CVE-2020-10022 (GCVE-0-2020-10022)
Vulnerability from cvelistv5
Published
2020-05-11 22:26
Modified
2024-09-16 23:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
zephyrproject-rtos | zephyr |
Version: 2.1.0 < unspecified Version: 2.2.0 < unspecified |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24154" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24065" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24066" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "zephyr", "vendor": "zephyrproject-rtos", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "2.2.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "NCC Group for report" } ], "datePublic": "2020-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-05T17:37:36", "orgId": "e2e69745-5e70-4e92-8431-deb5529a81ad", "shortName": "zephyr" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24154" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24065" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24066" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022" } ], "source": { "defect": [ "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28" ], "discovery": "EXTERNAL" }, "title": "UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnerabilities@zephyrproject.org", "DATE_PUBLIC": "2020-05-01T00:00:00.000Z", "ID": "CVE-2020-10022", "STATE": "PUBLIC", "TITLE": "UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "zephyr", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.1.0" }, { "version_affected": "\u003e=", "version_value": "2.2.0" } ] } } ] }, "vendor_name": "zephyrproject-rtos" } ] } }, "credit": [ { "lang": "eng", "value": "NCC Group for report" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28", "refsource": "MISC", "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28" }, { "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24154", "refsource": "MISC", "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24154" }, { "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24065", "refsource": "MISC", "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24065" }, { "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24066", "refsource": "MISC", "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24066" }, { "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022", "refsource": "MISC", "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022" } ] }, "source": { "defect": [ "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "e2e69745-5e70-4e92-8431-deb5529a81ad", "assignerShortName": "zephyr", "cveId": "CVE-2020-10022", "datePublished": "2020-05-11T22:26:12.494138Z", "dateReserved": "2020-03-03T00:00:00", "dateUpdated": "2024-09-16T23:45:41.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-10022\",\"sourceIdentifier\":\"vulnerabilities@zephyrproject.org\",\"published\":\"2020-05-11T23:15:11.457\",\"lastModified\":\"2024-11-21T04:54:40.253\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.\"},{\"lang\":\"es\",\"value\":\"Una carga \u00fatil JSON malformada que es recibida desde un servidor UpdateHub puede desencadenar una corrupci\u00f3n de la memoria en el Sistema Operativo Zephyr. Esto podr\u00eda resultar en una denegaci\u00f3n de servicio en el mejor de los casos, o una ejecuci\u00f3n de c\u00f3digo en el peor de los casos. Consulte NCC-NCC-016. Este problema afecta a: zephyrproject-rtos zephyr versi\u00f3n 2.1.0 y versiones posteriores. Versi\u00f3n 2.2.0 y versiones posteriores.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vulnerabilities@zephyrproject.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"vulnerabilities@zephyrproject.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zephyrproject:zephyr:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF33DD80-0286-477C-88A4-FCEC0D80F520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:zephyrproject:zephyr:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677DD0A3-502D-45F1-9CC8-8DDB8F230DFC\"}]}]}],\"references\":[{\"url\":\"https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022\",\"source\":\"vulnerabilities@zephyrproject.org\"},{\"url\":\"https://github.com/zephyrproject-rtos/zephyr/pull/24065\",\"source\":\"vulnerabilities@zephyrproject.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zephyrproject-rtos/zephyr/pull/24066\",\"source\":\"vulnerabilities@zephyrproject.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zephyrproject-rtos/zephyr/pull/24154\",\"source\":\"vulnerabilities@zephyrproject.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28\",\"source\":\"vulnerabilities@zephyrproject.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/zephyrproject-rtos/zephyr/pull/24065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zephyrproject-rtos/zephyr/pull/24066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zephyrproject-rtos/zephyr/pull/24154\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…