Vulnerability Description
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Azure Rtos Usbx | < 6.1.12 |
Related Weaknesses (CWE)
References
- https://github.com/azure-rtos/usbx/security/advisories/GHSA-m9p8-xrp7-vvqpExploitThird Party Advisory
- https://github.com/azure-rtos/usbx/security/advisories/GHSA-m9p8-xrp7-vvqpExploitThird Party Advisory
FAQ
What is CVE-2022-39344?
CVE-2022-39344 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized t...
How severe is CVE-2022-39344?
CVE-2022-39344 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-39344?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Azure Rtos Usbx.