CVE-2024-23973

8.8 HIGH
Published: January 31, 2025 Modified: September 30, 2025

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.  The specific flaw exists within the handling of HTTP GET requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://community.silabs.com/a45Vm0000000Atp
Source: ics-cert@hq.dhs.gov
Permissions Required
https://www.zerodayinitiative.com/advisories/ZDI-24-873/
Source: ics-cert@hq.dhs.gov
Third Party Advisory

2 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
0.2%
43th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

silabs