Description
A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
References (5)
Core 5
Core References
Third Party Advisory x_refsource_misc
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/24154
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/24065
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/24066
Various Sources x_refsource_misc
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022
Scores
CVSS v3
9.0
EPSS
0.0170
EPSS Percentile
82.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (2)
zephyrproject/zephyr
2.1.0
zephyrproject/zephyr
2.2.0
Published
May 11, 2020
Tracked Since
Feb 18, 2026