Description
Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common/tinycrypt/source modules). This vulnerability is associated with program files ecc_dsa.C.

This issue affects IronOS: before v2.23-rc3.
Published: 2026-01-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Directory Traversal
Action: Upgrade
AI Analysis

Impact

A path traversal flaw exists in the tinycrypt library modules referenced by ecc_dsa.C within Ralim IronOS. The defect could allow an attacker to construct input that references files outside the intended directory, potentially exposing sensitive configuration files or allowing arbitrary file read. Although the description does not explicitly state a remote code execution vector, path traversal vulnerabilities are commonly leveraged to gain further footholds or to read executable binaries, which can lead to compromise. The vulnerability is specifically tied to the BLE stack component, indicating that the attack may occur through the device’s BLE interface or any middleware that processes BLE data.

Affected Systems

Ralim IronOS firmware versions prior to v2.23-rc3 are affected. Any deployment of these firmware releases inherits the path traversal defect in the tinycrypt layers, regardless of external modules or configurations. Users running older IronOS builds should verify the firmware version and consider upgrading to avoid the disclosed weakness.

Risk and Exploitability

The CVSS v3.1 base score of 6.9 denotes a moderate severity defect. The EPSS score of less than 1% indicates a very low probability of exploitation at the time of this assessment, and the vulnerability is not listed in the CISA KEV catalog. The most likely attack surface involves the device’s BLE interface or associated management services, where crafted inputs could trigger the path traversal. The impact is confinement to information disclosure or file access, but could serve as a step toward a broader compromise depending on the system’s configuration and the sensitivity of the exposed files.

Generated by OpenCVE AI on April 16, 2026 at 17:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade IronOS firmware to v2.23-rc3 or later, which removes the vulnerable ecc_dsa.C code.
  • Disable or restrict unused BLE services to reduce the attack surface that could be exploited through path traversal.
  • Verify that the device’s configuration restricts file access to the intended directories, ensuring that even if the flaw is present, file permissions limit the potential impact.

Generated by OpenCVE AI on April 16, 2026 at 17:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Tue, 03 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Ralim
Ralim ironos
Vendors & Products Ralim
Ralim ironos

Tue, 27 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
Description Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common/tinycrypt/source modules). This vulnerability is associated with program files ecc_dsa.C. This issue affects IronOS: before v2.23-rc3.
Title A Potential SPA-vulnerability in Ralim/IronOS
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/S:N/AU:N/R:U/V:C/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-03-03T15:57:24.371Z

Reserved: 2026-01-27T08:18:43.268Z

Link: CVE-2026-24801

cve-icon Vulnrichment

Updated: 2026-01-27T17:02:52.519Z

cve-icon NVD

Status : Deferred

Published: 2026-01-27T09:15:50.057

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24801

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:45:27Z

Weaknesses