RIOT-OS vulnerable to Packet Type Confusion during IPHC send
CVE-2023-24823
What is CVE-2023-24823?
RIOT-OS, designed for Internet of Things devices, features a vulnerability in its network stack that processes 6LoWPAN frames. An attacker can exploit this vulnerability by sending a specially crafted frame, leading to a type confusion issue between the IPv6 extension headers and a UDP header. This design flaw occurs during the encoding process of the 6LoWPAN IPHC header, resulting in an out-of-bounds write in the packet buffer. Exploiting this issue can corrupt packets and metadata, potentially causing a denial of service. A determined attacker can manipulate the allocator metadata to write arbitrary data to specific locations, potentially enabling arbitrary code execution. To mitigate this risk, users are advised to upgrade to version 2022.10 or manually apply the relevant patches.
Affected Version(s)
RIOT < 2022.10