All the vulnerabilites related to silabs.com - GSDK
cve-2023-4020
Vulnerability from cvelistv5
Published
2023-12-15 20:37
Modified
2024-09-26 14:11
Severity ?
EPSS score ?
Summary
Unvalidated input in Silicon Labs PSA Attestation service leads to secure memory access from non-secure memory
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:17:11.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk/releases" }, { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/069Vm0000004b95IAA" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThan": "4.4.0", "status": "affected", "version": "1.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An unvalidated input in a library function responsible for communicating between secure and non-secure memory in Silicon Labs TrustZone implementation allows reading/writing of memory in the secure region of memory from the non-secure region of memory." } ], "value": "An unvalidated input in a library function responsible for communicating between secure and non-secure memory in Silicon Labs TrustZone implementation allows reading/writing of memory in the secure region of memory from the non-secure region of memory." } ], "impacts": [ { "capecId": "CAPEC-129", "descriptions": [ { "lang": "en", "value": "CAPEC-129 Pointer Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T14:11:59.084Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk/releases" }, { "url": "https://community.silabs.com/069Vm0000004b95IAA" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unvalidated input in Silicon Labs PSA Attestation service leads to secure memory access from non-secure memory", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-4020", "datePublished": "2023-12-15T20:37:20.123Z", "dateReserved": "2023-07-31T14:55:52.590Z", "dateUpdated": "2024-09-26T14:11:59.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6874
Vulnerability from cvelistv5
Published
2024-02-05 17:39
Modified
2024-09-25 16:10
Severity ?
EPSS score ?
Summary
Zigbee Unauthenticated DoS via NWK Sequence number manipulation
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 0.0 ≤ |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:silabs:gecko_software_development_kit:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gecko_software_development_kit", "vendor": "silabs", "versions": [ { "lessThan": "7.4.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-6874", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-28T17:46:32.895534Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-28T17:48:00.169Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:08.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/069Vm000000WXaOIAW" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThan": "7.4.0", "status": "affected", "version": "0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Prior to v7.4.0, Ember ZNet is vulnerable to a denial of service attack through manipulation of the NWK sequence number" } ], "value": "Prior to v7.4.0, Ember ZNet is vulnerable to a denial of service attack through manipulation of the NWK sequence number" } ], "impacts": [ { "capecId": "CAPEC-194", "descriptions": [ { "lang": "en", "value": "CAPEC-194 Fake the Source of Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:10:32.932Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "url": "https://community.silabs.com/069Vm000000WXaOIAW" } ], "source": { "discovery": "UNKNOWN" }, "title": "Zigbee Unauthenticated DoS via NWK Sequence number manipulation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-6874", "datePublished": "2024-02-05T17:39:43.291Z", "dateReserved": "2023-12-15T17:44:27.312Z", "dateUpdated": "2024-09-25T16:10:32.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5138
Vulnerability from cvelistv5
Published
2024-01-03 22:31
Modified
2024-09-27 15:36
Severity ?
EPSS score ?
Summary
Glitch detection not active by default in Silicon Labs Secure Vault High devices
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 1.0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:06.704Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/069Vm0000004f6DIAQ" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThan": "4.4.0", "status": "affected", "version": "1.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B." } ], "value": "Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B." } ], "impacts": [ { "capecId": "CAPEC-624", "descriptions": [ { "lang": "en", "value": "CAPEC-624 Fault Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1319", "description": "CWE-1319 Improper Protection against Electromagnetic Fault Injection (EM-FI)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:36:34.657Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "url": "https://community.silabs.com/069Vm0000004f6DIAQ" } ], "source": { "discovery": "UNKNOWN" }, "title": "Glitch detection not active by default in Silicon Labs Secure Vault High devices", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-5138", "datePublished": "2024-01-03T22:31:04.433Z", "dateReserved": "2023-09-22T21:13:46.220Z", "dateUpdated": "2024-09-27T15:36:34.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4280
Vulnerability from cvelistv5
Published
2024-01-02 16:52
Modified
2024-09-25 15:55
Severity ?
