CVE-2024-3017

6.5 MEDIUM

📋 TL;DR

A memory corruption vulnerability in Silicon Labs multi-protocol gateways allows attackers to crash the OpenThread Border Router application by exploiting a corrupt pointer in the radio co-processor. This causes temporary denial-of-service, affecting systems using these gateways for IoT/Thread network border routing.

💻 Affected Systems

Products:
  • Silicon Labs multi-protocol gateways with OpenThread Border Router functionality
Versions: Specific versions not detailed in advisory; all versions prior to patched SDK releases are likely affected.
Operating Systems: Embedded systems running Silicon Labs gateway firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using the multi-protocol radio co-processor (RCP) with OTBR functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent device crash requiring physical reset, disrupting all Thread network connectivity and dependent IoT operations.

🟠

Likely Case

Temporary OTBR application crash causing brief network disruption until automatic restart mechanisms recover service.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and recovery.

🌐 Internet-Facing: MEDIUM - Requires network access to the OTBR service, but many deployments have this exposed for IoT connectivity.
🏢 Internal Only: LOW - Internal attackers would need access to the Thread network or management interfaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires ability to send crafted packets to the OTBR service, but no authentication needed. Exploit involves triggering specific memory corruption conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest Simplicity SDK releases (specific version not specified in provided references)

Vendor Advisory: https://community.silabs.com/069Vm000007UEhZIAW

Restart Required: Yes

Instructions:

1. Update to latest Simplicity SDK from Silicon Labs GitHub. 2. Rebuild and flash gateway firmware. 3. Restart the gateway device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate OTBR services from untrusted networks to limit attack surface

Service Monitoring and Auto-restart

linux

Implement monitoring to detect OTBR crashes and automatically restart the service

# Example for Linux systems with systemd
# Create service monitor: sudo nano /etc/systemd/system/otbr-monitor.service
# Configure to restart on failure in otbr.service unit file

🧯 If You Can't Patch

  • Implement strict network access controls to OTBR services
  • Deploy redundant OTBR instances with failover capabilities

🔍 How to Verify

Check if Vulnerable:

Check if using Silicon Labs multi-protocol gateway with OTBR and verify SDK version against patched releases

Check Version:

Check device firmware version via manufacturer's management interface or CLI

Verify Fix Applied:

Verify SDK version is updated and test OTBR stability under normal and stress conditions

📡 Detection & Monitoring

Log Indicators:

  • OTBR application crash logs
  • Unexpected service restarts
  • RCP error messages

Network Indicators:

  • Unusual packet patterns to OTBR ports
  • Sudden loss of Thread network connectivity

SIEM Query:

service:"otbr" AND (event_type:"crash" OR event_type:"restart")

🔗 References

📤 Share & Export