
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-4257 affects the Zephyr Real-Time Operating System (RTOS) versions up to 3.4.0. The vulnerability involves unchecked user input length in the WiFi shell module, specifically in the file /subsys/net/l2/wifi/wifi_shell.c. The issue was discovered and reported by security researchers, with the initial disclosure made on October 13, 2023 (Zephyr Advisory).
The vulnerability stems from two instances of unchecked user input length in the WiFi shell module. The first instance involves the SSID parameter where the length should be maximum 32 characters but remains unchecked. The second instance relates to the PSK parameter where the length should be between 8 and 64 characters but is also unchecked. The vulnerability has received a CVSS v3.1 base score of 7.6 HIGH from the Zephyr Project, with a vector string of CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H (NVD).
The unchecked inputs may lead to buffer overflows in other locations within the system. The potential impact ranges from denial of service to arbitrary code execution, depending on the exploitation scenario (Zephyr Advisory).
The vulnerability has been fixed in the main branch (v3.5 development cycle) through pull request #60537 and in version 3.4 through pull request #61383. Users are advised to update to the patched versions when available (Zephyr Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."