Vulnerability identifier: #VU41112
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-787
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
zephyr
Other software /
Other software solutions
Vendor: rutantan
Description
The vulnerability allows a local authenticated user to execute arbitrary code.
Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Mitigation
Install update from vendor's website.
Vulnerable software versions
zephyr: 2.1.0
External links
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10021
https://github.com/zephyrproject-rtos/zephyr/pull/23240
https://github.com/zephyrproject-rtos/zephyr/pull/23455
https://github.com/zephyrproject-rtos/zephyr/pull/23456
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.