CVE-2020-10071
Insufficient publish message length validation in MQTT
Severity Score
9.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.
El código de análisis de Zephyr MQTT realiza una comprobación insuficiente del campo de longitud en los mensajes de publicación, lo que permite un desbordamiento del búfer y potencialmente una ejecución de código remota. NCC-ZEP-031 Este problema afecta a: zephyrproject-rtos zephyr versión 2.2.0 y versiones posteriores
*Credits:
NCC Group for report
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2020-03-04 CVE Reserved
- 2020-06-05 CVE Published
- 2024-03-29 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE-129: Improper Validation of Array Index
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment | Third Party Advisory | |
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/989c4713ba429aa5105fe476b4d629718f3e6082 | 2020-06-12 |
URL | Date | SRC |
---|---|---|
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10071 | 2020-06-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zephyrproject Search vendor "Zephyrproject" | Zephyr Search vendor "Zephyrproject" for product "Zephyr" | <= 2.2.0 Search vendor "Zephyrproject" for product "Zephyr" and version " <= 2.2.0" | - |
Affected
|