CVE-2025-12899

6.5 MEDIUM

📋 TL;DR

A vulnerability in Zephyr's network stack allows specially crafted IPv4 packets with ICMP type 128 to be incorrectly processed as ICMPv6 Echo Requests, leading to out-of-bounds memory reads. This creates an information leak risk where attackers could potentially read sensitive memory contents. This affects systems running vulnerable versions of Zephyr RTOS with networking enabled.

💻 Affected Systems

Products:
  • Zephyr RTOS
Versions: Versions before v3.7.2
Operating Systems: Zephyr RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with IPv4 networking enabled. Devices using Zephyr in embedded/IoT applications are primarily affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive memory contents including cryptographic keys, credentials, or other confidential data from the device's memory, potentially leading to complete system compromise.

🟠

Likely Case

Information disclosure where attackers can read portions of device memory, potentially exposing sensitive data or system state information.

🟢

If Mitigated

Limited information disclosure with no direct code execution, though leaked data could enable further attacks.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to send specially crafted packets. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.7.2 and later

Vendor Advisory: https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c2vg-hj83-c2vg

Restart Required: Yes

Instructions:

1. Update Zephyr RTOS to version 3.7.2 or later. 2. Rebuild your application with the updated Zephyr version. 3. Deploy the updated firmware to affected devices. 4. Restart devices to apply the fix.

🔧 Temporary Workarounds

Disable ICMP processing

all

Disable ICMP packet processing in the network stack to prevent exploitation

CONFIG_ICMP=n in prj.conf or Kconfig

Network filtering

linux

Block ICMP type 128 packets at network perimeter

iptables -A INPUT -p icmp --icmp-type 128 -j DROP

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable devices
  • Deploy network intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Zephyr version: if using version < 3.7.2 with networking enabled, system is vulnerable

Check Version:

Check Zephyr version in west.yml or CMakeLists.txt files

Verify Fix Applied:

Verify Zephyr version is 3.7.2 or later and rebuild application with updated version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected ICMP type 128 packets
  • Network stack errors or crashes
  • Memory access violation logs

Network Indicators:

  • ICMP type 128 packets to Zephyr devices
  • Unusual ICMPv6 traffic patterns

SIEM Query:

source_ip sends icmp.type=128 to destination_ip running_zephyr

🔗 References

📤 Share & Export