First published: Tue Dec 05 2023(Updated: )
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. An attacker can cause remote code execution due to memory buffer and pointer vulnerabilities in Azure RTOS USBX. The affected components include functions/processes in pictbridge and host class, related to PIMA, storage, CDC ACM, ECM, audio, hub in RTOS v6.2.1 and below. The fixes have been included in USBX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Azure Rtos Usbx | <6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48697 is a vulnerability in Azure RTOS USBX that allows remote code execution due to memory buffer and pointer vulnerabilities.
CVE-2023-48697 affects Azure RTOS USBX by causing remote code execution.
The severity of CVE-2023-48697 is critical with a CVSS score of 9.8.
Azure RTOS USBX versions up to, but not including, 6.3.0 are affected by CVE-2023-48697.
To fix CVE-2023-48697, it is recommended to update Azure RTOS USBX to version 6.3.0 or later.