Show filters
129 Total Results
Displaying 101-110 of 129
Sort by:
Attacker Value
Unknown

CVE-2020-10071

Disclosure Date: May 25, 2020 (last updated February 21, 2025)
The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
Attacker Value
Unknown

CVE-2020-10068

Disclosure Date: May 25, 2020 (last updated February 21, 2025)
In the Zephyr project Bluetooth subsystem, certain duplicate and back-to-back packets can cause incorrect behavior, resulting in a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.
Attacker Value
Unknown

CVE-2020-10063

Disclosure Date: May 25, 2020 (last updated February 21, 2025)
A remote adversary with the ability to send arbitrary CoAP packets to be parsed by Zephyr is able to cause a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
Attacker Value
Unknown

CVE-2020-10062

Disclosure Date: May 25, 2020 (last updated February 21, 2025)
An off-by-one error in the Zephyr project MQTT packet length decoder can result in memory corruption and possible remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
Attacker Value
Unknown

CVE-2020-10069

Disclosure Date: May 25, 2020 (last updated February 22, 2025)
Zephyr Bluetooth unchecked packet data results in denial of service. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Parameters (CWE-233). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-f6vh-7v4x-8fjp
Attacker Value
Unknown

CVE-2020-10070

Disclosure Date: May 25, 2020 (last updated February 21, 2025)
In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
Attacker Value
Unknown

CVE-2020-10061

Disclosure Date: May 14, 2020 (last updated February 21, 2025)
Improper handling of the full-buffer case in the Zephyr Bluetooth implementation can result in memory corruption. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.
Attacker Value
Unknown

CVE-2020-10028

Disclosure Date: May 01, 2020 (last updated February 21, 2025)
Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Attacker Value
Unknown

CVE-2020-10024

Disclosure Date: May 01, 2020 (last updated February 21, 2025)
The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Attacker Value
Unknown

CVE-2020-10019

Disclosure Date: May 01, 2020 (last updated February 21, 2025)
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.