First published: Tue May 30 2023(Updated: )
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send multiple crafted frames to the device to trigger a race condition. The race condition invalidates assumptions about the program state and leads to an invalid memory access resulting in denial of service. This issue is patched in pull request 19679. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | <=2023.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33974 has a high severity rating due to its potential for exploitation via a race condition that affects the network stack of RIOT-OS.
To fix CVE-2023-33974, update RIOT-OS to a version later than 2023.01 that addresses this race condition.
CVE-2023-33974 affects all versions of RIOT-OS up to and including 2023.01.
Exploiting CVE-2023-33974 can lead to denial-of-service conditions and potential unauthorized access to IoT devices.
IoT device manufacturers and users utilizing affected versions of RIOT-OS are at risk from CVE-2023-33974.