CVE-2020-10071Classic Buffer Overflow in Zephyr

Severity
9.8CRITICALNVD
CNA9.0
EPSS
13.9%
top 5.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 5
Latest updateMay 24

Description

The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5zephyrproject-rtos/zephyr2.2.0unspecified

Patches

🔴Vulnerability Details

2
GHSA
GHSA-x73g-qmcm-3qgq: The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote2022-05-24
CVEList
Insufficient publish message length validation in MQTT2020-06-05
CVE-2020-10071 — Classic Buffer Overflow in Zephyr | cvebase