Vulnerabilities > TI > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-11-21 | CVE-2021-27502 | Integer Overflow or Wraparound vulnerability in TI products Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in code execution. | 7.8 |
2023-11-21 | CVE-2021-27504 | Integer Overflow or Wraparound vulnerability in multiple products Texas Instruments devices running FREERTOS, malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' for FreeRTOS, resulting in code execution. | 7.8 |
2023-11-20 | CVE-2021-22636 | Integer Overflow or Wraparound vulnerability in TI products Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in code execution. | 7.8 |
2023-11-20 | CVE-2021-27429 | Integer Overflow or Wraparound vulnerability in TI products Texas Instruments TI-RTOS returns a valid pointer to a small buffer on extremely large values. | 7.8 |
2023-10-19 | CVE-2022-25333 | Unspecified vulnerability in TI Omap L138 Firmware The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) performs an RSA check implemented in mask ROM when loading a module through the SK_LOAD routine. | 8.8 |
2023-10-19 | CVE-2022-25334 | Out-of-bounds Write vulnerability in TI Omap L138 Firmware The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) lacks a bounds check on the signature size field in the SK_LOAD module loading routine, present in mask ROM. | 8.8 |
2021-05-07 | CVE-2021-22677 | Unspecified vulnerability in TI products An integer overflow exists in the APIs of the host MCU while trying to connect to a WIFI network may lead to issues such as a denial-of-service condition or code execution on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior). | 7.8 |
2021-05-07 | CVE-2021-22673 | Out-of-bounds Write vulnerability in TI products The affected product is vulnerable to stack-based buffer overflow while processing over-the-air firmware updates from the CDN server, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior). | 8.0 |
2021-05-07 | CVE-2021-22675 | Unspecified vulnerability in TI products The affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior). | 7.2 |
2020-10-27 | CVE-2020-27892 | Unspecified vulnerability in TI Z-Stack 3.0.1 The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Discover Commands Received Response message or a ZCL Discover Commands Generated Response message. | 7.5 |