First published: Tue May 30 2023(Updated: )
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send a crafted frame which is forwarded by the device. During encoding of the packet a NULL pointer dereference occurs. This crashes the device leading to denial of service. A patch is available at pull request 19678. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | <=2023.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33973 has been classified as a high severity vulnerability due to its potential exploitation by attackers.
To fix CVE-2023-33973, upgrade to a version of RIOT-OS later than 2023.01.
CVE-2023-33973 allows attackers to exploit a NULL pointer dereference in the network stack when processing crafted 6LoWPAN frames.
Versions of RIOT-OS up to and including 2023.01 are affected by CVE-2023-33973.
Yes, CVE-2023-33973 can be exploited remotely as it involves network packet processing.