Impact
Golioth Firmware SDK versions prior to 0.22.0 contain an out‑of‑bounds read that results from copying a blockwise transfer path into a fixed‑size buffer without appending a terminating NUL byte. The buffer is later processed with a strlen call, allowing the code to read beyond the allocated memory and trigger a crash. This flaw is a classic example of CWE‑170 Improper Null Termination and can lead to a denial of service for the device that is running the vulnerable SDK.
Affected Systems
The vulnerability affects all releases of the Golioth Firmware SDK with versions 0.19.1 and earlier than 0.22.0. The issue is fixed in commit 0e788217 and subsequent releases such as 0.22.0 and later.
Risk and Exploitability
The CVSS score of 2.1 indicates low overall severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The flaw is not listed in the CISA KEV catalog. The attack surface is limited to application‑controlled input; the vulnerability is not remotely exploitable over the network by default. Even though exploitation would only cause a crash, the limited scope reduces the urgency but still warrants mitigation by upgrading the SDK.
OpenCVE Enrichment