Vulnerability Details CVE-2024-47248
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE.
Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.3%
CVSS Severity
CVSS v3 Score 6.3
Products affected by CVE-2024-47248
-
cpe:2.3:a:apache:nimble:1.0.0
-
cpe:2.3:a:apache:nimble:1.1.0
-
cpe:2.3:a:apache:nimble:1.2.0
-
cpe:2.3:a:apache:nimble:1.3.0
-
cpe:2.3:a:apache:nimble:1.4.0
-
cpe:2.3:a:apache:nimble:1.5.0
-
cpe:2.3:a:apache:nimble:1.6.0
-
cpe:2.3:a:apache:nimble:1.7.0