
Cloud Vulnerability DB
A community-led vulnerabilities database
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a vulnerability (CVE-2023-33974) in its network stack's 6LoWPAN frame processing capability. The vulnerability was discovered and disclosed in May 2023, affecting RIOT-OS versions 2023.01 and prior. The vulnerability allows an attacker to send multiple crafted frames to trigger a race condition in the device (GitHub Advisory).
The vulnerability is a race condition (CWE-362) in the SFR (Selective Fragment Recovery) timeout mechanism. The issue occurs in the ARQ (Automatic Repeat Request) scheduler when processing 6LoWPAN frames. The race condition is triggered through a specific sequence of events involving fragment acknowledgment handling and timer scheduling. The vulnerability has a CVSS v3.1 base score of 7.5 HIGH, with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (GitHub Advisory, NVD).
When exploited, the race condition invalidates assumptions about the program state and leads to an invalid memory access, resulting in a denial of service condition. The vulnerability affects the availability of the system without compromising confidentiality or integrity (GitHub Advisory).
The vulnerability has been patched in pull request 19679. The fix addresses the race condition in the ARQ scheduler by implementing proper timer scheduling checks (GitHub PR). No workarounds are available for unpatched systems (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."