First published: Tue Dec 05 2023(Updated: )
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components include processes/functions related to icmp, tcp, snmp, dhcp, nat and ftp in RTOS v6.2.1 and below. The fixes have been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Rtos Netx Duo | <6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48692 is a vulnerability in Azure RTOS NetX Duo that allows remote code execution due to memory overflow vulnerabilities.
Azure RTOS NetX Duo is a TCP/IP network stack designed for embedded real-time and IoT applications.
An attacker can exploit CVE-2023-48692 by causing memory overflow vulnerabilities in Azure RTOS NetX Duo to execute remote code.
CVE-2023-48692 has a severity level of 9.1, which is considered critical.
To fix the vulnerability, it is recommended to update Azure RTOS NetX Duo to version 6.3.0 or higher.