Buffer Overflow and Integer Overflow Vulnerability in MBed OS by Arm
CVE-2024-48982

7.5HIGH

Key Information:

Vendor
Arm
Status
Vendor
CVE Published:
20 November 2024

Summary

In MBed OS version 6.16.0, a vulnerability exists in the hci parsing software that improperly assumes the length of certain hci packets will always be three bytes or greater. When a packet length less than three is supplied, it triggers a buffer overflow due to insufficient validation of the packet length. Additionally, the vulnerability allows for an integer overflow by supplying excessively large length values, as the system increases the received length for accounting additional data. This flaw can be easily exploited for denial of service purposes, although it does not definitively lead to a complete system failure. Furthermore, the dynamically allocated buffer limits the extent of potential exploitation.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.