
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in the Zephyr Real-Time Operating System's Bluetooth Classic implementation, tracked as CVE-2024-6135. The vulnerability involves multiple missing buffer length checks in the BT:Classic component. This issue affects Zephyr versions up to and including 3.6.0 (Zephyr Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 7.6 (HIGH) by the Zephyr Project, with a vector string of CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H. The National Vulnerability Database (NVD) has assessed it with a slightly lower CVSS score of 6.5 (MEDIUM) with vector string CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vulnerability is classified under CWE-369 (Divide By Zero) and CWE-122 (Heap-based Buffer Overflow) (NVD).
The vulnerability can lead to system crashes through division by zero operations and potential heap-based buffer overflows. This can result in denial of service conditions and possible system instability in affected Zephyr implementations (NVD).
Currently, there are no official patches available for this vulnerability. Users of Zephyr versions up to 3.6.0 should monitor for updates and implement network-level controls to restrict adjacent network access where possible (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."