7.5
CWE
119 120
Advisory Published
Updated

CVE-2024-48981: Buffer Overflow

First published: Wed Nov 20 2024(Updated: )

An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet header by looking up the identifying first byte and matching it against a table of possible lengths. The initial parsing function, hciTrSerialRxIncoming does not drop packets with invalid identifiers but also does not set a safe default for the length of unknown packets' headers, leading to a buffer overflow. This can be leveraged into an arbitrary write by an attacker. It is possible to overwrite the pointer to a not-yet-allocated buffer that is supposed to receive the contents of the packet body. One can then overwrite the state variable used by the function to determine which state of packet parsing is currently occurring. Because the buffer is allocated when the last byte of the header has been copied, the combination of having a bad header length variable that will never match the counter variable and being able to overwrite the state variable with the resulting buffer overflow can be used to advance the function to the next step while skipping the buffer allocation and resulting pointer write. The next 16 bytes from the packet body are then written wherever the corrupted data pointer is pointing.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Arm Mbed OS=6.16.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-48981?

    The severity of CVE-2024-48981 is classified as critical due to potential impact on data integrity and availability.

  • How do I fix CVE-2024-48981?

    To fix CVE-2024-48981, update the MBed OS to version 6.16.1 or apply the recommended patches from the official repository.

  • What systems are affected by CVE-2024-48981?

    CVE-2024-48981 affects ARM MBed OS version 6.16.0.

  • What type of attack can exploit CVE-2024-48981?

    CVE-2024-48981 can be exploited through specially crafted HCI packets leading to buffer overflow.

  • When was CVE-2024-48981 reported?

    CVE-2024-48981 was reported in the context of MBed OS version 6.16.0.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203