PT-2023-30777 · Microsoft · Azure Rtos Netx Duo

Rkolandaivel

·

Published

2023-12-04

·

Updated

2023-12-08

·

CVE-2023-48315

CVSS v3.1
8.8
VectorAV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Azure RTOS NetX Duo versions prior to 6.3.0

Description:

The issue affects Azure RTOS NetX Duo, a TCP/IP network stack for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities. The affected components include processes related to `ftp` and `sntp`.

Recommendations:

For Azure RTOS NetX Duo versions prior to 6.3.0, upgrade to NetX Duo release 6.3.0 to resolve the issue. As a temporary workaround, consider disabling the `ftp` and `sntp` functions until a patch is available.

Fix

Memory Corruption

Weakness Enumeration

Related Identifiers

CVE-2023-48315

Affected Products

Azure Rtos Netx Duo