CVE-2020-10023

MEDIUM

Zephyr - Buffer Overflow

Title source: rule
STIX 2.1

Description

The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

References (5)

Core 5
Core References
Third Party Advisory x_refsource_misc
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/23304
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/23646
Patch, Third Party Advisory x_refsource_misc
https://github.com/zephyrproject-rtos/zephyr/pull/23649

Scores

CVSS v3 6.9
EPSS 0.0038
EPSS Percentile 59.5%
Attack Vector PHYSICAL
CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (2)
zephyrproject/zephyr 1.14.1
zephyrproject/zephyr 2.1.0
Published May 11, 2020
Tracked Since Feb 18, 2026