Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28379: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in Silicon Labs Gecko Platform

0
Critical
VulnerabilityCVE-2023-28379cvecve-2023-28379cwe-119
Published: Tue Nov 14 2023 (11/14/2023, 09:14:52 UTC)
Source: CVE Database V5
Vendor/Project: Silicon Labs
Product: Gecko Platform

Description

A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:46:08 UTC

Technical Analysis

CVE-2023-28379 is a critical security vulnerability identified in the Silicon Labs Gecko Platform, specifically affecting the Weston Embedded uC-HTTP server version 3.01.01 used in Gecko Platform 4.3.1.0. The vulnerability arises from improper restriction of operations within the bounds of a memory buffer (CWE-119) in the HTTP Server's form boundary processing functionality. An attacker can exploit this by sending a specially crafted network packet to the vulnerable HTTP server, causing memory corruption that can lead to arbitrary code execution. This vulnerability is remotely exploitable over the network without requiring authentication or user interaction, although it has a high attack complexity, meaning exploitation may require specific conditions or knowledge. The CVSS v3.1 score of 9.0 reflects the critical impact on confidentiality, integrity, and availability, with a scope change indicating that the vulnerability can affect components beyond the initially vulnerable module. No patches or exploit code are currently publicly available, and no known exploits have been observed in the wild. The affected product, Silicon Labs Gecko Platform, is widely used in embedded systems and IoT devices, which often operate in critical infrastructure, industrial control systems, and consumer electronics. The vulnerability's exploitation could allow attackers to take full control of affected devices, potentially leading to data breaches, service disruption, or use of compromised devices as footholds for further network intrusion.

Potential Impact

For European organizations, the impact of CVE-2023-28379 is significant due to the widespread use of Silicon Labs Gecko Platform in embedded and IoT devices across various sectors, including industrial automation, smart city infrastructure, and consumer electronics. Successful exploitation could lead to full system compromise, enabling attackers to exfiltrate sensitive data, disrupt critical services, or pivot within networks to attack other assets. This poses a high risk to confidentiality, integrity, and availability of affected systems. In sectors such as manufacturing, energy, and transportation, where embedded devices play a crucial role, the vulnerability could cause operational disruptions or safety hazards. Additionally, the lack of authentication requirement and remote exploitability increase the threat level, especially in environments where vulnerable devices are exposed to untrusted networks or the internet. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation given the critical severity and potential impact.

Mitigation Recommendations

1. Monitor Silicon Labs communications closely for official patches or firmware updates addressing this vulnerability and apply them promptly to all affected devices running Gecko Platform 4.3.1.0 or Weston Embedded uC-HTTP v3.01.01. 2. Implement network segmentation to isolate vulnerable embedded devices from untrusted networks, minimizing exposure to potential attackers. 3. Deploy strict firewall rules and access control lists to restrict inbound traffic to the HTTP server ports on affected devices, allowing only trusted management networks or IP addresses. 4. Use intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection capabilities to identify and block suspicious packets targeting the HTTP form boundary functionality. 5. Conduct thorough asset inventories to identify all devices running the vulnerable software versions, including those in less visible operational technology (OT) environments. 6. Where patching is not immediately possible, consider disabling or restricting the HTTP server functionality if feasible, or applying compensating controls such as VPN access to management interfaces. 7. Educate operational staff about the risks of exposing embedded device management interfaces to public or untrusted networks. 8. Prepare incident response plans specifically addressing potential exploitation of embedded device vulnerabilities to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-03-24T16:13:50.759Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a531e2a90255b94da5f73

Added to database: 11/4/2025, 7:25:18 PM

Last enriched: 11/4/2025, 8:46:08 PM

Last updated: 11/6/2025, 6:47:54 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats