Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-39541: CWE-126: Buffer Over-read in Silicon Labs Gecko Platform

0
Medium
VulnerabilityCVE-2023-39541cvecve-2023-39541cwe-126
Published: Tue Feb 20 2024 (02/20/2024, 14:45:03 UTC)
Source: CVE Database V5
Vendor/Project: Silicon Labs
Product: Gecko Platform

Description

A denial of service vulnerability exists in the ICMP and ICMPv6 parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted network packet can lead to an out-of-bounds read. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability concerns a denial of service within the parsing an IPv6 ICMPv6 packet.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:37:38 UTC

Technical Analysis

CVE-2023-39541 is a buffer over-read vulnerability classified under CWE-126, found in the ICMP and ICMPv6 parsing code of the Weston Embedded uC-TCP-IP stack version 3.06.01, which is part of Silicon Labs' Gecko Platform version 4.3.1.0. The vulnerability arises when the network stack processes specially crafted IPv6 ICMPv6 packets, leading to an out-of-bounds read condition. This flaw can be exploited remotely by an unauthenticated attacker sending malicious packets to affected devices, causing a denial of service by crashing or destabilizing the network stack. The CVSS 3.1 base score is 5.9, reflecting medium severity, with attack vector network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No public exploits or patches are currently available, increasing the urgency for defensive measures. The vulnerability specifically targets IPv6 ICMPv6 packet parsing, which is critical for network communication and device discovery in IPv6-enabled environments. Given the embedded nature of the affected platform, this vulnerability primarily threatens IoT and industrial control systems using Silicon Labs Gecko Platform. The lack of authentication and user interaction requirements makes it easier for attackers to exploit if network access is possible. The vulnerability's impact is limited to denial of service, with no direct data leakage or code execution reported.

Potential Impact

For European organizations, the primary impact of CVE-2023-39541 is the potential disruption of services relying on embedded devices running the Silicon Labs Gecko Platform, particularly those using IPv6 networks. This includes industrial IoT devices, smart building controls, and other embedded systems common in manufacturing, utilities, and critical infrastructure sectors. A successful attack could cause device crashes or network stack failures, leading to downtime, loss of operational continuity, and increased maintenance costs. Since the vulnerability affects availability without compromising confidentiality or integrity, the risk is mainly operational rather than data breach-related. However, in critical infrastructure environments, denial of service can have cascading effects, potentially impacting safety and compliance with regulations such as NIS2. The medium severity score reflects a moderate risk, but the absence of patches and known exploits means organizations must proactively mitigate exposure. IPv6 adoption in Europe is growing, increasing the attack surface for this vulnerability. Organizations with IPv6-enabled networks and Silicon Labs embedded devices are particularly at risk.

Mitigation Recommendations

1. Implement network-level filtering to block or restrict ICMPv6 traffic from untrusted or external sources, especially malformed or suspicious packets, using firewalls or intrusion prevention systems. 2. Segment and isolate networks hosting Silicon Labs Gecko Platform devices to limit exposure to potentially malicious IPv6 traffic. 3. Monitor network traffic for unusual ICMPv6 packet patterns or spikes that could indicate exploitation attempts. 4. Engage with Silicon Labs support channels to obtain information on upcoming patches or firmware updates addressing this vulnerability. 5. Where possible, disable or limit IPv6 functionality on affected devices if not required for operations, reducing the attack surface. 6. Conduct regular device and network audits to inventory affected systems and verify firmware versions. 7. Prepare incident response plans for denial of service events targeting embedded devices to minimize operational impact. 8. Collaborate with vendors and industry groups to share threat intelligence related to this vulnerability. These steps go beyond generic advice by focusing on network segmentation, traffic filtering specific to ICMPv6, and proactive monitoring tailored to the affected embedded platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-08-03T20:35:34.512Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a439d6d939959c8fddb17

Added to database: 11/4/2025, 6:19:09 PM

Last enriched: 11/4/2025, 6:37:38 PM

Last updated: 11/5/2025, 1:51:45 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats