A code execution vulnerability exists in the normal world’s signed code execution functionality of Microsoft Azure Sphere 20.07. A specially crafted AF_PACKET socket can cause a process to create an executable memory mapping with controllable content. An attacker can execute a shellcode that uses the PACKET_MMAP functionality to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134 - Exploit, Third Party Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1134 - Exploit, Third Party Advisory |
Information
Published : 2020-12-22 20:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35608
Mitre link : CVE-2020-35608
CVE.ORG link : CVE-2020-35608
JSON object : View
Products Affected
microsoft
- azure_sphere
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')