Impact
A buffer overflow flaw exists in the getradiotapfield() function of ZerBea hcxpcapngtool version 7.0.1-43-g2ee308e. The overflow can be triggered when the tool processes malformed radiotap headers, allowing a local attacker to read memory beyond its intended bounds. This read can expose sensitive network traffic details or credentials stored in the tool’s memory, compromising confidentiality for the system on which the tool runs.
Affected Systems
The affected system is any machine running ZerBea hcxpcapngtool at the exact version 7.0.1-43-g2ee308e. No other versions or product variants are listed as impacted, so systems upgraded beyond this release or using a different tool are not affected.
Risk and Exploitability
With a CVSS score of 6.2 the vulnerability is classified as medium severity. The EPSS score is unavailable and it is not listed in the CISA KEV catalog, indicating limited evidence of exploitation in the wild. The attack requires local access and the ability to execute the tool; there is no documented remote vector. The potential impact is a breach of confidentiality for the data processed by the tool, which could include captured packets or associated user credentials.
OpenCVE Enrichment