// For flags

CVE-2022-39344

Azure RTOS USBX vulnerable to buffer overflow

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.

Azure RTOS USBX es una pila integrada de host, dispositivo y en movimiento (OTG) USB que está completamente integrada con Azure RTOS ThreadX. Antes de la versión 6.1.12, la funcionalidad USB DFU UPLOAD se puede utilizar para introducir un desbordamiento del búfer que provoca la sobrescritura del contenido de la memoria. En casos particulares, esto puede permitir que un atacante eluda las funciones de seguridad o ejecute código arbitrario. La implementación de la función `ux_device_class_dfu_control_request` evita el desbordamiento del búfer durante el manejo del comando DFU UPLOAD cuando el estado actual es `UX_SYSTEM_DFU_STATE_DFU_IDLE`. Este problema ha sido solucionado; actualice a la versión 6.1.12. Como workaround, agregue la verificación `UPLOAD_LENGTH` en todos los estados posibles.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-11-04 CVE Published
  • 2024-05-27 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Azure Rtos Usbx
Search vendor "Microsoft" for product "Azure Rtos Usbx"
< 6.1.12
Search vendor "Microsoft" for product "Azure Rtos Usbx" and version " < 6.1.12"
-
Affected