First published: Tue Dec 05 2023(Updated: )
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components include processes/functions related to ftp and sntp in RTOS v6.2.1 and below. The fixes have been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Rtos Netx Duo | <6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48315 is a vulnerability in Azure RTOS NetX Duo that allows remote code execution due to memory overflow vulnerabilities.
Azure RTOS NetX Duo is a TCP/IP network stack designed for deeply embedded real-time and IoT applications.
CVE-2023-48315 has a severity rating of 9.8, which is classified as critical.
An attacker can exploit CVE-2023-48315 by exploiting memory overflow vulnerabilities in Azure RTOS NetX Duo, allowing for remote code execution.
A fix for CVE-2023-48315 may be available from Microsoft. It is recommended to update to the latest version of Azure RTOS NetX Duo.