First published: Mon Apr 24 2023(Updated: )
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference while encoding a 6LoWPAN IPHC header. The NULL pointer dereference causes a hard fault exception, leading to denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patches manually.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | <2022.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24822 has been classified with a moderate severity due to the potential for remote code execution.
To fix CVE-2023-24822, upgrade to RIOT-OS version 2022.10 or later.
CVE-2023-24822 affects any IoT devices running versions of RIOT-OS prior to 2022.10.
Exploiting CVE-2023-24822 may lead to a NULL pointer dereference, potentially causing denial of service.
You can detect vulnerability to CVE-2023-24822 by checking the version of the RIOT-OS installed on your IoT devices.