First published: Mon Jan 01 2024(Updated: )
STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ST X-Cube-SafeA1 | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50096 is considered to be a high severity vulnerability due to its potential for MCU code execution.
To fix CVE-2023-50096, upgrade to the STSAFE-A1xx middleware version 3.3.7 or later.
CVE-2023-50096 affects devices using the X-CUBE-SAFEA1 Software Package version 1.2.0 for STSAFE-A.
CVE-2023-50096 is caused by a buffer overflow in the StSafeA_ReceiveBytes function in the affected software.
Exploiting CVE-2023-50096 can potentially allow an adversary to execute arbitrary code on the MCU if they can access the I2C bus.