Texas Instruments SimpleLink
Act Now9.8ICS-CERT ICSA-21-119-01Apr 29, 2021
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Texas Instruments SimpleLink wireless microcontroller SDKs contain integer overflow (CWE-190) and stack-based buffer overflow (CWE-121) vulnerabilities. Successful exploitation could result in memory corruption, remote code execution, and denial-of-service conditions. Affected SDKs include CC13X0, CC26XX, CC3100, CC32XX, MSP432E4, CC3200, and CC13X2 families. No vendor fixes are available for any affected product.
What this means
What could happen
An attacker with network access could execute arbitrary code on SimpleLink-based wireless devices, potentially compromising sensor data integrity, disabling remote monitoring, or halting networked control functions in water treatment or power distribution systems. Memory corruption could also cause unpredictable device behavior or complete service loss.
Who's at risk
Water utilities and municipal electric providers using Texas Instruments SimpleLink wireless microcontrollers in remote monitoring systems, wireless sensor networks, IoT gateways, or networked field devices (RTUs, PMUs, water quality sensors). Any device running CC13X0, CC26XX, CC3100, CC32XX, MSP432E4, CC3200, or CC13X2 SDKs below the affected version thresholds is vulnerable.
How it could be exploited
An attacker on the same Wi-Fi network or with network path to a SimpleLink device sends a specially crafted packet that triggers an integer overflow or stack buffer overflow in the SDK firmware. The memory corruption allows the attacker to overwrite code or inject malicious instructions that execute with device privileges.
Prerequisites
- Network connectivity to the SimpleLink device (Wi-Fi or local network access)
- Device running vulnerable SDK version (no authentication required for exploit delivery)
Remotely exploitableNo authentication requiredLow complexity attackNo patch availableHigh CVSS score (9.8)Memory corruption can affect safety-critical functions
Exploitability
Low exploit probability (EPSS 0.8%)
Affected products (7)
7 EOL
ProductAffected VersionsFix Status
SimpleLink CC13X0 SDK:< 4.10.03No fix (EOL)
SimpleLink CC26XX SDK:< 4.40.00No fix (EOL)
CC3100 SDK: v1.3.0 and prior≤ 1.3.0No fix (EOL)
SimpleLink CC32XX SDK: v4.30.00.06 and prior≤ 4.30.00.06No fix (EOL)
SimpleLink MSP432E4 SDK: v4.20.00.12 and prior≤ 4.20.00.12No fix (EOL)
CC3200 SDK: v1.5.0 and prior≤ 1.5.0No fix (EOL)
SimpleLink CC13X2 SDK:< 4.40.00No fix (EOL)
Remediation & Mitigation
0/6
Do now
0/3HARDENINGIsolate all SimpleLink-based devices from Internet-connected networks and place them behind firewalls on segmented OT network subnets
HARDENINGRestrict network access to SimpleLink devices to only trusted devices and engineering workstations; whitelist IP addresses and MAC addresses at the network edge
HARDENINGConfigure wireless network to WPA3 encryption (or WPA2 with strong pre-shared key if WPA3 unavailable); disable open or WEP networks
Schedule — requires maintenance window
0/2Patching may require device reboot — plan for process interruption
HARDENINGMonitor SimpleLink devices for unexpected code execution, memory access patterns, or process restarts; establish alerting on abnormal behavior
WORKAROUNDContact Texas Instruments to inquire about future patch availability and register devices for security update notifications
Mitigations - no patch available
0/1The following products have reached End of Life with no planned fix: SimpleLink CC13X0 SDK:, SimpleLink CC26XX SDK:, CC3100 SDK: v1.3.0 and prior, SimpleLink CC32XX SDK: v4.30.00.06 and prior, SimpleLink MSP432E4 SDK: v4.20.00.12 and prior, CC3200 SDK: v1.5.0 and prior, SimpleLink CC13X2 SDK:. Apply the following compensating controls:
HARDENINGImplement network segmentation with VLAN isolation between SimpleLink devices and business network; monitor lateral movement with network intrusion detection
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/e4d3e941-17fa-4ee0-86f1-75c0b139bd01