Vendor-silabsSilicon Labs
Product-bluetooth_low_energy_software_development_kitSimplicity SDK
CWE ID-CWE-416
Use After Free
CVE-2024-3017
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 24.18%
||
7 Day CHG~0.00%
Published-27 Jun, 2024 | 18:35
Updated-01 Aug, 2024 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service in multi-protocol gateway - Zigbee + Thread

In a Silicon Labs  multi-protocol gateway, a corrupt pointer to buffered data on a multi-protocol radio co-processor (RCP) causes the OpenThread Border Router(OTBR) application task running on the host platform to crash, allowing an attacker to cause a temporary denial-of-service.

Action-Not Available
Vendor-silabs.comsilabs
Product-SiSDKsisdk
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-3043
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.5||HIGH
EPSS-0.13% / 33.46%
||
7 Day CHG~0.00%
Published-27 Jun, 2024 | 18:17
Updated-01 Aug, 2024 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Zigbee co-ordinator realignment packet may lead to denial of service

An unauthenticated IEEE 802.15.4 'co-ordinator realignment' packet can be used to force Zigbee nodes to change their network identifier (pan ID), leading to a denial of service. This packet type is not useful in production and should be used only for PHY qualification.

Action-Not Available
Vendor-silabs.comsilabs
Product-Ember ZNet SDKemberznet_sdk
CWE ID-CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CVE-2024-22472
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-8.1||HIGH
EPSS-5.76% / 90.12%
||
7 Day CHG~0.00%
Published-07 May, 2024 | 05:17
Updated-01 Aug, 2024 | 22:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Long S0 frames received by 500 series Z-Wave devices may cause buffer overflow

A buffer Overflow vulnerability in Silicon Labs 500 Series Z-Wave devices may allow Denial of Service, and potential Remote Code execution This issue affects all versions of Silicon Labs 500 Series SDK prior to v6.85.2 running on Silicon Labs 500 series Z-wave devices.

Action-Not Available
Vendor-Silicon Labssilabs
Product-Z-Wave SDKz-wave_software_development_kit
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-3052
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.19%
||
7 Day CHG~0.00%
Published-26 Apr, 2024 | 21:27
Updated-05 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Z/IP Gateway S2 Nonce Get Denial of Service Vulnerability

Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway.

Action-Not Available
Vendor-silabs.comsilabs
Product-Z/IP Gateway SDKz\/ip_gateway_sdk
CWE ID-CWE-248
Uncaught Exception
CVE-2024-3051
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.5||HIGH
EPSS-0.13% / 32.83%
||
7 Day CHG~0.00%
Published-26 Apr, 2024 | 21:26
Updated-27 Sep, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Z/IP Gateway Device Reset Locally Denial of Service Vulnerability

Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.

Action-Not Available
Vendor-silabs.comsilabs
Product-Z/IP Gateway SDKz\/ip_gateway_sdk
CWE ID-CWE-419
Unprotected Primary Channel
CWE ID-CWE-248
Uncaught Exception
CVE-2023-51391
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.5||HIGH
EPSS-0.24% / 47.22%
||
7 Day CHG~0.00%
Published-16 Apr, 2024 | 19:19
Updated-13 Feb, 2025 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Micrium OS Network uC-HTTP server header parsing invalid pointer dereference vulnerability

A bug in Micrium OS Network HTTP Server permits an invalid pointer dereference during header processing - potentially allowing a device crash and Denial of Service.

Action-Not Available
Vendor-silabs.comsilabs
Product-gecko_software_development_kit
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2023-51395
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-8.8||HIGH
EPSS-0.06% / 19.20%
||
7 Day CHG~0.00%
Published-07 Mar, 2024 | 04:50
Updated-25 Sep, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Z-Wave S0 Decryption Vulnerability in End Devices

The vulnerability described by CVE-2023-0972 has been additionally discovered in Silicon Labs Z-Wave end devices. This vulnerability may allow an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.

Action-Not Available
Vendor-Silicon Labssilabs
Product-Z-Wave SDKz-wave_software_development_kit
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-51393
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 14.49%
||
7 Day CHG~0.00%
Published-23 Feb, 2024 | 19:14
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential DoS due to BusFault and Assert in Ember ZNet legacy packet buffer

Due to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network.

