Vulnerabilities (CVE)

Filtered by vendor Zephyrproject Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-4257 1 Zephyrproject 1 Zephyr 2024-01-12 N/A 9.8 CRITICAL
Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.
CVE-2023-4260 1 Zephyrproject 1 Zephyr 2023-12-22 N/A 10.0 CRITICAL
Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.
CVE-2023-4262 1 Zephyrproject 1 Zephyr 2023-12-22 N/A 10.0 CRITICAL
Possible buffer overflow  in Zephyr mgmt subsystem when asserts are disabled
CVE-2023-4264 1 Zephyrproject 1 Zephyr 2023-12-22 N/A 9.6 CRITICAL
Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem.
CVE-2023-3725 1 Zephyrproject 1 Zephyr 2023-12-22 N/A 9.8 CRITICAL
Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem
CVE-2023-5055 1 Zephyrproject 1 Zephyr 2023-12-01 N/A 9.8 CRITICAL
Possible variant of CVE-2021-3434 in function le_ecred_reconf_req.
CVE-2021-3323 1 Zephyrproject 1 Zephyr 2021-10-18 7.5 HIGH 9.8 CRITICAL
Integer Underflow in 6LoWPAN IPHC Header Uncompression in Zephyr. Zephyr versions >= >=2.4.0 contain Integer Underflow (Wrap or Wraparound) (CWE-191). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc
CVE-2021-3319 1 Zephyrproject 1 Zephyr 2021-10-14 7.5 HIGH 9.8 CRITICAL
DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364
CVE-2021-3625 1 Zephyrproject 1 Zephyr 2021-10-13 7.5 HIGH 9.8 CRITICAL
Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363
CVE-2020-10064 1 Zephyrproject 1 Zephyr 2021-05-28 7.5 HIGH 9.8 CRITICAL
Improper Input Frame Validation in ieee802154 Processing. Zephyr versions >= v1.14.2, >= v2.2.0 contain Stack-based Buffer Overflow (CWE-121), Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3gvq-h42f-v3c7
CVE-2020-13601 1 Zephyrproject 1 Zephyr 2021-05-27 7.5 HIGH 9.8 CRITICAL
Possible read out of bounds in dns read. Zephyr versions >= 1.14.2, >= 2.3.0 contain Out-of-bounds Read (CWE-125). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mm57-9hqw-qh44
CVE-2020-10071 1 Zephyrproject 1 Zephyr 2020-06-12 7.5 HIGH 9.8 CRITICAL
The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
CVE-2020-10070 1 Zephyrproject 1 Zephyr 2020-06-12 7.5 HIGH 9.8 CRITICAL
In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
CVE-2020-10062 1 Zephyrproject 1 Zephyr 2020-06-12 7.5 HIGH 9.8 CRITICAL
An off-by-one error in the Zephyr project MQTT packet length decoder can result in memory corruption and possible remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
CVE-2020-10022 1 Zephyrproject 1 Zephyr 2020-06-05 7.5 HIGH 9.8 CRITICAL
A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
CVE-2018-1000800 1 Zephyrproject 1 Zephyr 2020-05-13 7.5 HIGH 9.8 CRITICAL
zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put).
CVE-2017-14199 1 Zephyrproject 1 Zephyr 2020-05-13 7.5 HIGH 9.8 CRITICAL
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.