Gecko Bootloader Silabs Gecko Bootloader

Do you want an email whenever new security vulnerabilities are reported in Silabs Gecko Bootloader?

By the Year

In 2024 there have been 0 vulnerabilities in Silabs Gecko Bootloader . Last year Gecko Bootloader had 2 security vulnerabilities published. Right now, Gecko Bootloader is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 2 8.80
2022 1 9.10
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Gecko Bootloader vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Silabs Gecko Bootloader Security Vulnerabilities

An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier

CVE-2023-3487 7.8 - High - October 20, 2023

An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.

Integer Overflow or Wraparound

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules)

CVE-2023-4041 9.8 - Critical - August 23, 2023

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules) allows Code Injection, Authentication Bypass.This issue affects "Standalone" and "Application" versions of Gecko Bootloader.

Memory Corruption

Out-of-Bounds error in GBL parser in Silicon Labs Gecko Bootloader version 4.0.1 and earlier

CVE-2022-24936 9.1 - Critical - November 02, 2022

Out-of-Bounds error in GBL parser in Silicon Labs Gecko Bootloader version 4.0.1 and earlier allows attacker to overwrite flash Sign key and OTA decryption key via malicious bootloader upgrade.

Memory Corruption

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Silabs Gecko Bootloader or by Silabs? Click the Watch button to subscribe.

Silabs
Vendor

subscribe