CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8798

Medium Severity
Zephyrproject
SVRS
30/100

CVSSv3
6.5/10

EPSS
0.00211/1

CVE-2024-8798 is a vulnerability in Zephyr's Bluetooth Object Transfer Service (OTS) client, specifically within the olcp_ind_handler function. It stems from a lack of proper validation of user input length. This could lead to potential exploits due to improper handling of excessively long inputs.

CVE-2024-8798 relates to insufficient input sanitization within the Zephyr Bluetooth subsystem. The insufficient validation in the olcp_ind_handler function of zephyr/subsys/bluetooth/services/ots/ots_client.c can cause unexpected behavior. With an SVRS of 30, this vulnerability is not considered critical, though patching is still recommended for robust security practices. The risk associated with this CVE includes potential denial-of-service or other unexpected behavior. While not immediately critical, it's important to address this input validation flaw to maintain the stability and security of systems using the Zephyr Bluetooth stack.

In The Wild
CVSS:3.1
AV:A
AC:L
PR:N
UI:N
S:U
C:N
I:N
A:H
2024-12-16

2025-02-03
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-8798 is a recently disclosed vulnerability with limited information currently available. While the CVSS score is 0, indicating a lack of quantifiable severity data, the SOCRadar Vulnerability Risk Score (SVRS) stands at 34. This score suggests a moderate level of risk, indicating potential for exploitation. The "In The Wild" tag signifies that this vulnerability is actively being exploited by hackers.

Key Insights

  • Limited Information: The lack of a detailed description currently hinders a comprehensive understanding of the vulnerability's nature and impact.
  • Active Exploitation: The "In The Wild" tag indicates that hackers are actively exploiting this vulnerability, highlighting the urgency to address it.
  • SVRS Score: The SVRS score of 34, while not critical, signifies a potential risk that requires immediate attention and mitigation efforts.
  • Unknown Impact: Without a clear description, it is challenging to determine the full scope of potential impact and the systems or data that could be compromised.

Mitigation Strategies

  1. Urgent Patching: Prioritize patching systems affected by CVE-2024-8798 as soon as possible to eliminate the vulnerability. This should be done even without a detailed understanding of the vulnerability's nature, given the "In The Wild" status.
  2. Enhanced Monitoring: Increase security monitoring for suspicious activity, focusing on systems potentially affected by CVE-2024-8798.
  3. Security Information and Event Management (SIEM) Integration: Integrate the SIEM with SOCRadar to gain further insights into potential threats and improve response capabilities.
  4. Proactive Threat Intelligence: Leverage SOCRadar's threat intelligence services to stay updated on potential exploit techniques and indicators of compromise associated with CVE-2024-8798.

Additional Information

For further information regarding this incident, please utilize the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-8798 | zephyrproject-rtos Zephyr up to 3.7 ots_client.c olcp_ind_handler heap-based overflow (GHSA-r7pm-f93f-f7fp)
vuldb.com2025-02-04
CVE-2024-8798 | zephyrproject-rtos Zephyr up to 3.7 ots_client.c olcp_ind_handler heap-based overflow (GHSA-r7pm-f93f-f7fp) | A vulnerability classified as critical was found in zephyrproject-rtos Zephyr up to 3.7. Affected by this vulnerability is the function olcp_ind_handler of the file zephyr/subsys/bluetooth/services/ots/ots_client.c. The manipulation leads to heap-based buffer overflow. This vulnerability is known as <a href="https://vuldb.com/?source_cve.288505
vuldb.com
rss
forum
news
Understanding CVE-2024–8798: A Detailed Analysis and Mitigation
Karandarjishack2024-12-16
Understanding CVE-2024–8798: A Detailed Analysis and Mitigation | On November 4, 2024, Red Hat issued a security advisory regarding CVE-2024&#x2013;8798, a significant vulnerability in the xorg-x11-server and&#x2026;Continue reading on Medium »
medium.com
rss
forum
news

Social Media

CVE-2024-8798 (CVSS:7.5, HIGH) is Awaiting Analysis. No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client...https://t.co/yuMtNwXeWL #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0
CVE-2024-8798 No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c. https://t.co/GfwhKzFiIj
0
0
1

Affected Software

Configuration 1
TypeVendorProduct
OSZephyrprojectzephyr

References

ReferenceLink
[email protected]https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-r7pm-f93f-f7fp

CWE Details

CWE IDCWE NameDescription
CWE-122Heap-based Buffer OverflowA heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
CWE-20Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-787Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence