First published: Thu Dec 06 2018(Updated: )
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds access to TCP source and destination port fields in xProcessReceivedTCPPacket can leak data back to an attacker.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Amazon Web Services Freertos | <=1.3.1 | |
Amazon Freertos | <=10.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16603 has been classified with a high severity due to out-of-bounds access that could lead to data leakage.
To fix CVE-2018-16603, upgrade to AWS FreeRTOS version 1.3.2 or later, or FreeRTOS version 10.0.2 or later.
CVE-2018-16603 affects AWS FreeRTOS versions up to 1.3.1 and FreeRTOS versions up to 10.0.1 that include the FreeRTOS+TCP component.
The potential impact of CVE-2018-16603 includes unauthorized data leakage through TCP packet handling.
There have been no reported instances of CVE-2018-16603 being actively exploited in the wild, but it is recommended to patch the vulnerability as a precaution.