First published: Tue Dec 05 2023(Updated: )
Azure RTOS ThreadX is an advanced real-time operating system (RTOS) designed specifically for deeply embedded applications. An attacker can cause arbitrary read and write due to vulnerability in parameter checking mechanism in Azure RTOS ThreadX, which may lead to privilege escalation. The affected components include RTOS ThreadX v6.2.1 and below. The fixes have been included in ThreadX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure RTOS | <6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Azure RTOS ThreadX Remote Code Execution is CVE-2023-48693.
The severity of CVE-2023-48693 is critical.
The affected software for CVE-2023-48693 is Microsoft Azure Rtos Threadx up to version 6.3.0.
The vulnerability in Azure RTOS ThreadX occurs due to a vulnerability in the parameter checking mechanism.
An attacker can exploit CVE-2023-48693 to cause arbitrary read and write, leading to privilege escalation.