Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zephyrproject vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2021-3510
Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw...
Zephyrproject Zephyr 1.14.0
Zephyrproject Zephyr 1.14.1
Zephyrproject Zephyr 1.14.2
Zephyrproject Zephyr 1.14.3
Zephyrproject Zephyr 2.5.0
Zephyrproject Zephyr 2.5.1
Zephyrproject Zephyr 2.6.0
Zephyrproject Zephyr 2.6.1
6.4
CVSSv2
CVE-2021-3436
BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https:...
Zephyrproject Zephyr 1.14.2
Zephyrproject Zephyr 2.4.0
Zephyrproject Zephyr 2.5.0
5.8
CVSSv2
CVE-2021-3835
Buffer overflow in usb device class. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf
Zephyrproject Zephyr
Zephyrproject Zephyr 3.0.0
7.5
CVSSv2
CVE-2020-10022
A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version...
Zephyrproject Zephyr 2.1.0
Zephyrproject Zephyr 2.2.0
4.6
CVSSv2
CVE-2020-10023
The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos...
Zephyrproject Zephyr 1.14.1
Zephyrproject Zephyr 2.1.0
5.8
CVSSv2
CVE-2020-10059
The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-...
Zephyrproject Zephyr 2.1.0
Zephyrproject Zephyr 2.2.0
7.5
CVSSv2
CVE-2017-14199
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.
Zephyrproject Zephyr 1.9.0
Zephyrproject Zephyr 1.10.0
7.2
CVSSv2
CVE-2020-10067
A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execu...
Zephyrproject Zephyr 1.14.1
Zephyrproject Zephyr 2.1.0
7.2
CVSSv2
CVE-2020-10024
The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr...
Zephyrproject Zephyr 1.14.2
Zephyrproject Zephyr 2.1.0
7.2
CVSSv2
CVE-2020-10027
An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Zephyrproject Zephyr 1.14.0
Zephyrproject Zephyr 2.1.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »