7.8
CWE
190 191 120 119
Advisory Published
Updated

CVE-2022-39343: Azure RTOS FileX vulnerable to Buffer Offerflow

First published: Tue Nov 08 2022(Updated: )

Azure RTOS FileX is a FAT-compatible file system that’s fully integrated with Azure RTOS ThreadX. In versions before 6.2.0, the Fault Tolerant feature of Azure RTOS FileX includes integer under and overflows which may be exploited to achieve buffer overflow and modify memory contents. When a valid log file with correct ID and checksum is detected by the `_fx_fault_tolerant_enable` function an attempt to recover the previous failed write operation is taken by call of `_fx_fault_tolerant_apply_logs`. This function iterates through the log entries and performs required recovery operations. When properly crafted a log including entries of type `FX_FAULT_TOLERANT_DIR_LOG_TYPE` may be utilized to introduce unexpected behavior. This issue has been patched in version 6.2.0. A workaround to fix line 218 in fx_fault_tolerant_apply_logs.c is documented in the GHSA.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Microsoft Azure RTOS<6.2.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-39343?

    CVE-2022-39343 is considered to have a high severity level due to the potential for exploitation through buffer overflow.

  • How do I fix CVE-2022-39343?

    To fix CVE-2022-39343, you should upgrade Azure RTOS FileX to version 6.2.0 or later.

  • What versions of Azure RTOS FileX are affected by CVE-2022-39343?

    CVE-2022-39343 affects all versions of Azure RTOS FileX prior to 6.2.0.

  • What are the consequences of exploiting CVE-2022-39343?

    Exploiting CVE-2022-39343 can allow attackers to achieve a buffer overflow, potentially modifying memory contents and leading to unauthorized access.

  • Is CVE-2022-39343 specific to any operating system or environment?

    CVE-2022-39343 is specific to platforms utilizing Azure RTOS FileX version 6.2.0 and below.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203