First published: Mon Aug 14 2023(Updated: )
The Texas Instruments (TI) WiLink WL18xx MCP driver does not limit the number of information elements (IEs) of type XCC_EXT_1_IE_ID or XCC_EXT_2_IE_ID that can be parsed in a management frame. Using a specially crafted frame, a buffer overflow can be triggered that can potentially lead to remote code execution. This affects WILINK8-WIFI-MCP8 version 8.5_SP3 and earlier.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ti Wilink8-wifi-mcp8 | <8.5 | |
Ti Wilink8-wifi-mcp8 | =8.5 | |
Ti Wilink8-wifi-mcp8 | =8.5-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29468 is a vulnerability in the Texas Instruments (TI) WiLink WL18xx MCP driver that allows a buffer overflow to be triggered through specially crafted frames, potentially leading to remote code execution.
CVE-2023-29468 allows an attacker to trigger a buffer overflow in the driver through specially crafted frames, which can potentially result in remote code execution.
CVE-2023-29468 has a severity rating of 9.8 out of 10, indicating it is a critical vulnerability.
Versions 8.5 and 8.5-sp3 of the Texas Instruments (TI) WiLink WL18xx MCP driver are affected by CVE-2023-29468.
To mitigate CVE-2023-29468, it is recommended to apply the latest security updates provided by Texas Instruments. Additionally, users should follow best practices for network security and limit network access to trusted devices only.