CVE-2020-10058
- EPSS 0.08%
- Veröffentlicht 11.05.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:54:43
Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later ver...
CVE-2020-10059
- EPSS 0.37%
- Veröffentlicht 11.05.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:54:43
The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This...
CVE-2017-14201
- EPSS 0.7%
- Veröffentlicht 29.08.2019 01:15:10
- Zuletzt bearbeitet 21.11.2024 03:12:20
Use After Free vulnerability in the Zephyr shell allows a serial or telnet connected user to cause denial of service, and possibly remote code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.
CVE-2017-14202
- EPSS 0.16%
- Veröffentlicht 29.08.2019 01:15:10
- Zuletzt bearbeitet 21.11.2024 03:12:21
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the shell component of Zephyr allows a serial or telnet connected user to cause a crash, possibly with arbitrary code execution. This issue affects: Zephyr shell...
CVE-2017-14199
- EPSS 0.55%
- Veröffentlicht 12.04.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:12:20
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.
CVE-2018-1000800
- EPSS 0.37%
- Veröffentlicht 06.09.2018 17:29:02
- Zuletzt bearbeitet 21.11.2024 03:40:22
zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call...