First published: Fri Nov 04 2022(Updated: )
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Rtos Usbx | <6.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39344 is a vulnerability in Azure RTOS USBX that allows for a buffer overflow, leading to memory corruption.
CVE-2022-39344 affects Azure RTOS USBX versions prior to 6.1.12, allowing for buffer overflow and memory content overwrite through the USB DFU UPLOAD functionality.
CVE-2022-39344 has a severity rating of 9.8 (Critical).
USB DFU UPLOAD is a functionality in Azure RTOS USBX that allows for firmware updates over USB.
To mitigate CVE-2022-39344, users should update Azure RTOS USBX to version 6.1.12 or later, which resolves the buffer overflow vulnerability.