Vulnerability Description
A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Weston-Embedded | Uc-Tcp-Ip | 3.06.01 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1829
FAQ
What is CVE-2023-38562?
CVE-2023-38562 is a vulnerability with a CVSS score of 8.7 (HIGH). A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, pote...
How severe is CVE-2023-38562?
CVE-2023-38562 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38562?
Check the references section above for vendor advisories and patch information. Affected products include: Weston-Embedded Uc-Tcp-Ip.