Silabs

Gecko Software Development Kit

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 03.01.2024 23:15:08
  • Zuletzt bearbeitet 21.11.2024 08:41:08

Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B.

  • EPSS 0.07%
  • Veröffentlicht 02.01.2024 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:34:46

An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region.

  • EPSS 0.11%
  • Veröffentlicht 21.12.2023 21:15:08
  • Zuletzt bearbeitet 21.11.2024 08:20:34

An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0.

  • EPSS 0.22%
  • Veröffentlicht 15.12.2023 21:15:08
  • Zuletzt bearbeitet 21.11.2024 08:34:14

An unvalidated input in a library function responsible for communicating between secure and non-secure memory in Silicon Labs TrustZone implementation allows reading/writing of memory in the secure region of memory from the non-secure region of memor...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 14.11.2023 10:15:28
  • Zuletzt bearbeitet 04.11.2025 20:16:26

A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this ...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 14.11.2023 10:15:27
  • Zuletzt bearbeitet 04.11.2025 20:16:24

A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger th...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 14.11.2023 10:15:27
  • Zuletzt bearbeitet 04.11.2025 20:16:25

A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulner...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 14.11.2023 10:15:27
  • Zuletzt bearbeitet 04.11.2025 20:16:25

A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulner...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 14.11.2023 10:15:26
  • Zuletzt bearbeitet 21.11.2024 07:49:15

A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigge...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 14.11.2023 10:15:26
  • Zuletzt bearbeitet 21.11.2024 07:48:10

An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.