zephyrproject CVE Vulnerabilities & Metrics

Focus on zephyrproject vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About zephyrproject Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with zephyrproject. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total zephyrproject CVEs: 105
Earliest CVE date: 06 Sep 2018, 17:29 UTC
Latest CVE date: 25 Feb 2025, 08:15 UTC

Latest CVE reference: CVE-2025-1674

Rolling Stats

30-day Count (Rolling): 2
365-day Count (Rolling): 17

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -32.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -32.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical zephyrproject CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.7

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 61
4.0-6.9 28
7.0-8.9 16
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS zephyrproject CVEs

These are the five CVEs with the highest CVSS scores for zephyrproject, sorted by severity first and recency.

All CVEs for zephyrproject

CVE-2025-1674 zephyrproject vulnerability CVSS: 0 25 Feb 2025, 08:15 UTC

A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.

CVE-2025-1673 zephyrproject vulnerability CVSS: 0 25 Feb 2025, 07:15 UTC

A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation.

CVE-2024-8798 zephyrproject vulnerability CVSS: 0 16 Dec 2024, 00:15 UTC

No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.

CVE-2024-11263 zephyrproject vulnerability CVSS: 0 15 Nov 2024, 23:15 UTC

When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols.

CVE-2024-6444 zephyrproject vulnerability CVSS: 0 04 Oct 2024, 07:15 UTC

No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.

CVE-2024-6443 zephyrproject vulnerability CVSS: 0 04 Oct 2024, 06:15 UTC

In utf8_trunc in zephyr/lib/utils/utf8.c, last_byte_p can point to one byte before the string pointer if the string is empty.

CVE-2024-6442 zephyrproject vulnerability CVSS: 0 04 Oct 2024, 06:15 UTC

In ascs_cp_rsp_add in /subsys/bluetooth/audio/ascs.c, an unchecked tailroom could lead to a global buffer overflow.

CVE-2024-6259 zephyrproject vulnerability CVSS: 0 13 Sep 2024, 21:15 UTC

BT: HCI: adv_ext_report Improper discarding in adv_ext_report

CVE-2024-6137 zephyrproject vulnerability CVSS: 0 13 Sep 2024, 20:15 UTC

BT: Classic: SDP OOB access in get_att_search_list

CVE-2024-6135 zephyrproject vulnerability CVSS: 0 13 Sep 2024, 20:15 UTC

BT:Classic: Multiple missing buf length checks

CVE-2024-5931 zephyrproject vulnerability CVSS: 0 13 Sep 2024, 20:15 UTC

BT: Unchecked user input in bap_broadcast_assistant

CVE-2024-6258 zephyrproject vulnerability CVSS: 0 13 Sep 2024, 19:15 UTC

BT: Missing length checks of net_buf in rfcomm_handle_data

CVE-2024-5754 zephyrproject vulnerability CVSS: 0 13 Sep 2024, 19:15 UTC

BT: Encryption procedure host vulnerability

CVE-2024-4785 zephyrproject vulnerability CVSS: 0 19 Aug 2024, 22:15 UTC

BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero

CVE-2024-3332 zephyrproject vulnerability CVSS: 0 03 Jul 2024, 17:15 UTC

A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device

CVE-2024-3077 zephyrproject vulnerability CVSS: 0 29 Mar 2024, 05:15 UTC

An malicious BLE device can crash BLE victim device by sending malformed gatt packet

CVE-2023-7060 zephyrproject vulnerability CVSS: 0 15 Mar 2024, 19:15 UTC

Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address.

CVE-2023-6881 zephyrproject vulnerability CVSS: 0 29 Feb 2024, 01:42 UTC

Possible buffer overflow in is_mount_point

CVE-2024-1638 zephyrproject vulnerability CVSS: 0 19 Feb 2024, 22:15 UTC

The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read.

