CVE-2022-2741

The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).
Configurations

Configuration 1 (hide)

cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*

History

01 Nov 2022, 16:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8 - (MISC) https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8 - Patch, Third Party Advisory
First Time Zephyrproject
Zephyrproject zephyr
CWE CWE-400
CPE cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*

31 Oct 2022, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-31 18:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-2741

Mitre link : CVE-2022-2741

CVE.ORG link : CVE-2022-2741


JSON object : View

Products Affected

zephyrproject

  • zephyr
CWE
CWE-400

Uncontrolled Resource Consumption