First published: Tue May 30 2023(Updated: )
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send crafted frames to the device to trigger the usage of an uninitialized object leading to denial of service. This issue is fixed in version 2023.04. As a workaround, disable fragment forwarding or SFR.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | <2023.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24826 has been classified as a high severity vulnerability due to its potential to cause denial-of-service conditions.
To mitigate CVE-2023-24826, upgrade to RIOT-OS version 2023.04 or later.
CVE-2023-24826 affects all versions of RIOT-OS prior to 2023.04 that utilize the 6LoWPAN network stack.
CVE-2023-24826 is associated with network-based attacks where crafted 6LoWPAN frames can be sent to the device.
Exploiting CVE-2023-24826 can lead to denial of service by triggering the usage of uninitialized objects in the network stack.