CVE-2024-47248

Severity
6.3MEDIUM
EPSS
0.0%
top 89.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 26

Description

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f94q-ffqr-x638: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE2024-11-26
CVEList
Apache NimBLE: Buffer overflow in NimBLE MESH Bluetooth stack2024-11-26

📋Vendor Advisories

1
Oracle
Oracle Oracle Financial Services Applications Risk Matrix: Installer (PyArrow) — CVE-2023-472482024-07-15