Lucene search

K
nvd[email protected]NVD:CVE-2023-48693
HistoryDec 05, 2023 - 1:15 a.m.

CVE-2023-48693

2023-12-0501:15:08
CWE-20
web.nvd.nist.gov
4
azure rtos
threadx
vulnerability
privilege escalation
parameter checking
upgrade
rtos threadx v6.2.1

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

62.3%

Azure RTOS ThreadX is an advanced real-time operating system (RTOS) designed specifically for deeply embedded applications. An attacker can cause arbitrary read and write due to vulnerability in parameter checking mechanism in Azure RTOS ThreadX, which may lead to privilege escalation. The affected components include RTOS ThreadX v6.2.1 and below. The fixes have been included in ThreadX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Node
microsoftazure_rtos_threadxRange<6.3.0
VendorProductVersionCPE
microsoftazure_rtos_threadx*cpe:2.3:o:microsoft:azure_rtos_threadx:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

62.3%

Related for NVD:CVE-2023-48693