Description
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.
References (6)
Core 6
Core References
Third Party Advisory vdb-entry
technical-description
https://vuldb.com/?id.277764
Permissions Required signature
permissions-required
https://vuldb.com/?ctiid.277764
Third Party Advisory third-party-advisory
https://vuldb.com/?submit.409312
Exploit, Issue Tracking exploit
issue-tracking
https://github.com/micropython/micropython/issues/13006
Exploit, Third Party Advisory issue-tracking
https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455
Scores
CVSS v3
7.3
EPSS
0.0012
EPSS Percentile
30.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-122
CWE-787
Status
published
Products (5)
micropython/micropython
1.23.0
pypi/micropython-copy
0PyPI
pypi/micropython-io
0PyPI
pypi/micropython-os-path
0PyPI
pypi/micropython-string
0PyPI
Published
Sep 17, 2024
Tracked Since
Feb 18, 2026