Vulnerability Details : CVE-2023-33973
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In versions 2023.01 and prior, an attacker can send a crafted frame which is forwarded by the device. During encoding of the packet a NULL pointer dereference occurs. This crashes the device leading to denial of service. A patch is available at pull request 19678. There are no known workarounds.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2023-33973
Probability of exploitation activity in the next 30 days: 0.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 51 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2023-33973
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-33973
-
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2023-33973
-
https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1655
RIOT/gnrc_sixlowpan_iphc.c at f41b4b67b6affca0a8b32edced7f51088696869a · RIOT-OS/RIOT · GitHubProduct
-
https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1067
RIOT/gnrc_sixlowpan_iphc.c at f41b4b67b6affca0a8b32edced7f51088696869a · RIOT-OS/RIOT · GitHubProduct
-
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-r2pv-3jqc-vh7w
NULL pointer dereference during NHC encoding · Advisory · RIOT-OS/RIOT · GitHubVendor Advisory
-
https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1495
RIOT/gnrc_sixlowpan_iphc.c at f41b4b67b6affca0a8b32edced7f51088696869a · RIOT-OS/RIOT · GitHubProduct
-
https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1644
RIOT/gnrc_sixlowpan_iphc.c at f41b4b67b6affca0a8b32edced7f51088696869a · RIOT-OS/RIOT · GitHubProduct
-
https://github.com/RIOT-OS/RIOT/pull/19678
gnrc_sixlowpan_iphc: fix NULL pointer dereference by miri64 · Pull Request #19678 · RIOT-OS/RIOT · GitHubIssue Tracking;Patch
-
https://github.com/RIOT-OS/RIOT/blob/f41b4b67b6affca0a8b32edced7f51088696869a/sys/net/gnrc/network_layer/sixlowpan/iphc/gnrc_sixlowpan_iphc.c#L1511
RIOT/gnrc_sixlowpan_iphc.c at f41b4b67b6affca0a8b32edced7f51088696869a · RIOT-OS/RIOT · GitHubProduct
-
https://github.com/RIOT-OS/RIOT/commit/c9d7863e5664a169035038628029bb07e090c5ff
gnrc_sixlowpan_iphc: fix NULL pointer dereference · RIOT-OS/RIOT@c9d7863 · GitHubPatch
Products affected by CVE-2023-33973
- cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*