First published: Fri Mar 15 2024(Updated: )
Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <3.6.0 | |
Zephyr Project Zephyr OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7060 is classified as a medium-severity vulnerability.
To fix CVE-2023-7060, update Zephyr OS to version 3.6.0 or later.
CVE-2023-7060 affects versions of Zephyr OS prior to 3.6.0, specifically in the IP packet handling implementation.
The risk associated with CVE-2023-7060 includes potential unauthorized access through improperly handled IP packets.
Currently, there are no official workarounds for CVE-2023-7060 other than applying the patch by upgrading the software.