CVE-2023-6249 zephyrproject vulnerability CVSS: 0 18 Feb 2024, 08:15 UTC

Signed to unsigned conversion esp32_ipm_send

CVE-2023-5779 zephyrproject vulnerability CVSS: 0 18 Feb 2024, 08:15 UTC

can: out of bounds in remove_rx_filter function

CVE-2023-6749 zephyrproject vulnerability CVSS: 0 18 Feb 2024, 07:15 UTC

Unchecked length coming from user input in settings shell

CVE-2023-5055 zephyrproject vulnerability CVSS: 0 21 Nov 2023, 18:15 UTC

Possible variant of CVE-2021-3434 in function le_ecred_reconf_req.

CVE-2023-4424 zephyrproject vulnerability CVSS: 0 21 Nov 2023, 07:15 UTC

An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device.

CVE-2023-5139 zephyrproject vulnerability CVSS: 0 26 Oct 2023, 05:15 UTC

Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver

CVE-2023-5753 zephyrproject vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c

CVE-2023-4257 zephyrproject vulnerability CVSS: 0 13 Oct 2023, 22:15 UTC

Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.

CVE-2023-4263 zephyrproject vulnerability CVSS: 0 13 Oct 2023, 21:15 UTC

Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver

CVE-2023-5563 zephyrproject vulnerability CVSS: 0 13 Oct 2023, 00:15 UTC

The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception.

CVE-2023-3725 zephyrproject vulnerability CVSS: 0 06 Oct 2023, 21:15 UTC

Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem

CVE-2023-5184 zephyrproject vulnerability CVSS: 0 27 Sep 2023, 18:15 UTC

Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.

CVE-2023-4264 zephyrproject vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem.

CVE-2023-4262 zephyrproject vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Possible buffer overflow  in Zephyr mgmt subsystem when asserts are disabled

CVE-2023-4260 zephyrproject vulnerability CVSS: 0 27 Sep 2023, 15:19 UTC

Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.

CVE-2023-4259 zephyrproject vulnerability CVSS: 0 26 Sep 2023, 00:15 UTC

Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.

CVE-2023-4258 zephyrproject vulnerability CVSS: 0 25 Sep 2023, 22:15 UTC

In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee.

CVE-2023-4265 zephyrproject vulnerability CVSS: 0 12 Aug 2023, 23:15 UTC

Potential buffer overflow vulnerabilities in the following locations: https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841

CVE-2023-2234 zephyrproject vulnerability CVSS: 0 10 Jul 2023, 16:15 UTC

Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host.

CVE-2023-1902 zephyrproject vulnerability CVSS: 0 10 Jul 2023, 16:15 UTC

The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.

CVE-2023-1901 zephyrproject vulnerability CVSS: 0 10 Jul 2023, 16:15 UTC

The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.

CVE-2023-0359 zephyrproject vulnerability CVSS: 0 10 Jul 2023, 16:15 UTC

A missing nullptr-check in handle_ra_input can cause a nullptr-deref.

CVE-2023-0779 zephyrproject vulnerability CVSS: 0 30 May 2023, 21:15 UTC

At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.

CVE-2021-3329 zephyrproject vulnerability CVSS: 0 26 Feb 2023, 07:15 UTC

Lack of proper validation in HCI Host stack initialization can cause a crash of the bluetooth stack

CVE-2023-0396 zephyrproject vulnerability CVSS: 0 25 Jan 2023, 02:02 UTC

A malicious / defective bluetooth controller can cause buffer overreads in the most functions that process HCI command responses.

CVE-2022-3806 zephyrproject vulnerability CVSS: 0 25 Jan 2023, 02:01 UTC

Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.

CVE-2023-0397 zephyrproject vulnerability CVSS: 0 19 Jan 2023, 06:15 UTC

A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete.

CVE-2021-3966 zephyrproject vulnerability CVSS: 0 11 Jan 2023, 05:15 UTC

usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.

