First published: Mon May 11 2020(Updated: )
A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | =2.1.0 | |
Zephyr Project Manager | =2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10022 has a critical severity level due to potential memory corruption and code execution vulnerabilities.
To fix CVE-2020-10022, upgrade Zephyr OS to a version that includes the security patches for this vulnerability.
CVE-2020-10022 affects Zephyr OS versions 2.1.0 and 2.2.0.
CVE-2020-10022 can lead to denial of service or arbitrary code execution depending on the exploitation method.
At this time, there is no public information indicating that CVE-2020-10022 is being actively exploited.