Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
silabs gecko software development kit vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-6874
Prior to v7.4.0, Ember ZNet is vulnerable to a denial of service attack through manipulation of the NWK sequence number
Silabs Gecko Software Development Kit
NA
CVE-2023-6387
A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution
Silabs Gecko Software Development Kit
NA
CVE-2023-5138
Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B.
Silabs Gecko Software Development Kit
NA
CVE-2023-4280
An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and previous versions of the Gecko SDK allows an malicious user to access the trusted region of memory from the untrusted region.
Silabs Gecko Software Development Kit
NA
CVE-2023-41097
An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: up to and including 4.4.0.
Silabs Gecko Software Development Kit
NA
CVE-2023-4020
An unvalidated input in a library function responsible for communicating between secure and non-secure memory in Silicon Labs TrustZone implementation allows reading/writing of memory in the secure region of memory from the non-secure region of memory.
Silabs Gecko Software Development Kit
NA
CVE-2023-27882
A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
Weston-embedded Cesium Net 3.07.01
Weston-embedded Uc-http 3.01.01
Silabs Gecko Software Development Kit 4.3.1
NA
CVE-2023-31247
A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
Weston-embedded Cesium Net 3.07.01
Weston-embedded Uc-http 3.01.01
Silabs Gecko Software Development Kit 4.3.1
NA
CVE-2023-24585
An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
Weston-embedded Cesium Net 3.07.01
Weston-embedded Uc-http 3.01.01
Silabs Gecko Software Development Kit 4.3.1
NA
CVE-2023-28379
A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
Weston-embedded Cesium Net 3.07.01
Weston-embedded Uc-http 3.01.01
Silabs Gecko Software Development Kit 4.3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »