The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade zephyrproject-rtos/zephyr
to version 3.7.0-rc2 or higher.
Affected versions of this package are vulnerable to Out-of-bounds Write through the ascs_cp_rsp_add
function due to an unchecked tailroom. An attacker can cause a buffer overflow and potentially execute arbitrary code or disrupt service by sending crafted input that exceeds the buffer limits.
Set the CONFIG_BT_L2CAP_TX_MTU
parameter to 253, which is the default value as defined in autoconf.h.
Set the num_ases
in the req
to a value greater than 85, ensuring that the resulting size exceeds the capacity of rsp_buf
, since 85×3>253.