We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-8361

DoS caused due to wrong hash length returned for SHA2/224 algorithm



Description

In SiWx91x devices, the SHA2/224 algorithm returns a hash of 256 bits instead of 224 bits. This incorrect hash length triggers a software assertion, which subsequently causes a Denial of Service (DoS). If a watchdog is implemented, device will restart after watch dog expires. If watchdog is not implemented, device can be recovered only after a hard reset

Reserved 2024-08-30 | Published 2025-01-07 | Updated 2025-01-08 | Assigner Silabs


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-131 Incorrect Calculation of Buffer Size

Product status

Default status
unaffected

Any version
affected

References

community.silabs.com/068Vm00000I7zqo vendor-advisory permissions-required

cve.org (CVE-2024-8361)

nvd.nist.gov (CVE-2024-8361)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-8361

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.