Vulnerability Description
A buffer overflow vulnerability in stm32_mw_usb_host of STMicroelectronics in versions before 3.5.1 allows an attacker to execute arbitrary code when the descriptor contains more endpoints than USBH_MAX_NUM_ENDPOINTS. The library is typically integrated when using a RTOS such as FreeRTOS on STM32 MCUs.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| St | Stm32 Mw Usb Host | - |
Related Weaknesses (CWE)
References
- https://github.com/STMicroelectronics/stm32_mw_usb_host
- https://github.com/STMicroelectronics/stm32_mw_usb_host/pull/4PatchThird Party Advisory
- https://github.com/STMicroelectronics/stm32_mw_usb_host
- https://github.com/STMicroelectronics/stm32_mw_usb_host/pull/4PatchThird Party Advisory
FAQ
What is CVE-2021-42553?
CVE-2021-42553 is a vulnerability with a CVSS score of 6.8 (MEDIUM). A buffer overflow vulnerability in stm32_mw_usb_host of STMicroelectronics in versions before 3.5.1 allows an attacker to execute arbitrary code when the descriptor contains more endpoints than USBH_M...
How severe is CVE-2021-42553?
CVE-2021-42553 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-42553?
Check the references section above for vendor advisories and patch information. Affected products include: St Stm32 Mw Usb Host.