First published: Mon May 11 2020(Updated: )
An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | =1.14.0 | |
Zephyr Project Manager | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10027 is considered a high-severity vulnerability allowing privilege escalation from user thread execution to kernel level.
To mitigate CVE-2020-10027, upgrade to Zephyr versions later than 1.14.0 and 2.1.0 that include the necessary patches.
CVE-2020-10027 affects Zephyr versions 1.14.0 and later, as well as 2.1.0 and later versions.
CVE-2020-10027 requires an attacker to have code execution within a user thread, making a remote exploit challenging.
Systems running affected versions of the Zephyr Project RTOS are vulnerable to CVE-2020-10027.