7.5
CWE
191 787 119
Advisory Published
Updated

CVE-2023-24817: RIOT-OS vulnerable to Out of Bounds write in routing with SRH

First published: Tue May 30 2023(Updated: )

RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device resulting in an integer underflow and out of bounds access in the packet buffer. Triggering the access at the right time will corrupt other packets or the allocator metadata. Corrupting a pointer will lead to denial of service. This issue is fixed in version 2023.04. As a workaround, disable SRH in the network stack.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Riot-os Riot<2023.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-24817?

    CVE-2023-24817 has a severity rating that indicates a critical risk due to potential integer underflow and out of bounds access.

  • How do I fix CVE-2023-24817?

    To mitigate CVE-2023-24817, upgrade to RIOT version 2023.04 or later.

  • What devices are affected by CVE-2023-24817?

    CVE-2023-24817 affects all versions of RIOT-OS prior to 2023.04 that utilize the network stack for processing 6LoWPAN frames.

  • What type of exploit is possible with CVE-2023-24817?

    CVE-2023-24817 can be exploited by sending a crafted frame to the device, leading to an integer underflow issue.

  • Is there a workaround for CVE-2023-24817 if I cannot upgrade?

    Currently, there is no documented workaround for CVE-2023-24817, and upgrading is the recommended action.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203