CVE-2018-16526
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to leak information or execute arbitrary code because of a Buffer Overflow during generation of a protocol checksum in usGenerateProtocolChecksum and prvProcessIPPacket.
Amazon Web Services (AWS) FreeRTOS hasta la versión 1.3.1, FreeRTOS hasta V10.0.1 (con FreeRTOS+TCP) y el componente middleware TCP/IP WITTENSTEIN WHIS Connect permiten que atacantes remotos filtren información o ejecuten código arbitrario debido a un desbordamiento de búfer durante la generación de una suma de verificación del protocolo en usGenerateProtocolChecksum y prvProcessIPPacket.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-09-05 CVE Reserved
- 2018-12-06 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-10-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (3)
URL | Date | SRC |
---|---|---|
https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Amazon Search vendor "Amazon" | Amazon Web Services Freertos Search vendor "Amazon" for product "Amazon Web Services Freertos" | <= 1.3.1 Search vendor "Amazon" for product "Amazon Web Services Freertos" and version " <= 1.3.1" | - |
Affected
| ||||||
Amazon Search vendor "Amazon" | Freertos Search vendor "Amazon" for product "Freertos" | <= 10.0.1 Search vendor "Amazon" for product "Freertos" and version " <= 10.0.1" | - |
Affected
|