CVE-2022-0553 zephyrproject vulnerability CVSS: 0 11 Jan 2023, 04:15 UTC

There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily.

CVE-2022-2993 zephyrproject vulnerability CVSS: 0 09 Dec 2022, 20:15 UTC

There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.

CVE-2022-2741 zephyrproject vulnerability CVSS: 0 31 Oct 2022, 18:15 UTC

The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).

CVE-2022-1841 zephyrproject vulnerability CVSS: 0 31 Aug 2022, 20:15 UTC

In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero.

CVE-2022-1042 zephyrproject vulnerability CVSS: 0 26 Jul 2022, 05:15 UTC

In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.

CVE-2022-1041 zephyrproject vulnerability CVSS: 0 26 Jul 2022, 05:15 UTC

In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.

CVE-2021-3435 zephyrproject vulnerability CVSS: 2.1 28 Jun 2022, 20:15 UTC

Information leakage in le_ecred_conn_req(). Zephyr versions >= v2.4.0 Use of Uninitialized Resource (CWE-908). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh

CVE-2021-3434 zephyrproject vulnerability CVSS: 4.6 28 Jun 2022, 20:15 UTC

Stack based buffer overflow in le_ecred_conn_req(). Zephyr versions >= v2.5.0 Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm

CVE-2021-3433 zephyrproject vulnerability CVSS: 2.1 28 Jun 2022, 20:15 UTC

Invalid channel map in CONNECT_IND results to Deadlock. Zephyr versions >= v2.5.0 Improper Check or Handling of Exceptional Conditions (CWE-703). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp

CVE-2021-3432 zephyrproject vulnerability CVSS: 5.0 28 Jun 2022, 20:15 UTC

Invalid interval in CONNECT_IND leads to Division by Zero. Zephyr versions >= v1.14.0 Divide By Zero (CWE-369). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4

CVE-2021-3431 zephyrproject vulnerability CVSS: 5.0 28 Jun 2022, 20:15 UTC

Assertion reachable with repeated LL_FEATURE_REQ. Zephyr versions >= v2.5.0 contain Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7548-5m6f-mqv9

CVE-2021-3430 zephyrproject vulnerability CVSS: 5.0 28 Jun 2022, 20:15 UTC

Assertion reachable with repeated LL_CONNECTION_PARAM_REQ. Zephyr versions >= v1.14 contain Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-46h3-hjcq-2jjr

CVE-2021-3861 zephyrproject vulnerability CVSS: 7.2 07 Feb 2022, 22:15 UTC

The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj

CVE-2021-3835 zephyrproject vulnerability CVSS: 5.8 07 Feb 2022, 22:15 UTC

Buffer overflow in usb device class. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf

CVE-2021-3455 zephyrproject vulnerability CVSS: 5.0 19 Oct 2021, 23:15 UTC

Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp

CVE-2021-3454 zephyrproject vulnerability CVSS: 5.0 19 Oct 2021, 23:15 UTC

Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3

CVE-2021-3330 zephyrproject vulnerability CVSS: 5.8 12 Oct 2021, 22:15 UTC

RCE/DOS: Linked-list corruption leading to large out-of-bounds write while sorting for forged fragment list in Zephyr. Zephyr versions >= >=2.4.0 contain Out-of-bounds Write (CWE-787). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fj4r-373f-9456

CVE-2021-3323 zephyrproject vulnerability CVSS: 7.5 12 Oct 2021, 22:15 UTC

Integer Underflow in 6LoWPAN IPHC Header Uncompression in Zephyr. Zephyr versions >= >=2.4.0 contain Integer Underflow (Wrap or Wraparound) (CWE-191). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc

CVE-2021-3322 zephyrproject vulnerability CVSS: 3.3 12 Oct 2021, 22:15 UTC

Unexpected Pointer Aliasing in IEEE 802154 Fragment Reassembly in Zephyr. Zephyr versions >= >=2.4.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p86r-gc4r-4mq3

