
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-6258 is a security vulnerability discovered in the Zephyr Project's Bluetooth implementation, specifically related to missing length checks of net_buf in rfcomm_handle_data function. The vulnerability was disclosed on September 13, 2024, affecting Zephyr versions up to and including 3.6.0. The issue resides in the subsys/bluetooth/host/rfcomm.c component, where insufficient buffer length verification could lead to undefined behavior (Zephyr Advisory).
The vulnerability stems from inadequate length verification in the rfcomm_handle_data function, which is called from rfcomm_recv. While there is an initial check to ensure buf->len is larger than sizeof(*hdr) + 1, subsequent operations lack proper buffer size validation. This oversight can lead to a crash when executing net_buf_pull_u8(buf) if the buffer is exactly sizeof(*hdr) + 1 in size. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with vector string CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
Exploitation of this vulnerability could result in system instability or denial of service attacks. When successfully exploited, the system may crash due to undefined behavior in buffer operations (Zephyr Advisory).
A fix has been proposed in pull request #74640 for the main branch. However, no official patched versions are currently available. Users of affected versions should monitor for updates and implement network access controls where possible (Zephyr Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."