Due to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://community.silabs.com/068Vm000001NaAM |
![]() ![]() |
History
Wed, 12 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Silabs emberznet
|
|
CPEs | cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:* | |
Vendors & Products |
Silabs emberznet
|
Wed, 25 Sep 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 |
Wed, 25 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Silabs
Silabs emberznet Sdk |
|
CPEs | cpe:2.3:a:silabs:emberznet_sdk:-:*:*:*:*:*:*:* | |
Vendors & Products |
Silabs
Silabs emberznet Sdk |
|
Metrics |
ssvc
|
Wed, 25 Sep 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network. | Due to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network. |

Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2024-09-25T15:59:08.691Z
Reserved: 2023-12-18T20:56:24.812Z
Link: CVE-2023-51393

Updated: 2024-08-02T22:32:09.194Z

Status : Analyzed
Published: 2024-02-23T20:15:51.687
Modified: 2025-02-12T18:49:22.437
Link: CVE-2023-51393

No data.