Vulnerabilities (CVE)

Filtered by vendor Zephyrproject Subscribe
Total 104 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-10061 1 Zephyrproject 1 Zephyr 2024-11-21 5.8 MEDIUM 8.1 HIGH
Improper handling of the full-buffer case in the Zephyr Bluetooth implementation can result in memory corruption. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.
CVE-2020-10060 1 Zephyrproject 1 Zephyr 2024-11-21 5.5 MEDIUM 8.0 HIGH
In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
CVE-2020-10059 1 Zephyrproject 1 Zephyr 2024-11-21 5.8 MEDIUM 4.8 MEDIUM
The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
CVE-2020-10058 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 7.8 HIGH
Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
CVE-2020-10028 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 7.8 HIGH
Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
CVE-2020-10027 1 Zephyrproject 1 Zephyr 2024-11-21 7.2 HIGH 7.8 HIGH
An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
CVE-2020-10024 1 Zephyrproject 1 Zephyr 2024-11-21 7.2 HIGH 7.8 HIGH
The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
CVE-2020-10023 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 6.9 MEDIUM
The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
CVE-2020-10022 1 Zephyrproject 1 Zephyr 2024-11-21 7.5 HIGH 9.0 CRITICAL
A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
CVE-2020-10021 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 8.1 HIGH
Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
CVE-2020-10019 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 8.1 HIGH
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
CVE-2018-1000800 1 Zephyrproject 1 Zephyr 2024-11-21 7.5 HIGH 9.8 CRITICAL
zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put).
CVE-2017-14202 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 7.8 HIGH
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the shell component of Zephyr allows a serial or telnet connected user to cause a crash, possibly with arbitrary code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.
CVE-2017-14201 1 Zephyrproject 1 Zephyr 2024-11-21 4.6 MEDIUM 7.8 HIGH
Use After Free vulnerability in the Zephyr shell allows a serial or telnet connected user to cause denial of service, and possibly remote code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.
CVE-2017-14199 1 Zephyrproject 1 Zephyr 2024-11-21 7.5 HIGH 9.8 CRITICAL
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.
CVE-2024-6442 1 Zephyrproject 1 Zephyr 2024-11-13 N/A 6.3 MEDIUM
In ascs_cp_rsp_add in /subsys/bluetooth/audio/ascs.c, an unchecked tailroom could lead to a global buffer overflow.
CVE-2024-6444 1 Zephyrproject 1 Zephyr 2024-11-13 N/A 6.3 MEDIUM
No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.
CVE-2024-6443 1 Zephyrproject 1 Zephyr 2024-11-12 N/A 6.3 MEDIUM
In utf8_trunc in zephyr/lib/utils/utf8.c, last_byte_p can point to one byte before the string pointer if the string is empty.
CVE-2024-5754 1 Zephyrproject 1 Zephyr 2024-09-19 N/A 8.2 HIGH
BT: Encryption procedure host vulnerability
CVE-2024-6258 1 Zephyrproject 1 Zephyr 2024-09-19 N/A 6.8 MEDIUM
BT: Missing length checks of net_buf in rfcomm_handle_data