Vulnerability identifier: #VU34391
Vulnerability risk: Medium
CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-120
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
zephyr
Other software /
Other software solutions
Vendor: rutantan
Description
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Mitigation
Install update from vendor's website.
Vulnerable software versions
zephyr: 1.14.1 - 2.1.0
External links
http://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10023
http://github.com/zephyrproject-rtos/zephyr/pull/23304
http://github.com/zephyrproject-rtos/zephyr/pull/23646
http://github.com/zephyrproject-rtos/zephyr/pull/23649
http://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.