EPSS score ?
Summary
Unvalidated input in Silicon Labs TrustZone implementation leads to accessing Trusted memory region
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/069Vm0000004NinIAE" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThanOrEqual": "4.3.x", "status": "affected", "version": "1.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region." } ], "value": "An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:55:11.799Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "url": "https://community.silabs.com/069Vm0000004NinIAE" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unvalidated input in Silicon Labs TrustZone implementation leads to accessing Trusted memory region", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-4280", "datePublished": "2024-01-02T16:52:06.959Z", "dateReserved": "2023-08-09T19:24:29.697Z", "dateUpdated": "2024-09-25T15:55:11.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6387
Vulnerability from cvelistv5
Published
2024-02-02 15:18
Modified
2024-09-25 16:35
Severity ?
EPSS score ?
Summary
Incorrect buffer parsing in Bluetooth LE sample code may lead to buffer overflow
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 1.0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:28:21.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk/releases/tag/v4.4.0" }, { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/069Vm000000WNKuIAO" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThan": "4.4.0", "status": "affected", "version": "1.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution" } ], "value": "A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution" } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:35:26.438Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk/releases/tag/v4.4.0" }, { "url": "https://community.silabs.com/069Vm000000WNKuIAO" } ], "source": { "discovery": "UNKNOWN" }, "title": "Incorrect buffer parsing in Bluetooth LE sample code may lead to buffer overflow", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-6387", "datePublished": "2024-02-02T15:18:13.169Z", "dateReserved": "2023-11-29T18:05:03.426Z", "dateUpdated": "2024-09-25T16:35:26.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3487
Vulnerability from cvelistv5
Published
2023-10-20 14:12
Modified
2024-09-25 15:47
Severity ?
EPSS score ?
Summary
Integer overflow in Silicon Labs Gecko Bootloader leads to unbounded memory access
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk/releases" }, { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/s/contentdocument/0698Y00000ZmXqLQAV" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:silabs:gecko_bootloader:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "gecko_bootloader", "vendor": "silabs", "versions": [ { "lessThanOrEqual": "4.3.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-3487", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T14:39:12.789384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T14:40:36.723Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThanOrEqual": "4.3.1", "status": "affected", "version": "1.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.\u003c/span\u003e" } ], "value": "An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:47:54.946Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk/releases" }, { "url": "https://community.silabs.com/s/contentdocument/0698Y00000ZmXqLQAV" } ], "source": { "discovery": "UNKNOWN" }, "title": "Integer overflow in Silicon Labs Gecko Bootloader leads to unbounded memory access", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-3487", "datePublished": "2023-10-20T14:12:44.805Z", "dateReserved": "2023-06-30T18:44:04.589Z", "dateUpdated": "2024-09-25T15:47:54.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3024
Vulnerability from cvelistv5
Published
2023-09-29 16:32
Modified
2024-09-25 15:44
Severity ?
EPSS score ?
Summary
Bluetooth LE segmented 'prepare write response' packet may lead to out-of-bounds memory access
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 1.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:41:04.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "tags": [ "x_transferred" ], "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ViQvHQAV/?operationContext=S1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3024", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T17:07:48.213483Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T17:07:58.703Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThan": "6.0.0", "status": "affected", "version": "1.0.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Forcing the Bluetooth LE stack to segment \u0027prepare write response\u0027 packets can lead to an out-of-bounds memory access." } ], "value": "Forcing the Bluetooth LE stack to segment \u0027prepare write response\u0027 packets can lead to an out-of-bounds memory access." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:44:26.053Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ViQvHQAV/?operationContext=S1" } ], "source": { "discovery": "UNKNOWN" }, "title": "Bluetooth LE segmented \u0027prepare write response\u0027 packet may lead to out-of-bounds memory access", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-3024", "datePublished": "2023-09-29T16:32:30.503Z", "dateReserved": "2023-05-31T19:31:15.221Z", "dateUpdated": "2024-09-25T15:44:26.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2747
Vulnerability from cvelistv5
Published
2023-06-15 19:49
Modified
2024-12-11 20:59
Severity ?
