First published: Wed Mar 26 2025(Updated: )
Silicon Labs Gecko OS DNS Response Processing Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of DNS responses. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23392.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
SiLabs Gecko SDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2838 is classified as a denial-of-service vulnerability that can impact system availability.
To mitigate CVE-2025-2838, it is recommended to apply the latest security patches provided by Silicon Labs for Gecko OS.
CVE-2025-2838 affects installations of Silicon Labs Gecko OS that are exposed to network-adjacent attackers.
Yes, CVE-2025-2838 can be exploited by network-adjacent attackers without the need for authentication.
The impact of CVE-2025-2838 is a denial-of-service condition, which can render affected systems unresponsive.