
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability identified as CVE-2023-0396 was discovered in the Zephyr Project's Bluetooth implementation. The vulnerability, disclosed on January 19, 2023, involves buffer overreads in functions that process HCI (Host Controller Interface) command responses when interacting with malicious or defective Bluetooth controllers (Zephyr Advisory).
The vulnerability stems from insufficient buffer length verification in functions utilizing bthcicmdsendsync to receive HCI command responses. While checks are performed for the bthcievtcmdcomplete header size, the implementation fails to verify if the response length is adequate before casting to the expected response struct. This affects multiple functions including commoninit and leinit. The issue is particularly evident in functions like hcilereadmaxdatalen where no size check is performed before casting into bthcirplereadmaxdatalen (Zephyr Advisory).
The vulnerability can potentially lead to information leakage and denial of service conditions when exploited. The CVSS v3.1 base score is 6.4 (Moderate), with attack vector being Physical, low attack complexity, no privileges required, and no user interaction needed (Zephyr Advisory).
Two potential fixes have been proposed: 1) Adding a mandatory minsize argument to bthcicmdsendsync similar to the handler->minlen check in handleeventcommon, or 2) Verifying the buffer length on each call side of bthcicmdsendsync before casting (Zephyr Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."