Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU41109
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-10061
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Improper handling of the full-buffer case in the Zephyr Bluetooth implementation can result in memory corruption. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.
MitigationInstall update from vendor's website.
Vulnerable software versionszephyr: 2.1.0
CPE2.3 External linkshttps://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10061
https://github.com/zephyrproject-rtos/zephyr/pull/23091
https://github.com/zephyrproject-rtos/zephyr/pull/23516
https://github.com/zephyrproject-rtos/zephyr/pull/23517
https://github.com/zephyrproject-rtos/zephyr/pull/23547
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41110
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-10068
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In the Zephyr project Bluetooth subsystem, certain duplicate and back-to-back packets can cause incorrect behavior, resulting in a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.
MitigationInstall update from vendor's website.
Vulnerable software versionszephyr: 2.1.0
CPE2.3 External linkshttps://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10068
https://github.com/zephyrproject-rtos/zephyr/pull/23091
https://github.com/zephyrproject-rtos/zephyr/pull/23707
https://github.com/zephyrproject-rtos/zephyr/pull/23708
https://github.com/zephyrproject-rtos/zephyr/pull/23964
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41112
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-10021
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to execute arbitrary code.
Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
MitigationInstall update from vendor's website.
Vulnerable software versionszephyr: 2.1.0
CPE2.3 External linkshttps://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10021
https://github.com/zephyrproject-rtos/zephyr/pull/23240
https://github.com/zephyrproject-rtos/zephyr/pull/23455
https://github.com/zephyrproject-rtos/zephyr/pull/23456
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.