CVE-2023-4424
NixOS vulnerability analysis and mitigation

Overview

A vulnerability identified as CVE-2023-4424 was discovered in Zephyr OS's Bluetooth Low Energy (BLE) implementation. The vulnerability, disclosed on November 21, 2023, affects Zephyr OS versions up to and including 3.4.0. The issue resides in the BLE advertising packet processing functionality, where a malformed advertising packet can trigger a buffer overflow condition (Zephyr Advisory).

Technical details

The vulnerability exists in the le_advertising_report function within /subsys/bluetooth/controller/hci/hci.c. The issue stems from improper processing of advertising packets when copying data. The vulnerability involves an integer overflow where the value of adv->len is 1 and BDADDR_SIZE is 6, resulting in a data_len value of 251 due to unsigned integer arithmetic. This leads to a buffer overflow condition when copying data to adv_info->data[0]. Similar vulnerable code patterns were identified in le_mesh_scan_report and le_ext_adv_legacy_report functions. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 HIGH (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).

Impact

The vulnerability can lead to Denial of Service (DoS) conditions or potentially Remote Code Execution (RCE) when exploited. The impact is particularly severe as it affects the BLE communication stack, a critical component in IoT and embedded devices. The high CVSS score reflects the potential for complete compromise of system confidentiality, integrity, and availability (Zephyr Advisory).

Mitigation and workarounds

Several patches have been developed to address this vulnerability across different versions of Zephyr OS. These include patches for the main branch (#61651), version 2.7 (#61694), version 3.3 (#61695), and version 3.4 (#61696). Users are advised to update their systems with the appropriate patch (Zephyr Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • rhel10::firefox-flatpak
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • rhel10::thunderbird-flatpak
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management