First published: Fri Mar 07 2025(Updated: )
A buffer overread can occur in the CPC application when operating in full duplex SPI upon receiving an invalid packet over the SPI interface.
Credit: product-security@silabs.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silicon Labs CPC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12975 has been assessed as having a high severity due to the potential for a buffer overread.
To fix CVE-2024-12975, you should update to the latest version of the Silicon Labs CPC software that addresses the vulnerability.
CVE-2024-12975 is classified as a buffer overread vulnerability affecting the CPC application.
CVE-2024-12975 affects users of the Silicon Labs CPC application specifically when operating in full duplex SPI mode.
Exploitation of CVE-2024-12975 could lead to data leakage or unexpected application behavior due to buffer overreading.