
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-0359 is a vulnerability discovered in the Zephyr Real-Time Operating System (RTOS) affecting versions 3.2 and earlier. The vulnerability stems from a missing nullptr check in the handlerainput function, which was disclosed on July 10, 2023. This security flaw specifically impacts the IPv6 networking implementation in the Zephyr RTOS (GitHub Advisory).
The vulnerability occurs in the handlerainput function where a missing nullptr check for netpktiface(pkt)->config.ip.ipv6 can lead to a null pointer dereference. The issue specifically arises during the reachabletime update process, where the code fails to verify the existence of the IPv6 interface pointer before calling netifipv6setreachabletime. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Moderate), with attack vector: Network, attack complexity: High, and no privileges required (GitHub Advisory).
The exploitation of this vulnerability can potentially cause a Denial of Service (DoS) condition in affected systems. This impact has been confirmed through fuzzing tests on Zephyr version 2.2.0, although reproduction tests on current versions were not conducted (GitHub Advisory).
The proposed fix involves adding a nullptr check in netifipv6setreachabletime or implementing a wrapper function with a check similar to netifipv6getreachabletime or netifipv6setbasereachabletime (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."