First published: Fri Oct 13 2023(Updated: )
Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.
Credit: vulnerabilities@zephyrproject.org vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
<=3.4.0 | ||
Zephyrproject Zephyr | <=3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-4257.
The severity of CVE-2023-4257 is critical with a CVSS score of 9.8.
The affected software is Zephyrproject Zephyr up to version 3.4.0.
This vulnerability allows for buffer overflows, which can lead to potential code execution or denial of service attacks.
Yes, a fix is available. Please refer to the vendor's advisory for more information and apply the necessary patches or updates.