First published: Tue Dec 05 2023(Updated: )
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components include processes/functions related to snmp, smtp, ftp and dtls in RTOS v6.2.1 and below. The fixes have been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Rtos Netx Duo | <6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48316 is a vulnerability in Azure RTOS NetX Duo that allows remote code execution due to memory overflow vulnerabilities.
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications.
CVE-2023-48316 has a severity rating of 9.8 (Critical).
An attacker can exploit CVE-2023-48316 by taking advantage of memory overflow vulnerabilities in Azure RTOS NetX Duo.
To fix CVE-2023-48316, it is recommended to update to a version of Azure RTOS NetX Duo that is not affected by the vulnerability.