Skip to content

Azure RTOS USBX Remote Code Execution Vulnerability

Moderate
rkolandaivel published GHSA-qjw8-7w86-44qj Dec 3, 2023

Package

USBX (Azure RTOS)

Affected versions

<6.3.0

Patched versions

6.3.0

Description

Impact
An attacker can cause remote code execution due to expired pointer dereference and type confusion vulnerabilities in Azure RTOS USBX.

Affected Components
The affected components include functions/processes in host stack and host class, related to device linked classes, ASIX, Prolific, SWAR, audio, CDC ECM in RTOS v6.2.1 and below. The fixes have been included in USBX release 6.3.0.

Remediation
Upgrade to v6.3.0 or above.

For more information
If you have any questions or comments about this advisory:
• Open an issue in azure-rtos/usbx
• Post question on Microsoft Q&A

Severity

Moderate
6.8
/ 10

CVSS base metrics

Attack vector
Physical
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2023-48694