Action-Not Available
Vendor-silabssilabs.comsilabs
Product-emberznetEmber ZNet SDKemberznet_sdk
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2023-51394
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 14.54%
||
7 Day CHG~0.00%
Published-23 Feb, 2024 | 19:13
Updated-12 Feb, 2025 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential DoS for EFR32xxx parts in high traffic environments due to null buffer dereference / crash

High traffic environments may result in NULL Pointer Dereference vulnerability in Silicon Labs's Ember ZNet SDK before v7.4.0, causing a system crash.

Action-Not Available
Vendor-silabssilabs.comsilabs
Product-emberznetEmber ZNet SDKemberznet_sdk
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2023-51392
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.2||MEDIUM
EPSS-0.03% / 7.74%
||
7 Day CHG~0.00%
Published-23 Feb, 2024 | 16:12
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs EFR32xxx parts with classic key storage do not use hardware accelerated AES-CCM

Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks.

Action-Not Available
Vendor-silabssilabs.com
Product-emberznetEmber ZNet SDK
CWE ID-CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2023-6640
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.88%
||
7 Day CHG~0.00%
Published-21 Feb, 2024 | 19:56
Updated-12 Feb, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs PC Controller v5.54.0 and Earlier Denial of Service Vulnerability

Malformed S2 Nonce Get Command Class packets can be sent to crash PC Controller v5.54.0 and earlier.

Action-Not Available
Vendor-silabssilabs.com
Product-z-wave_pc-based_controllerPC Controller
CWE ID-CWE-248
Uncaught Exception
CVE-2023-6533
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 10.97%
||
7 Day CHG~0.00%
Published-21 Feb, 2024 | 19:55
Updated-12 Feb, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs PC Controller Denial of Service Vulnerability

Malformed Device Reset Locally Command Class packets can be sent to the controller, causing the controller to assume the end device has left the network. After this, frames sent by the end device will not be acknowledged by the controller. This vulnerability exists in PC Controller v5.54.0, and earlier.

Action-Not Available
Vendor-silabssilabs.com
Product-z-wave_pc-based_controllerPC Controller
CWE ID-CWE-248
Uncaught Exception
CWE ID-CWE-419
Unprotected Primary Channel
CVE-2024-22473
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 20.82%
||
7 Day CHG~0.00%
Published-21 Feb, 2024 | 18:13
Updated-12 Feb, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Uninitialized TRNG used for ECDSA after EM2/EM3 sleep for VSE devices

TRNG is used before initialization by ECDSA signing driver when exiting EM2/EM3 on Virtual Secure Vault (VSE) devices. This defect may allow Signature Spoofing by Key Recreation.This issue affects Gecko SDK through v4.4.0.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-1279
Cryptographic Operations are run Before Supporting Units are Ready
CWE ID-CWE-331
Insufficient Entropy
CVE-2023-45318
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-10||CRITICAL
EPSS-0.41% / 60.44%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 14:45
Updated-24 Apr, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP git commit 80d4004. A specially crafted network packet can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.

Action-Not Available
Vendor-weston-embeddedsilabsSilicon LabsWeston Embeddedweston-embeddedsilabs
Product-gecko_software_development_kituc-httpuC-HTTPGecko Platformuc-httpgecko_platform
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-0240
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.44%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 20:30
Updated-05 Feb, 2025 | 22:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Silicon Labs EFR32 Bluetooth stack denial of service when sending notifications to multiple clients

A memory leak in the Silicon Labs' Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2023-6874
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.49%
||
7 Day CHG~0.00%
Published-05 Feb, 2024 | 17:39
Updated-25 Sep, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Zigbee Unauthenticated DoS via NWK Sequence number manipulation

Prior to v7.4.0, Ember ZNet is vulnerable to a denial of service attack through manipulation of the NWK sequence number

Action-Not Available
Vendor-silabssilabs.comsilabs
Product-gecko_software_development_kitGSDKgecko_software_development_kit
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2023-6387
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.5||HIGH
EPSS-3.20% / 86.48%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 15:18
Updated-15 May, 2025 | 19:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect buffer parsing in Bluetooth LE sample code may lead to buffer overflow

