First published: Thu Mar 07 2024(Updated: )
FreeRTOS is a real-time operating system for microcontrollers. FreeRTOS Kernel versions through 10.6.1 do not sufficiently protect against local privilege escalation via Return Oriented Programming techniques should a vulnerability exist that allows code injection and execution. These issues affect ARMv7-M MPU ports, and ARMv8-M ports with Memory Protected Unit (MPU) support enabled (i.e. `configENABLE_MPU` set to 1). These issues are fixed in version 10.6.2 with a new MPU wrapper.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon FreeRTOS | <10.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28115 is categorized as a high-severity vulnerability due to the potential for local privilege escalation.
To mitigate CVE-2024-28115, update FreeRTOS Kernel to version 10.6.2 or later.
CVE-2024-28115 affects FreeRTOS Kernel versions up to and including 10.6.1.
CVE-2024-28115 can be exploited through Return Oriented Programming techniques if there is a code injection vulnerability.
CVE-2024-28115 requires local access to exploit, making remote exploitation unlikely.