First published: Fri May 07 2021(Updated: )
The affected product is vulnerable to stack-based buffer overflow while processing over-the-air firmware updates from the CDN server, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ti Cc3100 Software Development Kit | <=1.3.0 | |
Ti Cc3200 Software Development Kit | <=1.5.0 | |
Ti Simplelink Cc13x0 Software Development Kit | <4.10.03 | |
Ti Simplelink Cc13x2 Software Development Kit | <4.40.00 | |
Ti Simplelink Cc26xx Software Development Kit | <4.40.00 | |
Ti Simplelink Cc32xx Software Development Kit | <=4.30.00.06 | |
Ti Simplelink Msp432e4 Software Development Kit | <=4.20.00.12 | |
Texas Instruments SimpleLink CC26XX SDK: versions prior to v4.40.00 | ||
Texas Instruments CC3200 SDK: v1.5.0 and prior | ||
Texas Instruments CC3100 SDK: v1.3.0 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-22673.
CVE-2021-22673 has a severity of high.
CVE-2021-22673 affects Ti Cc3100 Software Development Kit, Ti Cc3200 Software Development Kit, Ti Simplelink Cc13x0 Software Development Kit, Ti Simplelink Cc13x2 Software Development Kit, Ti Simplelink Cc26xx Software Development Kit, and Ti Simplelink Cc32xx Software Development Kit.
An attacker can exploit CVE-2021-22673 by sending malicious over-the-air firmware updates from the CDN server, which triggers a stack-based buffer overflow and allows remote code execution on the affected SimpleLink Wi-Fi devices.
Yes, updating to MSP432E4 SDK v4.20.00.12 or later and CC32XX SDK v4.30.00.06 or later will fix the vulnerability.