A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2023-5138
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 13.61%
||
7 Day CHG~0.00%
Published-03 Jan, 2024 | 22:31
Updated-03 Jun, 2025 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glitch detection not active by default in Silicon Labs Secure Vault High devices

Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-1319
Improper Protection against Electromagnetic Fault Injection (EM-FI)
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2023-4280
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.3||CRITICAL
EPSS-0.07% / 22.73%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 16:52
Updated-13 Jun, 2025 | 19:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unvalidated input in Silicon Labs TrustZone implementation leads to accessing Trusted memory region

An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-41097
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-4.6||MEDIUM
EPSS-0.11% / 29.41%
||
7 Day CHG~0.00%
Published-21 Dec, 2023 | 20:33
Updated-23 Apr, 2025 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential Timing vulnerability in CBC PKCS7 padding calculations

An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-4020
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9||CRITICAL
EPSS-0.22% / 44.51%
||
7 Day CHG~0.00%
Published-15 Dec, 2023 | 20:37
Updated-26 Sep, 2024 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unvalidated input in Silicon Labs PSA Attestation service leads to secure memory access from non-secure memory

An unvalidated input in a library function responsible for communicating between secure and non-secure memory in Silicon Labs TrustZone implementation allows reading/writing of memory in the secure region of memory from the non-secure region of memory.

Action-Not Available
Vendor-silabssilabs.com
Product-gecko_software_development_kitGSDK
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-5310
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.7||MEDIUM
EPSS-0.08% / 24.36%
||
7 Day CHG~0.00%
Published-15 Dec, 2023 | 16:05
Updated-08 Oct, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Z-Wave Denial of Service caused by Stream of Packets

A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.

Action-Not Available
Vendor-silabssilabs.com
Product-z-wave_long_range_800z-wave_long_range_700z-wave_software_development_kitGecko SDK
CWE ID-CWE-248
Uncaught Exception
CVE-2023-4489
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.4||MEDIUM
EPSS-0.69% / 70.87%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 23:00
Updated-21 May, 2025 | 14:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Z/IP Gateway Use of Uninitialized PRNG when Generating S0 Encryption Key

The first S0 encryption key is generated with an uninitialized PRNG in Z/IP Gateway products running Silicon Labs Z/IP Gateway SDK v7.18.3 and earlier. This makes the first S0 key generated at startup predictable, potentially allowing network key prediction and unauthorized S0 network access.

Action-Not Available
Vendor-silabssilabs.com
Product-z\/ip_gateway_sdkZ/IP Gateway SDK
CWE ID-CWE-1279
Cryptographic Operations are run Before Supporting Units are Ready
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2023-24585
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.7||HIGH
EPSS-0.23% / 45.82%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 09:14
Updated-02 Aug, 2024 | 11:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.

Action-Not Available
Vendor-weston-embeddedsilabsSilicon LabsWeston Embedded
Product-gecko_software_development_kituc-httpcesium_netGecko PlatformCesium NETuC-HTTP
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-25181
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9||CRITICAL
EPSS-0.22% / 44.84%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 09:14
Updated-02 Aug, 2024 | 11:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.

Action-Not Available
Vendor-weston-embeddedsilabsSilicon LabsWeston Embeddedweston-embeddedsilabs
Product-gecko_software_development_kituc-httpcesium_netGecko PlatformCesium NETuC-HTTPgecko_software_development_kituc-httpcesium_net
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28391
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9||CRITICAL
EPSS-0.27% / 50.02%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 09:14
Updated-03 Oct, 2024 | 14:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

Action-Not Available
Vendor-weston-embeddedsilabsSilicon LabsWeston Embeddedweston-embeddedsilabs
Product-gecko_software_development_kituc-httpcesium_netGecko PlatformCesium NETuC-HTTPgecko_platformuc-httpcesium_net
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-27882
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9||CRITICAL
EPSS-0.29% / 51.88%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 09:14
Updated-03 Sep, 2024 | 14:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

Action-Not Available
Vendor-weston-embeddedsilabsSilicon LabsWeston Embedded
Product-gecko_software_development_kituc-httpcesium_netGecko PlatformCesium NETuC-HTTP
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28379
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9||CRITICAL
EPSS-0.22% / 44.42%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 09:14
Updated-03 Sep, 2024 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

