CVE-2020-10022
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
11/05/2020
Last modified:
05/06/2020
Description
A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zephyrproject:zephyr:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zephyrproject:zephyr:2.2.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022
- https://github.com/zephyrproject-rtos/zephyr/pull/24065
- https://github.com/zephyrproject-rtos/zephyr/pull/24066
- https://github.com/zephyrproject-rtos/zephyr/pull/24154
- https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28



