Silicon Labs Gecko Platform SDK CVE-2023-32097 has a CVSS base score of 3.1. Learn about key duplication risk due to buffer clearing issue in the SDK v4.2.1 and earlier.
Understanding CVE-2023-32097
This CVE record pertains to a vulnerability in Silicon Labs Gecko Platform SDK versions prior to 4.2.2. The issue involves compiler removal of buffer clearing, resulting in key material duplication to RAM.
What is CVE-2023-32097?
The vulnerability in 'sli_crypto_transparent_aead_decrypt_tag' in Silicon Labs Gecko Platform SDK v4.2.1 and earlier allows key material duplication to RAM due to compiler removal of buffer clearing.
The Impact of CVE-2023-32097
With a CVSSv3.1 base score of 3.1 (Low), this vulnerability has a high attack complexity and network attack vector. It results in low confidentiality and integrity impacts, requiring low privileges to exploit.
Technical Details of CVE-2023-32097
The vulnerability is classified under CWE-14: Compiler Removal of Code to Clear Buffers.
Vulnerability Description
The issue arises from the compiler's removal of buffer clearing, leading to key material duplication in RAM.
Affected Systems and Versions
Silicon Labs Gecko Platform SDK versions 4.2.1 and earlier are affected by this vulnerability.
Exploitation Mechanism
Attackers with network access can exploit this vulnerability with a high level of complexity.
Mitigation and Prevention
Taking immediate steps to address this CVE and adopting long-term security practices are crucial.
Immediate Steps to Take
Users are advised to update to version 4.2.2 or later of the Silicon Labs Gecko Platform SDK to mitigate this vulnerability.
Long-Term Security Practices
Implement secure coding practices and regularly update software to prevent similar vulnerabilities in the future.
Patching and Updates
Refer to the provided patch by Silicon Labs on GitHub and vendor advisory for detailed guidance on addressing CVE-2023-32097.