First published: Thu Jul 22 2021(Updated: )
A buffer overflow vulnerability in the USBH_ParseInterfaceDesc() function of STMicroelectronics STM32Cube Middleware v1.8.0 and below allows attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
St Stm32cube Middleware | <=1.8.0 | |
St Stm32h7b3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-34260 is medium.
An attacker can exploit CVE-2021-34260 by triggering a buffer overflow in the USBH_ParseInterfaceDesc() function of STMicroelectronics STM32Cube Middleware v1.8.0 and below, allowing them to execute arbitrary code.
The affected software of CVE-2021-34260 is STMicroelectronics STM32Cube Middleware v1.8.0 and below.
No, STMicroelectronics STM32h7b3 is not vulnerable to CVE-2021-34260.
Yes, it is recommended to update to a version of STMicroelectronics STM32Cube Middleware above 1.8.0 to fix CVE-2021-34260.