EPSS score ?
Summary
Uninitialized IV in Silicon Labs SE FW v2.0.0 through v 2.2.1 for internally stored data
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 2.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:33:05.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U2sFvQAJ?operationContext=S1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-2747", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T20:59:03.584000Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-11T20:59:11.466Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "lessThanOrEqual": "2.2.1", "status": "affected", "version": "2.0.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\u003c/div\u003e\n\nThe initialization vector (IV) used by the secure engine (SE) for encrypting data stored in the SE flash memory is uninitialized.\u0026nbsp;\u003cdiv\u003e\u003c/div\u003e" } ], "value": "The initialization vector (IV) used by the secure engine (SE) for encrypting data stored in the SE flash memory is uninitialized." } ], "impacts": [ { "capecId": "CAPEC-114", "descriptions": [ { "lang": "en", "value": "CAPEC-114 Authentication Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1204", "description": "CWE-1204 Generation of Weak Initialization Vector (IV)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:19:34.634Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U2sFvQAJ?operationContext=S1" }, { "url": "https://github.com/SiliconLabs/gecko_sdk" } ], "source": { "discovery": "UNKNOWN" }, "title": "Uninitialized IV in Silicon Labs SE FW v2.0.0 through v 2.2.1 for internally stored data", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-2747", "datePublished": "2023-06-15T19:49:29.785Z", "dateReserved": "2023-05-16T20:15:31.493Z", "dateUpdated": "2024-12-11T20:59:11.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0240
Vulnerability from cvelistv5
Published
2024-02-15 20:30
Modified
2024-09-25 16:41
Severity ?
EPSS score ?
Summary
Silicon Labs EFR32 Bluetooth stack denial of service when sending notifications to multiple clients
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-0240", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-16T17:04:27.213726Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:58:19.959Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:16.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/069Vm000001AjEfIAK" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "repo": "https://github.com/SiliconLabs/gecko_sdk/releases", "vendor": "silabs.com", "versions": [ { "lessThan": "4.3.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A memory leak in the Silicon Labs\u0027 Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop." } ], "value": "A memory leak in the Silicon Labs\u0027 Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401 Missing Release of Memory after Effective Lifetime", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:41:33.587Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://github.com/SiliconLabs/gecko_sdk" }, { "url": "https://community.silabs.com/069Vm000001AjEfIAK" } ], "source": { "discovery": "UNKNOWN" }, "title": "Silicon Labs EFR32 Bluetooth stack denial of service when sending notifications to multiple clients", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2024-0240", "datePublished": "2024-02-15T20:30:45.263Z", "dateReserved": "2024-01-04T16:51:46.029Z", "dateUpdated": "2024-09-25T16:41:33.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0775
Vulnerability from cvelistv5
Published
2023-03-28 16:23
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Bluetooth LE Invalid prepare write request command leads to denial of service
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 1.0 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:33.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000SMMyGQAX?operationContext=S1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GSDK", "vendor": "silabs.com", "versions": [ { "changes": [ { "at": "5.1.0", "status": "affected" } ], "lessThanOrEqual": "v5.1.1", "status": "affected", "version": "1.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An invalid \u2018prepare write request\u2019 command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service." } ], "value": "An invalid \u2018prepare write request\u2019 command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service." } ], "impacts": [ { "capecId": "CAPEC-123", "descriptions": [ { "lang": "en", "value": "CAPEC-123 Buffer Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-29T15:17:23.197Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000SMMyGQAX?operationContext=S1" }, { "url": "https://github.com/SiliconLabs/gecko_sdk" } ], "source": { "discovery": "UNKNOWN" }, "title": "Bluetooth LE Invalid prepare write request command leads to denial of service", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-0775", "datePublished": "2023-03-28T16:23:29.836Z", "dateReserved": "2023-02-10T14:33:56.906Z", "dateUpdated": "2024-08-02T05:24:33.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22473
Vulnerability from cvelistv5
Published
2024-02-21 18:13
Modified
2024-09-27 16:06
Severity ?
