CVE-2020-10060

HIGH

Zephyr < 2.4.0 - Denial of Service

Title source: rule
STIX 2.1

Description

In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.

Scores

CVSS v3 8.0
EPSS 0.0297
EPSS Percentile 86.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-119 CWE-824
Status published
Products (1)
zephyrproject/zephyr 2.1.0 - 2.4.0
Published May 11, 2020
Tracked Since Feb 18, 2026