Azure RTOS ThreadX is an advanced real-time operating system (RTOS) designed specifically for deeply embedded applications. An attacker can cause arbitrary read and write due to vulnerability in parameter checking mechanism in Azure RTOS ThreadX, which may lead to privilege escalation. The affected components include RTOS ThreadX v6.2.1 and below. The fixes have been included in ThreadX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/azure-rtos/threadx/security/advisories/GHSA-p7w6-62rq-vrf9 | Third Party Advisory |
https://github.com/azure-rtos/threadx/security/advisories/GHSA-p7w6-62rq-vrf9 | Third Party Advisory |
Configurations
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.7 |
References | () https://github.com/azure-rtos/threadx/security/advisories/GHSA-p7w6-62rq-vrf9 - Third Party Advisory |
05 Dec 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-05 01:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-48693
Mitre link : CVE-2023-48693
CVE.ORG link : CVE-2023-48693
JSON object : View
Products Affected
microsoft
- azure_rtos_threadx
CWE
CWE-20
Improper Input Validation