CVE-2024-56318

7.5 HIGH

📋 TL;DR

A NULL pointer dereference vulnerability in Matter (Project CHIP) allows remote attackers to cause denial of service by sending specially crafted TCP packets with zero messageSize. This affects all systems running vulnerable versions of Matter/connectedhomeip software, particularly IoT devices and smart home ecosystems using this protocol.

💻 Affected Systems

Products:
  • Matter (connectedhomeip, Project CHIP)
Versions: All versions through 1.4.0.0 before commit 27ca6ec255b78168e04bd71e0f1a473869cf144b
Operating Systems: All platforms running Matter protocol
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any device or application using the vulnerable TCP implementation in Matter protocol stack.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of affected Matter devices, potentially rendering smart home/IoT devices unresponsive until manually restarted.

🟠

Likely Case

Targeted devices crash and become temporarily unavailable, requiring restart to restore functionality.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated software.

🌐 Internet-Facing: MEDIUM - Requires TCP access to vulnerable service, but many IoT devices may be exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could exploit this within local networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed TCP packets to vulnerable service, no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 27ca6ec255b78168e04bd71e0f1a473869cf144b and later

Vendor Advisory: https://github.com/project-chip/connectedhomeip/commit/27ca6ec255b78168e04bd71e0f1a473869cf144b

Restart Required: Yes

Instructions:

1. Update Matter/connectedhomeip to version including commit 27ca6ec255b78168e04bd71e0f1a473869cf144b or later. 2. Rebuild and redeploy affected applications. 3. Restart all Matter-enabled devices and services.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Matter devices from untrusted networks using firewalls or VLANs.

TCP Filtering

all

Block or filter TCP packets with suspicious patterns at network perimeter.

🧯 If You Can't Patch

  • Implement strict network access controls to limit TCP connections to Matter devices
  • Monitor for abnormal TCP traffic patterns and device crashes

🔍 How to Verify

Check if Vulnerable:

Check if Matter/connectedhomeip version is before commit 27ca6ec255b78168e04bd71e0f1a473869cf144b

Check Version:

Check build version or git commit hash of connectedhomeip installation

Verify Fix Applied:

Verify the code includes the fix from commit 27ca6ec255b78168e04bd71e0f1a473869cf144b in TCPBase::ProcessSingleMessage

📡 Detection & Monitoring

Log Indicators:

  • Process crashes in Matter services
  • NULL pointer exception logs
  • TCP connection resets

Network Indicators:

  • TCP packets with zero-length payloads to Matter ports
  • Abnormal TCP traffic patterns

SIEM Query:

Process termination events from Matter executables OR TCP packets with size=0 to Matter ports

🔗 References

📤 Share & Export