First published: Mon May 11 2020(Updated: )
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <1.14.2 | |
Zephyr Project Manager | >=2.0.0<=2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10019 is classified as a high severity vulnerability due to the potential for remote exploitation through a buffer overflow.
To fix CVE-2020-10019, update to Zephyr version 1.14.2 or later, or apply relevant patches.
CVE-2020-10019 affects Zephyr versions 1.14.1 and later, specifically versions up to 1.14.2 and between 2.0.0 and 2.1.0.
If exploited, CVE-2020-10019 could allow a malicious USB host to cause a buffer overflow, potentially leading to arbitrary code execution.
CVE-2020-10019 is specific to the Zephyr RTOS used in various embedded devices.