Zephyrproject

Zephyr

114 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 04.11.2025 06:20:19
  • Zuletzt bearbeitet 05.11.2025 17:11:25

In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitatio...

  • EPSS 0.01%
  • Veröffentlicht 04.11.2025 06:20:17
  • Zuletzt bearbeitet 05.11.2025 17:11:34

In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitatio...

  • EPSS 0.03%
  • Veröffentlicht 19.09.2025 05:21:33
  • Zuletzt bearbeitet 29.10.2025 18:16:37

A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT). Specifically, an attacker could exploit a flaw that causes the BLE target (i.e., the device under attack) to attempt to disconnect a fix...

  • EPSS 0.04%
  • Veröffentlicht 19.09.2025 05:20:20
  • Zuletzt bearbeitet 29.10.2025 18:08:06

Parameters are not validated or sanitized, and are later used in various internal operations.

  • EPSS 0.02%
  • Veröffentlicht 19.09.2025 05:19:18
  • Zuletzt bearbeitet 29.10.2025 18:05:53

Unsafe handling in bt_conn_tx_processor causes a use-after-free, resulting in a write-before-zero. The written 4 bytes are attacker-controlled, enabling precise memory corruption.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 19.09.2025 05:17:40
  • Zuletzt bearbeitet 29.10.2025 18:52:28

The function responsible for handling BLE connection responses does not verify whether a response is expected—that is, whether the device has initiated a connection request. Instead, it relies solely on identifier matching.

  • EPSS 0.02%
  • Veröffentlicht 04.08.2025 01:49:46
  • Zuletzt bearbeitet 18.08.2025 15:42:28

In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is need...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 24.06.2025 05:32:11
  • Zuletzt bearbeitet 30.10.2025 15:50:09

A denial-of-service issue in the dns implemenation could cause an infinite loop.

  • EPSS 0.25%
  • Veröffentlicht 25.02.2025 08:15:30
  • Zuletzt bearbeitet 28.02.2025 01:30:32

The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data.

  • EPSS 0.19%
  • Veröffentlicht 25.02.2025 08:15:29
  • Zuletzt bearbeitet 28.02.2025 01:30:32

A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.