Vulnerability Details : CVE-2023-4258
In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee.
Products affected by CVE-2023-4258
- cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-4258
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-4258
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
3.9
|
4.0
|
Zephyr Project |
CWE ids for CVE-2023-4258
-
The code does not function according to its published specifications, potentially leading to incorrect usage.Assigned by: vulnerabilities@zephyrproject.org (Secondary)
References for CVE-2023-4258
-
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-m34c-cp63-rwh7
bt: mesh: vulnerability in provisioning protocol implementation on provisionee side · Advisory · zephyrproject-rtos/zephyr · GitHubPatch;Third Party Advisory
Jump to