EPSS score ?
Summary
Uninitialized TRNG used for ECDSA after EM2/EM3 sleep for VSE devices
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-22473", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T20:24:22.961810Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:52.747Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:51:09.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://community.silabs.com/068Vm000001FrjT" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "ARM" ], "product": "GSDK", "repo": "https://github.com/SiliconLabs/gecko_sdk/releases", "vendor": "silabs.com", "versions": [ { "lessThanOrEqual": "4.4.0", "status": "affected", "version": "0", "versionType": "4.4.x and earlier" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "TRNG is used before initialization by ECDSA signing driver when exiting EM2/EM3 on Virtual Secure Vault (VSE) devices. This defect may allow Signature Spoofing by Key Recreation.\u003cp\u003eThis issue affects Gecko SDK through v4.4.0.\u003c/p\u003e" } ], "value": "TRNG is used before initialization by ECDSA signing driver when exiting EM2/EM3 on Virtual Secure Vault (VSE) devices. This defect may allow Signature Spoofing by Key Recreation.This issue affects Gecko SDK through v4.4.0." } ], "impacts": [ { "capecId": "CAPEC-474", "descriptions": [ { "lang": "en", "value": "CAPEC-474 Signature Spoofing by Key Theft" } ] }, { "capecId": "CAPEC-485", "descriptions": [ { "lang": "en", "value": "CAPEC-485 Signature Spoofing by Key Recreation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1279", "description": "CWE-1279 Cryptographic Operations are run Before Supporting Units are Ready", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-331", "description": "CWE-331 Insufficient Entropy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:06:44.910Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "url": "https://community.silabs.com/068Vm000001FrjT" } ], "source": { "discovery": "UNKNOWN" }, "title": "Uninitialized TRNG used for ECDSA after EM2/EM3 sleep for VSE devices", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2024-22473", "datePublished": "2024-02-21T18:13:10.241Z", "dateReserved": "2024-01-10T19:20:24.393Z", "dateUpdated": "2024-09-27T16:06:44.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41097
Vulnerability from cvelistv5
Published
2023-12-21 20:33
Modified
2024-09-25 16:29
Severity ?
EPSS score ?
Summary
Potential Timing vulnerability in CBC PKCS7 padding calculations
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | silabs.com | GSDK |
Version: 0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:46:11.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000007rArIAI?operationContext=S1" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/SiliconLabs/gecko_sdk/releases" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "ARM" ], "product": "GSDK", "repo": "https://github.com/SiliconLabs/gecko_sdk/releases", "vendor": "silabs.com", "versions": [ { "lessThan": "4.4.0", "status": "affected", "version": "0", "versionType": "LessThan" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.\u003cp\u003eThis issue affects GSDK: through 4.4.0.\u003c/p\u003e" } ], "value": "An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0." } ], "impacts": [ { "capecId": "CAPEC-463", "descriptions": [ { "lang": "en", "value": "CAPEC-463 Padding Oracle Crypto Attack" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-208", "description": "CWE-208 Observable Timing Discrepancy", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:29:16.615Z", "orgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "shortName": "Silabs" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000007rArIAI?operationContext=S1" }, { "tags": [ "patch" ], "url": "https://github.com/SiliconLabs/gecko_sdk/releases" } ], "source": { "discovery": "UNKNOWN" }, "title": "Potential Timing vulnerability in CBC PKCS7 padding calculations", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "030b2754-1501-44a4-bef8-48be86a33bf4", "assignerShortName": "Silabs", "cveId": "CVE-2023-41097", "datePublished": "2023-12-21T20:33:04.967Z", "dateReserved": "2023-08-23T04:17:16.169Z", "dateUpdated": "2024-09-25T16:29:16.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }