Description
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
References (5)
Core 5
Core References
Third Party Advisory x_refsource_misc
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/23190
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/23457
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/23460
Various Sources x_refsource_misc
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
Scores
CVSS v3
8.1
EPSS
0.0022
EPSS Percentile
44.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (1)
zephyrproject/zephyr
< 1.14.2
Published
May 11, 2020
Tracked Since
Feb 18, 2026