First published: Tue May 30 2023(Updated: )
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device to trigger a NULL pointer dereference leading to denial of service. This issue is fixed in version 2023.04. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | <2023.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24825 has a high severity rating due to its potential to cause denial of service.
To address CVE-2023-24825, upgrade to RIOT-OS version 2023.04 or later.
CVE-2023-24825 involves an attacker sending a crafted 6LoWPAN frame to trigger a NULL pointer dereference.
CVE-2023-24825 affects RIOT-OS versions prior to 2023.04.
The consequence of CVE-2023-24825 is a denial of service that can disrupt the operation of IoT devices running vulnerable versions of RIOT-OS.