2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-10024" ,
"sourceIdentifier" : "vulnerabilities@zephyrproject.org" ,
"published" : "2020-05-11T23:15:11.583" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T04:54:40.487" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions."
} ,
{
"lang" : "es" ,
"value" : "El c\u00f3digo arm espec\u00edfico de la plataforma utiliza una comparaci\u00f3n de enteros con signo cuando se comprueban los n\u00fameros de llamada del sistema. Un atacante que ha obtenido una ejecuci\u00f3n de c\u00f3digo dentro de un subproceso (hilo) de usuario es capaz de elevar los privilegios a los del kernel. Consulte NCC-ZEP-001. Este problema afecta a: zephyrproject-rtos zephyr versi\u00f3n 1.14.0 y versiones posteriores. Versi\u00f3n 2.1.0 y versiones posteriores."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-11-23 13:10:58 +00:00
"source" : "vulnerabilities@zephyrproject.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 13:10:58 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
2024-11-23 13:10:58 +00:00
"attackComplexity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
2024-11-23 13:10:58 +00:00
"scope" : "CHANGED" ,
2023-04-24 12:24:31 +02:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 13:10:58 +00:00
"exploitabilityScore" : 1.1 ,
"impactScore" : 6.0
2023-04-24 12:24:31 +02:00
} ,
{
2024-11-23 13:10:58 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 13:10:58 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
2024-11-23 13:10:58 +00:00
"attackComplexity" : "LOW" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
2024-11-23 13:10:58 +00:00
"scope" : "UNCHANGED" ,
2023-04-24 12:24:31 +02:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 13:10:58 +00:00
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 7.2 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
2024-11-23 13:10:58 +00:00
"source" : "vulnerabilities@zephyrproject.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-697"
}
]
} ,
{
2024-11-23 13:10:58 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-697"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zephyrproject:zephyr:1.14.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B74694FC-5442-4F7E-AACF-0E1753F50148"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:zephyrproject:zephyr:2.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF33DD80-0286-477C-88A4-FCEC0D80F520"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10024" ,
"source" : "vulnerabilities@zephyrproject.org"
} ,
{
"url" : "https://github.com/zephyrproject-rtos/zephyr/pull/23323" ,
"source" : "vulnerabilities@zephyrproject.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/zephyrproject-rtos/zephyr/pull/23498" ,
"source" : "vulnerabilities@zephyrproject.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/zephyrproject-rtos/zephyr/pull/23535" ,
"source" : "vulnerabilities@zephyrproject.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30" ,
"source" : "vulnerabilities@zephyrproject.org" ,
"tags" : [
"Third Party Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10024" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://github.com/zephyrproject-rtos/zephyr/pull/23323" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/zephyrproject-rtos/zephyr/pull/23498" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/zephyrproject-rtos/zephyr/pull/23535" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}