Last Modified: Feb. 11, 2022
The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj
Tweets last week: 0
Remaining steady
Yahoo results: 0
Remaining steady
Current EPSS Score: 0.00066
Remaining steady
Reddit Posts: 1
Remaining steady
Github Repos: 1
Remaining steady
Found exploits:
Attack Vector: Physical
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Base Score: 6.8
Exploitability Score:
0.9
Impact Score: 5.9
CVSS V3: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Base Score: 7.2
Exploitability Score: 3.9
Impact Score: 10.0
CVSS V2: AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-787
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* Part: o Vendor: zephyrproject | Alle Schwachstellen für zephyrproject |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="local"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="read"/> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="local"/> <prop key="range" value="local"/> </set> </set>