CVE-2024-47248: Apache NimBLE: Buffer overflow in NimBLE MESH Bluetooth stack

Description

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE.

Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.

Users are recommended to upgrade to version 1.8.0, which fixes the issue.

Classification

CVE ID: CVE-2024-47248

Affected Products

Vendor: Apache Software Foundation

Product: Apache NimBLE

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.44% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz

Timeline