CVE-2021-3321 zephyrproject vulnerability CVSS: 5.8 12 Oct 2021, 22:15 UTC

Integer Underflow in Zephyr in IEEE 802154 Fragment Reassembly Header Removal. Zephyr versions >= >=2.4.0 contain Integer Overflow to Buffer Overflow (CWE-680). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99

CVE-2021-3625 zephyrproject vulnerability CVSS: 7.5 05 Oct 2021, 21:15 UTC

Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363

CVE-2021-3581 zephyrproject vulnerability CVSS: 5.8 05 Oct 2021, 21:15 UTC

Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5

CVE-2021-3510 zephyrproject vulnerability CVSS: 5.0 05 Oct 2021, 21:15 UTC

Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4

CVE-2021-3436 zephyrproject vulnerability CVSS: 6.4 05 Oct 2021, 21:15 UTC

BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63

CVE-2021-3319 zephyrproject vulnerability CVSS: 7.5 05 Oct 2021, 21:15 UTC

DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364

CVE-2021-3320 zephyrproject vulnerability CVSS: 5.0 25 May 2021, 17:15 UTC

Type Confusion in 802154 ACK Frames Handling. Zephyr versions >= v2.4.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-27r3-rxch-2hm7

CVE-2020-13603 zephyrproject vulnerability CVSS: 4.6 25 May 2021, 17:15 UTC

Integer Overflow in memory allocating functions. Zephyr versions >= 1.14.2, >= 2.4.0 contain Integer Overflow or Wraparound (CWE-190). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94vp-8gc2-rm45

CVE-2020-13602 zephyrproject vulnerability CVSS: 2.1 25 May 2021, 17:15 UTC

Remote Denial of Service in LwM2M do_write_op_tlv. Zephyr versions >= 1.14.2, >= 2.2.0 contain Improper Input Validation (CWE-20), Loop with Unreachable Exit Condition ('Infinite Loop') (CWE-835). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-g9mg-fj58-6fqh

CVE-2020-13601 zephyrproject vulnerability CVSS: 7.5 25 May 2021, 17:15 UTC

Possible read out of bounds in dns read. Zephyr versions >= 1.14.2, >= 2.3.0 contain Out-of-bounds Read (CWE-125). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mm57-9hqw-qh44

CVE-2020-13600 zephyrproject vulnerability CVSS: 7.2 25 May 2021, 17:15 UTC

Malformed SPI in response for eswifi can corrupt kernel memory. Zephyr versions >= 1.14.2, >= 2.3.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx4p-j86p-2mhr

CVE-2020-13599 zephyrproject vulnerability CVSS: 2.1 25 May 2021, 17:15 UTC

Security problem with settings and littlefs. Zephyr versions >= 1.14.2, >= 2.3.0 contain Incorrect Default Permissions (CWE-276). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-5qhg-j6wc-4f6q

CVE-2020-13598 zephyrproject vulnerability CVSS: 4.6 25 May 2021, 17:15 UTC

FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat. Zephyr versions >= v1.14.2, >= v2.3.0 contain Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7fhv-rgxr-x56h

CVE-2020-10072 zephyrproject vulnerability CVSS: 4.6 25 May 2021, 17:15 UTC

Improper Handling of Insufficient Permissions or Privileges in zephyr. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Insufficient Permissions or Privileges (CWE-280). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-vf79-hqwm-w4xc

CVE-2020-10069 zephyrproject vulnerability CVSS: 3.3 25 May 2021, 17:15 UTC

Zephyr Bluetooth unchecked packet data results in denial of service. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Parameters (CWE-233). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-f6vh-7v4x-8fjp

CVE-2020-10066 zephyrproject vulnerability CVSS: 3.3 25 May 2021, 17:15 UTC

Incorrect Error Handling in Bluetooth HCI core. Zephyr versions >= v1.14.2, >= v2.2.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gc66-xfrc-24qr

