CVE-2020-10059
Severity CVSS v4.0:
Pending analysis
Type:
CWE-295
Improper Certificate Validation
Publication date:
11/05/2020
Last modified:
05/06/2020
Description
The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
Impact
Base Score 3.x
4.80
Severity 3.x
MEDIUM
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zephyrproject:zephyr:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zephyrproject:zephyr:2.2.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10059
- https://github.com/zephyrproject-rtos/zephyr/pull/24954
- https://github.com/zephyrproject-rtos/zephyr/pull/24997
- https://github.com/zephyrproject-rtos/zephyr/pull/24999
- https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36