Action-Not Available
Vendor-weston-embeddedsilabsSilicon LabsWeston Embedded
Product-gecko_software_development_kituc-httpcesium_netGecko PlatformCesium NETuC-HTTP
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-31247
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9||CRITICAL
EPSS-0.28% / 50.96%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 09:14
Updated-03 Sep, 2024 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

Action-Not Available
Vendor-weston-embeddedsilabsSilicon LabsWeston Embedded
Product-gecko_software_development_kituc-httpcesium_netGecko PlatformCesium NETuC-HTTP
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-41096
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 2.98%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 13:10
Updated-25 Sep, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keys Stored in Plaintext on Secure Vault High for Silabs Ember ZNet devices

Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash. This issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier.

Action-Not Available
Vendor-silabssilabs.com
Product-emberznet_sdkEmber ZNet SDK
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2023-41095
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 8.75%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 13:10
Updated-25 Sep, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keys Stored in Plaintext on Secure Vault High for Silabs OpenThread devices

Missing Encryption of Security Keys vulnerability in Silicon Labs OpenThread SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash. This issue affects Silicon Labs OpenThread SDK: 2.3.1 and earlier.

Action-Not Available
Vendor-silabssilabs.com
Product-openthread_sdkOpenThread SDK
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2023-3487
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.7||HIGH
EPSS-0.27% / 50.10%
||
7 Day CHG~0.00%
Published-20 Oct, 2023 | 14:12
Updated-25 Sep, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in Silicon Labs Gecko Bootloader leads to unbounded memory access

An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.

Action-Not Available
Vendor-silabssilabs.comsilabs
Product-gecko_bootloaderGSDKgecko_bootloader
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-27630
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 40.34%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 00:00
Updated-19 Sep, 2024 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Silicon Labs uC/TCP-IP 3.6.0, TCP ISNs are improperly random.

Action-Not Available
Vendor-silabsn/a
Product-uc\/tcp-ipn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-41094
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-10||CRITICAL
EPSS-0.08% / 24.47%
||
7 Day CHG~0.00%
Published-04 Oct, 2023 | 20:01
Updated-26 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Touchlink authentication bypass due to packets processed after timeout or out of range in Ember ZNet

TouchLink packets processed after timeout or out of range due to Operation on a Resource after Expiration and Missing Release of Resource after Effective Lifetime may allow a device to be added outside of valid TouchLink range or pairing duration This issue affects Ember ZNet 7.1.x from 7.1.3 through 7.1.5; 7.2.x from 7.2.0 through 7.2.3; Version 7.3 and later are unaffected

Action-Not Available
Vendor-silabsSilicon Labs
Product-emberznetEmber ZNet
CWE ID-CWE-940
Improper Verification of Source of a Communication Channel
CWE ID-CWE-672
Operation on a Resource after Expiration or Release
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2023-3024
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-5.9||MEDIUM
EPSS-0.08% / 24.33%
||
7 Day CHG~0.00%
Published-29 Sep, 2023 | 16:32
Updated-25 Sep, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth LE segmented 'prepare write response' packet may lead to out-of-bounds memory access

Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.

Action-Not Available
Vendor-silabssilabs.comQualcomm Technologies, Inc.
Product-wsa8830wcd9385wsa8835wcd9380wcd9375gecko_software_development_kitcsrb31024wcd9370aqt1000GSDK
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-4041
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 12.56%
||
7 Day CHG~0.00%
Published-23 Aug, 2023 | 04:09
Updated-03 Oct, 2024 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Second Stage Gecko Bootloader GBL Parser Buffer Overrun Vulnerability

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules) allows Code Injection, Authentication Bypass.This issue affects "Standalone" and "Application" versions of Gecko Bootloader.

Action-Not Available
Vendor-silabsSilicon Labssilabs
Product-gecko_bootloaderGecko Bootloadergecko_bootloader
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-913
Improper Control of Dynamically-Managed Code Resources
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-494
Download of Code Without Integrity Check
  • Previous
  • 1
  • 2
  • Next