First published: Tue Dec 05 2023(Updated: )
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause an out-of-bounds write in Azure RTOS NETX Duo, that could lead to remote code execution. The affected components include process related to IGMP protocol in RTOS v6.2.1 and below. The fix has been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Rtos Netx Duo | <6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48691 is a vulnerability in Azure RTOS NetX Duo that allows an attacker to cause remote code execution through an out-of-bounds write.
CVE-2023-48691 has a severity rating of 9.8 (Critical).
Azure RTOS NetX Duo is a TCP/IP network stack designed for deeply embedded real-time and IoT applications.
The vulnerability in Azure RTOS NetX Duo can be exploited by causing an out-of-bounds write, potentially leading to remote code execution.
Yes, it is recommended to upgrade to a version of Azure RTOS NetX Duo beyond 6.3.0 to mitigate CVE-2023-48691.