Vulnerabilities > Zephyrproject

DATE CVE VULNERABILITY TITLE RISK
2020-06-05 CVE-2020-10062 Off-by-one Error vulnerability in Zephyrproject Zephyr
An off-by-one error in the Zephyr project MQTT packet length decoder can result in memory corruption and possible remote code execution.
network
low complexity
zephyrproject CWE-193
critical
9.8
2020-06-05 CVE-2020-10061 Out-of-bounds Write vulnerability in Zephyrproject Zephyr
Improper handling of the full-buffer case in the Zephyr Bluetooth implementation can result in memory corruption.
low complexity
zephyrproject CWE-787
8.8
2020-05-11 CVE-2020-10067 Integer Overflow or Wraparound vulnerability in Zephyrproject Zephyr 1.14.1/2.1.0
A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers.
local
low complexity
zephyrproject CWE-190
7.8
2020-05-11 CVE-2020-10060 Access of Uninitialized Pointer vulnerability in Zephyrproject Zephyr 2.1.0/2.2.0/2.3.0
In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places.
network
low complexity
zephyrproject CWE-824
6.5
2020-05-11 CVE-2020-10059 Improper Certificate Validation vulnerability in Zephyrproject Zephyr 2.1.0/2.2.0
The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack.
network
high complexity
zephyrproject CWE-295
4.8
2020-05-11 CVE-2020-10058 Improper Input Validation vulnerability in Zephyrproject Zephyr 2.1.0
Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges.
local
low complexity
zephyrproject CWE-20
7.8
2020-05-11 CVE-2020-10028 Improper Input Validation vulnerability in Zephyrproject Zephyr 1.14.0/2.1.0
Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions.
local
low complexity
zephyrproject CWE-20
7.8
2020-05-11 CVE-2020-10027 Incorrect Comparison vulnerability in Zephyrproject Zephyr 1.14.0/2.1.0
An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel.
local
low complexity
zephyrproject CWE-697
7.8
2020-05-11 CVE-2020-10024 Incorrect Comparison vulnerability in Zephyrproject Zephyr 1.14.2/2.1.0
The arm platform-specific code uses a signed integer comparison when validating system call numbers.
local
low complexity
zephyrproject CWE-697
7.8
2020-05-11 CVE-2020-10023 Classic Buffer Overflow vulnerability in Zephyrproject Zephyr 1.14.1/2.1.0
The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel.
low complexity
zephyrproject CWE-120
6.8