CVE-2020-10065 zephyrproject vulnerability CVSS: 5.8 25 May 2021, 17:15 UTC

Missing Size Checks in Bluetooth HCI over SPI. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Length Parameter Inconsistency (CWE-130). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hg2w-62p6-g67c

CVE-2020-10064 zephyrproject vulnerability CVSS: 7.5 25 May 2021, 17:15 UTC

Improper Input Frame Validation in ieee802154 Processing. Zephyr versions >= v1.14.2, >= v2.2.0 contain Stack-based Buffer Overflow (CWE-121), Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3gvq-h42f-v3c7

CVE-2020-10071 zephyrproject vulnerability CVSS: 7.5 05 Jun 2020, 18:15 UTC

The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

CVE-2020-10070 zephyrproject vulnerability CVSS: 7.5 05 Jun 2020, 18:15 UTC

In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

CVE-2020-10068 zephyrproject vulnerability CVSS: 3.3 05 Jun 2020, 18:15 UTC

In the Zephyr project Bluetooth subsystem, certain duplicate and back-to-back packets can cause incorrect behavior, resulting in a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.

CVE-2020-10063 zephyrproject vulnerability CVSS: 5.0 05 Jun 2020, 18:15 UTC

A remote adversary with the ability to send arbitrary CoAP packets to be parsed by Zephyr is able to cause a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

CVE-2020-10062 zephyrproject vulnerability CVSS: 7.5 05 Jun 2020, 18:15 UTC

An off-by-one error in the Zephyr project MQTT packet length decoder can result in memory corruption and possible remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

CVE-2020-10061 zephyrproject vulnerability CVSS: 5.8 05 Jun 2020, 18:15 UTC

Improper handling of the full-buffer case in the Zephyr Bluetooth implementation can result in memory corruption. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.

CVE-2020-10067 zephyrproject vulnerability CVSS: 7.2 11 May 2020, 23:15 UTC

A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

CVE-2020-10060 zephyrproject vulnerability CVSS: 5.5 11 May 2020, 23:15 UTC

In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.

CVE-2020-10059 zephyrproject vulnerability CVSS: 5.8 11 May 2020, 23:15 UTC

The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.

CVE-2020-10058 zephyrproject vulnerability CVSS: 4.6 11 May 2020, 23:15 UTC

Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.

CVE-2020-10028 zephyrproject vulnerability CVSS: 4.6 11 May 2020, 23:15 UTC

Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

CVE-2020-10027 zephyrproject vulnerability CVSS: 7.2 11 May 2020, 23:15 UTC

An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

CVE-2020-10024 zephyrproject vulnerability CVSS: 7.2 11 May 2020, 23:15 UTC

The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

CVE-2020-10023 zephyrproject vulnerability CVSS: 4.6 11 May 2020, 23:15 UTC

The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

CVE-2020-10022 zephyrproject vulnerability CVSS: 7.5 11 May 2020, 23:15 UTC

A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.

CVE-2020-10021 zephyrproject vulnerability CVSS: 4.6 11 May 2020, 23:15 UTC

Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

CVE-2020-10019 zephyrproject vulnerability CVSS: 4.6 11 May 2020, 23:15 UTC

USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

CVE-2017-14202 zephyrproject vulnerability CVSS: 4.6 29 Aug 2019, 01:15 UTC

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the shell component of Zephyr allows a serial or telnet connected user to cause a crash, possibly with arbitrary code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.

CVE-2017-14201 zephyrproject vulnerability CVSS: 4.6 29 Aug 2019, 01:15 UTC

Use After Free vulnerability in the Zephyr shell allows a serial or telnet connected user to cause denial of service, and possibly remote code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.

CVE-2017-14199 zephyrproject vulnerability CVSS: 7.5 12 Apr 2019, 17:29 UTC

A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.

CVE-2018-1000800 zephyrproject vulnerability CVSS: 7.5 06 Sep 2018, 17:29 UTC

zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put).