Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28391: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in Silicon Labs Gecko Platform

0
Critical
VulnerabilityCVE-2023-28391cvecve-2023-28391cwe-119
Published: Tue Nov 14 2023 (11/14/2023, 09:14:53 UTC)
Source: CVE Database V5
Vendor/Project: Silicon Labs
Product: Gecko Platform

Description

A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:45:36 UTC

Technical Analysis

CVE-2023-28391 is a critical security vulnerability identified in Silicon Labs' Gecko Platform, specifically affecting the Weston Embedded uC-HTTP server version 3.01.01 used in Gecko Platform 4.3.1.0. The vulnerability arises from improper restriction of operations within the bounds of a memory buffer during HTTP header parsing, classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). An attacker can exploit this flaw by sending specially crafted network packets to the HTTP server, which leads to memory corruption. This memory corruption can be leveraged to achieve remote code execution (RCE) without requiring any authentication or user interaction. The vulnerability has a CVSS v3.1 base score of 9.0, indicating critical severity, with attack vector as network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are currently known, the nature of the vulnerability and its criticality make it a significant threat. The affected product, Silicon Labs Gecko Platform, is widely used in embedded systems and IoT devices, which are often deployed in industrial, automotive, and smart infrastructure environments. The flaw's exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of services.

Potential Impact

For European organizations, the impact of CVE-2023-28391 can be substantial, especially for those relying on embedded systems and IoT devices powered by Silicon Labs Gecko Platform. The vulnerability enables remote attackers to execute arbitrary code, which can lead to unauthorized access, data breaches, manipulation of device functions, or complete device takeover. This poses risks to critical infrastructure sectors such as manufacturing, energy, transportation, and smart city deployments prevalent in Europe. Disruption or compromise of these systems could result in operational downtime, financial losses, and safety hazards. Additionally, the vulnerability's network-based attack vector means that exposed devices connected to the internet or internal networks are at risk without requiring user interaction or credentials. The high severity score reflects the potential for widespread impact if exploited, especially in environments where patching embedded devices is challenging. European organizations must consider the threat in the context of increasing cyberattacks targeting industrial control systems and IoT devices.

Mitigation Recommendations

1. Apply patches or firmware updates from Silicon Labs as soon as they become available to address the vulnerability in the Gecko Platform. 2. In the absence of patches, restrict network access to vulnerable devices by implementing network segmentation and firewall rules to limit exposure of the HTTP server to untrusted networks. 3. Employ deep packet inspection and anomaly detection tools to monitor HTTP traffic for unusual or malformed header packets that could indicate exploitation attempts. 4. Disable or replace the vulnerable HTTP server component if feasible, or configure it to minimize exposure and functionality. 5. Conduct thorough asset inventories to identify all devices running the affected Gecko Platform version 4.3.1.0 and prioritize remediation efforts accordingly. 6. Implement strict access controls and network-level authentication where possible to reduce attack surface. 7. Educate operational technology (OT) and IoT device administrators about the risks and signs of exploitation to enhance detection and response capabilities. 8. Collaborate with vendors and cybersecurity communities to stay informed about emerging exploits and mitigation strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-03-20T13:45:06.752Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a531e2a90255b94da5f7b

Added to database: 11/4/2025, 7:25:18 PM

Last enriched: 11/4/2025, 8:45:36 PM

Last updated: 11/6/2025, 9:13:14 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats