Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-39540: CWE-126: Buffer Over-read in Silicon Labs Gecko Platform

0
Medium
VulnerabilityCVE-2023-39540cvecve-2023-39540cwe-126
Published: Tue Feb 20 2024 (02/20/2024, 14:45:03 UTC)
Source: CVE Database V5
Vendor/Project: Silicon Labs
Product: Gecko Platform

Description

A denial of service vulnerability exists in the ICMP and ICMPv6 parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted network packet can lead to an out-of-bounds read. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability concerns a denial of service within the parsing an IPv4 ICMP packet.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:37:17 UTC

Technical Analysis

CVE-2023-39540 is a vulnerability identified in the Silicon Labs Gecko Platform, specifically version 4.3.1.0, involving a buffer over-read (CWE-126) within the ICMP and ICMPv6 packet parsing components of the Weston Embedded uC-TCP-IP stack (v3.06.01). The flaw arises when the platform processes specially crafted IPv4 ICMP packets, causing an out-of-bounds read operation. This memory access violation can lead to denial of service (DoS) conditions, potentially crashing or destabilizing the affected device or system. The vulnerability does not impact confidentiality or integrity but affects availability by disrupting normal network communication. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has a high attack complexity (AC:H), indicating that exploitation requires specific conditions or crafted packets. No authentication is needed, making it remotely exploitable. Although no known exploits have been reported in the wild, the vulnerability poses a risk to embedded systems and IoT devices using the Gecko Platform, which are often deployed in industrial, automotive, and consumer environments. The lack of available patches necessitates proactive mitigation strategies. The vulnerability was publicly disclosed in February 2024, with the CVSS v3.1 score of 5.9 reflecting medium severity.

Potential Impact

The primary impact of CVE-2023-39540 is denial of service, which can disrupt the availability of devices running the Silicon Labs Gecko Platform. For European organizations, this could translate into temporary outages or instability in embedded systems, IoT devices, or networked equipment that rely on this platform. Critical sectors such as manufacturing, energy, transportation, and smart city infrastructure may be particularly vulnerable if these devices are integral to operational technology (OT) environments. Disruptions could lead to operational delays, safety risks, or loss of service continuity. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could have cascading effects on business processes and service delivery. The medium severity and high attack complexity reduce the likelihood of widespread exploitation but do not eliminate risk, especially in targeted attacks against critical infrastructure. European organizations with extensive deployments of Silicon Labs technology should assess their exposure and prepare incident response plans accordingly.

Mitigation Recommendations

1. Implement network-level filtering to restrict or monitor ICMP and ICMPv6 traffic, especially from untrusted or external sources, to reduce exposure to malicious packets. 2. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capabilities tuned to identify malformed ICMP packets targeting this vulnerability. 3. Isolate critical embedded devices using the Gecko Platform within segmented network zones to limit attack surface and lateral movement. 4. Engage with Silicon Labs and vendors for updates or patches and prioritize timely application once available. 5. Conduct thorough inventory and asset management to identify all devices running affected versions of the Gecko Platform. 6. Perform regular security assessments and penetration testing focusing on network protocol handling in embedded systems. 7. Develop and test incident response procedures to quickly address potential denial of service events related to this vulnerability. 8. Consider deploying fallback or redundancy mechanisms for critical systems to maintain availability during potential outages.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-08-03T20:35:34.512Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a439d6d939959c8fddb13

Added to database: 11/4/2025, 6:19:09 PM

Last enriched: 11/4/2025, 6:37:17 PM

Last updated: 11/5/2025, 1:55:46 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats