CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
93.1%
An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.
Vendor | Product | Version | CPE |
---|---|---|---|
arm | mbed_tls | * | cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:* |
arm | mbed_tls | 2.0.0 | cpe:2.3:a:arm:mbed_tls:2.0.0:*:*:*:*:*:*:* |
arm | mbed_tls | 2.1.0 | cpe:2.3:a:arm:mbed_tls:2.1.0:*:*:*:*:*:*:* |
arm | mbed_tls | 2.1.1 | cpe:2.3:a:arm:mbed_tls:2.1.1:*:*:*:*:*:*:* |
arm | mbed_tls | 2.1.2 | cpe:2.3:a:arm:mbed_tls:2.1.2:*:*:*:*:*:*:* |
arm | mbed_tls | 2.1.3 | cpe:2.3:a:arm:mbed_tls:2.1.3:*:*:*:*:*:*:* |
arm | mbed_tls | 2.1.4 | cpe:2.3:a:arm:mbed_tls:2.1.4:*:*:*:*:*:*:* |
arm | mbed_tls | 2.1.5 | cpe:2.3:a:arm:mbed_tls:2.1.5:*:*:*:*:*:*:* |
arm | mbed_tls | 2.1.6 | cpe:2.3:a:arm:mbed_tls:2.1.6:*:*:*:*:*:*:* |
arm | mbed_tls | 2.4.0 | cpe:2.3:a:arm:mbed_tls:2.4.0:*:*:*:*:*:*:* |
[
{
"product": "mbed TLS",
"vendor": "ARM",
"versions": [
{
"status": "affected",
"version": "2.4.0"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
93.1%