Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-10019

Summary
Assigner-zephyr
Assigner Org ID-e2e69745-5e70-4e92-8431-deb5529a81ad
Published At-11 May, 2020 | 22:26
Updated At-17 Sep, 2024 | 02:12
Rejected At-
Credits

Buffer Overflow in USB DFU requested length

USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:zephyr
Assigner Org ID:e2e69745-5e70-4e92-8431-deb5529a81ad
Published At:11 May, 2020 | 22:26
Updated At:17 Sep, 2024 | 02:12
Rejected At:
▼CVE Numbering Authority (CNA)
Buffer Overflow in USB DFU requested length

USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

Affected Products
Vendor
Zephyr Projectzephyrproject-rtos
Product
zephyr
Versions
Affected
  • From 1.14.1 before unspecified (custom)
  • From 2.1.0 before unspecified (custom)
Problem Types
TypeCWE IDDescription
CWECWE-120CWE-120 Buffer Overflow
Type: CWE
CWE ID: CWE-120
Description: CWE-120 Buffer Overflow
Metrics
VersionBase scoreBase severityVector
3.18.1HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

NCC Group for report
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
x_refsource_MISC
https://github.com/zephyrproject-rtos/zephyr/pull/23190
x_refsource_MISC
https://github.com/zephyrproject-rtos/zephyr/pull/23457
x_refsource_MISC
https://github.com/zephyrproject-rtos/zephyr/pull/23460
x_refsource_MISC
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
x_refsource_MISC
Hyperlink: https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
Resource:
x_refsource_MISC
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23190
Resource:
x_refsource_MISC
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23457
Resource:
x_refsource_MISC
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23460
Resource:
x_refsource_MISC
Hyperlink: https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
x_refsource_MISC
x_transferred
https://github.com/zephyrproject-rtos/zephyr/pull/23190
x_refsource_MISC
x_transferred
https://github.com/zephyrproject-rtos/zephyr/pull/23457
x_refsource_MISC
x_transferred
https://github.com/zephyrproject-rtos/zephyr/pull/23460
x_refsource_MISC
x_transferred
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
x_refsource_MISC
x_transferred
Hyperlink: https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23190
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23457
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23460
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:vulnerabilities@zephyrproject.org
Published At:11 May, 2020 | 23:15
Updated At:05 Jun, 2020 | 18:15

USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.18.1HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Zephyr Project
zephyrproject
>>zephyr>>Versions before 1.14.2(exclusive)
cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*
Zephyr Project
zephyrproject
>>zephyr>>Versions from 2.0.0(inclusive) to 2.1.0(inclusive)
cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Primarynvd@nist.gov
CWE-120Secondaryvulnerabilities@zephyrproject.org
CWE ID: CWE-120
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-120
Type: Secondary
Source: vulnerabilities@zephyrproject.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019vulnerabilities@zephyrproject.org
N/A
https://github.com/zephyrproject-rtos/zephyr/pull/23190vulnerabilities@zephyrproject.org
Patch
Third Party Advisory
https://github.com/zephyrproject-rtos/zephyr/pull/23457vulnerabilities@zephyrproject.org
Patch
Third Party Advisory
https://github.com/zephyrproject-rtos/zephyr/pull/23460vulnerabilities@zephyrproject.org
Patch
Third Party Advisory
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25vulnerabilities@zephyrproject.org
Third Party Advisory
Hyperlink: https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
Source: vulnerabilities@zephyrproject.org
Resource: N/A
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23190
Source: vulnerabilities@zephyrproject.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23457
Source: vulnerabilities@zephyrproject.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/zephyrproject-rtos/zephyr/pull/23460
Source: vulnerabilities@zephyrproject.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
Source: vulnerabilities@zephyrproject.org
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

436Records found

CVE-2023-5139
Matching Score-10
Assigner-Zephyr Project
ShareView Details
Matching Score-10
Assigner-Zephyr Project
CVSS Score-4.4||MEDIUM
EPSS-0.27% / 49.83%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 04:40
Updated-13 Feb, 2025 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerability in the Zephyr STM32 Crypto driver

Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10023
Matching Score-10
Assigner-Zephyr Project
ShareView Details
Matching Score-10
Assigner-Zephyr Project
CVSS Score-6.9||MEDIUM
EPSS-0.38% / 59.45%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Shell Subsystem Contains a Buffer Overflow Vulnerability In shell_spaces_trim

The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2026-1679
Matching Score-10
Assigner-Zephyr Project
ShareView Details
Matching Score-10
Assigner-Zephyr Project
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.87%
||
7 Day CHG~0.00%
Published-27 Mar, 2026 | 23:21
Updated-01 Apr, 2026 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net: eswifi socket send payload length not bounded

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-3434
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-4.9||MEDIUM
EPSS-0.12% / 30.64%
||
7 Day CHG~0.00%
Published-28 Jun, 2022 | 19:45
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
L2CAP: Stack based buffer overflow in le_ecred_conn_req()

Stack based buffer overflow in le_ecred_conn_req(). Zephyr versions >= v2.5.0 Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-14202
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.77%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 00:44
Updated-17 Sep, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The shell implementation does not protect against buffer overruns resulting in unpredictable behavior.

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the shell component of Zephyr allows a serial or telnet connected user to cause a crash, possibly with arbitrary code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrshell
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-10028
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.08% / 22.62%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Syscalls In GPIO Subsystem Performs No Argument Validation

Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-20
Improper Input Validation
CVE-2020-10067
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 16:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory

A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-10021
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-8.1||HIGH
EPSS-0.08% / 22.62%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-17 Sep, 2024 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds write in USB Mass Storage with unaligned sizes

Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-10024
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.50%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-17 Sep, 2024 | 01:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ARM Platform Uses Signed Integer Comparison When Validating Syscall Numbers

The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-697
Incorrect Comparison
CVE-2020-10072
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 10.49%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 21:40
Updated-17 Sep, 2024 | 04:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Handling of Insufficient Permissions or Privileges in zephyr

Improper Handling of Insufficient Permissions or Privileges in zephyr. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Insufficient Permissions or Privileges (CWE-280). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-vf79-hqwm-w4xc

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2020-13603
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 17.46%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 21:40
Updated-16 Sep, 2024 | 23:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in memory allocating functions

Integer Overflow in memory allocating functions. Zephyr versions >= 1.14.2, >= 2.4.0 contain Integer Overflow or Wraparound (CWE-190). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94vp-8gc2-rm45

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2017-14201
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.70% / 72.03%
||
7 Day CHG~0.00%
Published-29 Aug, 2019 | 00:44
Updated-17 Sep, 2024 | 00:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The shell DNS command can cause unpredictable results due to misuse of stack variables.

Use After Free vulnerability in the Zephyr shell allows a serial or telnet connected user to cause denial of service, and possibly remote code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrshell
CWE ID-CWE-416
Use After Free
CVE-2020-13598
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 17.60%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 21:40
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat

FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat. Zephyr versions >= v1.14.2, >= v2.3.0 contain Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7fhv-rgxr-x56h

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-10058
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.43%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-17 Sep, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Syscalls In kscan Subsystem Performs No Argument Validation

Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-20
Improper Input Validation
CVE-2020-10027
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-7.8||HIGH
EPSS-0.37% / 58.62%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ARC Platform Uses Signed Integer Comparison When Validating Syscall Numbers

An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-697
Incorrect Comparison
CVE-2020-10061
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-8.1||HIGH
EPSS-0.10% / 26.35%
||
7 Day CHG~0.00%
Published-05 Jun, 2020 | 17:37
Updated-16 Sep, 2024 | 22:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Error handling invalid packet sequence

Improper handling of the full-buffer case in the Zephyr Bluetooth implementation can result in memory corruption. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-9408
Matching Score-8
Assigner-Zephyr Project
ShareView Details
Matching Score-8
Assigner-Zephyr Project
CVSS Score-8.2||HIGH
EPSS-0.01% / 2.51%
||
7 Day CHG~0.00%
Published-11 Nov, 2025 | 15:34
Updated-12 Nov, 2025 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Userspace privilege escalation vulnerability on Cortex M

System call entry on Cortex M (and possibly R and A, but I think not) has a race which allows very practical privilege escalation for malicious userspace processes.

Action-Not Available
Vendor-Zephyr Project
Product-Zephyr
CWE ID-CWE-270
Privilege Context Switching Error
CVE-2023-6881
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.3||HIGH
EPSS-0.25% / 47.82%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 18:25
Updated-23 Jan, 2025 | 17:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
fs: fuse: buffer overflow vulnerability in the Zephyr FS

Possible buffer overflow in is_mount_point

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-5753
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-6.3||MEDIUM
EPSS-0.23% / 45.73%
||
7 Day CHG~0.00%
Published-24 Oct, 2023 | 16:09
Updated-13 Feb, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerabilities in the Zephyr Bluetooth subsystem

Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2023-5184
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7||HIGH
EPSS-0.32% / 55.26%
||
7 Day CHG~0.00%
Published-27 Sep, 2023 | 17:26
Updated-18 Jun, 2025 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential signed to unsigned conversion errors and buffer overflow vulnerabilities in the Zephyr IPM driver

Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-195
Signed to Unsigned Conversion Error
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2023-4257
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.43% / 62.72%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 21:09
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unchecked user input length in the Zephyr WiFi shell module

Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2021-3966
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9.6||CRITICAL
EPSS-0.12% / 29.82%
||
7 Day CHG~0.00%
Published-11 Jan, 2023 | 00:00
Updated-09 Apr, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Usb bluetooth device ACL read cb buffer overflow

usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10022
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9||CRITICAL
EPSS-1.70% / 82.37%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 22:26
Updated-16 Sep, 2024 | 23:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array

A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10071
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9||CRITICAL
EPSS-13.90% / 94.34%
||
7 Day CHG~0.00%
Published-05 Jun, 2020 | 17:37
Updated-17 Sep, 2024 | 04:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient publish message length validation in MQTT

The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-10070
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-9||CRITICAL
EPSS-6.47% / 91.13%
||
7 Day CHG~0.00%
Published-05 Jun, 2020 | 17:37
Updated-16 Sep, 2024 | 23:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MQTT buffer overflow on receive buffer

In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-4260
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-6.3||MEDIUM
EPSS-0.26% / 49.24%
||
7 Day CHG~0.00%
Published-26 Sep, 2023 | 19:23
Updated-13 Feb, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential off-by-one buffer overflow vulnerability in the Zephyr FS subsystem

Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-193
Off-by-one Error
CVE-2023-4264
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.1||HIGH
EPSS-0.23% / 45.73%
||
7 Day CHG~0.00%
Published-26 Sep, 2023 | 18:34
Updated-18 Jun, 2025 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerabilities in the Zephyr Bluetooth subsystem

Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2023-4265
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-6.4||MEDIUM
EPSS-0.23% / 45.56%
||
7 Day CHG~0.00%
Published-12 Aug, 2023 | 22:09
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer overflow in Zephyr USB

Potential buffer overflow vulnerabilities in the following locations: https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-3725
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.56% / 68.40%
||
7 Day CHG~0.00%
Published-06 Oct, 2023 | 20:10
Updated-13 Feb, 2025 | 16:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerability in the Zephyr CANbus subsystem

Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-0849
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-3.8||LOW
EPSS-0.02% / 6.04%
||
7 Day CHG~0.00%
Published-14 Mar, 2026 | 21:05
Updated-02 Apr, 2026 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
crypto: ATAES132A response length allows stack buffer overflow

Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-9557
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.03% / 8.05%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 05:43
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: Mesh: Out-of-Bound Write in gen_prov_cont

‭An out-of-bound write can lead to an arbitrary code execution. Even on devices with some form of memory protection, this can still lead to‬ ‭a crash and a resultant denial of service.‬

Action-Not Available
Vendor-Zephyr Project
Product-Zephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-9558
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.02% / 5.18%
||
7 Day CHG~0.00%
Published-26 Nov, 2025 | 05:39
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bluetooth: Mesh: Out-of-Bound Write in gen_prov_start

There is a potential OOB Write vulnerability in the gen_prov_start function in pb_adv.c. The full length of the received data is copied into the link.rx.buf receiver buffer without any validation on the data size.

Action-Not Available
Vendor-Zephyr Project
Product-Zephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-4424
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-8.3||HIGH
EPSS-0.14% / 32.87%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 06:42
Updated-02 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
bt: hci: DoS and possible RCE

An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-4263
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.6||HIGH
EPSS-0.08% / 24.15%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 20:42
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver

Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2023-4259
Matching Score-6
Assigner-Zephyr Project
ShareView Details
Matching Score-6
Assigner-Zephyr Project
CVSS Score-7.1||HIGH
EPSS-0.17% / 38.36%
||
7 Day CHG~0.00%
Published-25 Sep, 2023 | 23:05
Updated-13 Feb, 2025 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow vulnerabilities in the Zephyr eS-WiFi driver

Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-193
Off-by-one Error
CVE-2020-3616
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.18%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 15:05
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in display function due to memory copy without checking length of size using strcpy function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8953, MSM8996AU, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8953sdm450sdm636_firmwaresdm632_firmwaremsm8996au_firmwareapq8098_firmwaresdm845sdm450_firmwaresdm632sdx20sdm660sdm439mdm9607_firmwaresdm630sdm429sm7150_firmwaresm6150msm8909w_firmwaremdm9607msm8996auqm215apq8017_firmwaresm7150msm8917qcs605_firmwaremdm9207c_firmwaremdm9206mdm9207csm8150_firmwareapq8096ausdm439_firmwaresda845_firmwaresdm636sdm630_firmwareapq8098sda660_firmwaremdm9206_firmwareqcs605qm215_firmwaremsm8953_firmwareapq8053apq8096au_firmwaresm6150_firmwaremsm8917_firmwaresdm429_firmwaresm8150sdx20_firmwaresda660apq8017msm8909wapq8053_firmwaresdm660_firmwaresda845sdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-4097
Matching Score-4
Assigner-HCL Software
ShareView Details
Matching Score-4
Assigner-HCL Software
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 22.60%
||
7 Day CHG~0.00%
Published-05 Nov, 2020 | 16:45
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HCL Notes version 9 previous to release 9.0.1 FixPack 10 Interim Fix 8, version 10 previous to release 10.0.1 FixPack 6 and version 11 previous to 11.0.1 FixPack 1, a vulnerability in the input parameter handling of the Notes Client could potentially be exploited by an attacker resulting in a buffer overflow. This could enable an attacker to crash HCL Notes or execute attacker-controlled code on the client.

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-notesHCL Notes
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-5210
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5||MEDIUM
EPSS-1.55% / 81.53%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 17:50
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NetHack command line -w option parsing is subject to a buffer overflow

In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5.

Action-Not Available
Vendor-nethackNetHack
Product-nethackNetHack
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-4204
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-19 Feb, 2020 | 15:15
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 174960.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-aixdb2windowslinux_kernelDB2 for Linux- UNIX and Windows
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-5209
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5||MEDIUM
EPSS-1.69% / 82.35%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 17:50
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NetHack command line parsing of options starting with -de and -i is subject to a buffer overflow

In NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5.

Action-Not Available
Vendor-nethackNetHack
Product-nethackNetHack
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-39727
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-07 Sep, 2025 | 15:16
Updated-25 Nov, 2025 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mm: swap: fix potential buffer overflow in setup_clusters()

In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix potential buffer overflow in setup_clusters() In setup_swap_map(), we only ensure badpages are in range (0, last_page]. As maxpages might be < last_page, setup_clusters() will encounter a buffer overflow when a badpage is >= maxpages. Only call inc_cluster_info_page() for badpage which is < maxpages to fix the issue.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-4609
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.4||HIGH
EPSS-0.13% / 31.26%
||
7 Day CHG~0.00%
Published-25 Jun, 2021 | 17:40
Updated-17 Sep, 2024 | 02:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Sevret Server (IBM Security Verify Privilege Manager 10.8.2) is vulnerable to a buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and execute arbitrary code on the system or cause the system to crash. IBM X-Force ID: 184917.

Action-Not Available
Vendor-IBM Corporation
Product-security_verify_privilege_managerSecurity Verify Privilege Manager
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-36930
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.06%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 19:35
Updated-26 Feb, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-37803
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.91%
||
7 Day CHG~0.00%
Published-08 May, 2025 | 06:26
Updated-03 Nov, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
udmabuf: fix a buf size overflow issue during udmabuf creation

In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-36931
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.06%
||
7 Day CHG~0.00%
Published-11 Dec, 2025 | 19:35
Updated-26 Feb, 2026 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-10559
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.12% / 30.13%
||
7 Day CHG~0.00%
Published-31 Oct, 2024 | 02:00
Updated-30 Sep, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Airport Booking Management System details buffer overflow

A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function Details. The manipulation of the argument passport/name leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Action-Not Available
Vendor-SourceCodesterrazormist
Product-airport_booking_management_systemAirport Booking Management Systemairport_booking_management_system
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-5025
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.29% / 52.04%
||
7 Day CHG~0.00%
Published-11 Mar, 2021 | 15:30
Updated-16 Sep, 2024 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 193661.

Action-Not Available
Vendor-IBM CorporationNetApp, Inc.Linux Kernel Organization, IncMicrosoft Corporation
Product-windowsdb2linux_kerneloncommand_insightDB2 for Linux, UNIX and Windows
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-0099
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.84%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 21:23
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE

NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could cause buffer overrun in the host. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service.

Action-Not Available
Vendor-NVIDIA Corporation
Product-vGPU software and Cloud Gamingnvsteslaquadrogeforcertx
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-0762
Matching Score-4
Assigner-Phoenix Technologies, Inc.
ShareView Details
Matching Score-4
Assigner-Phoenix Technologies, Inc.
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.84%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 14:56
Updated-29 Sep, 2025 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential buffer overflow when handling UEFI variables

Potential buffer overflow in unsafe UEFI variable handling in Phoenix SecureCore™ for select Intel platforms This issue affects: Phoenix SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998; Phoenix SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562; Phoenix SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323; Phoenix SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287; Phoenix SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236; Phoenix SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184; Phoenix SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269; Phoenix SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218; Phoenix SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.

Action-Not Available
Vendor-phoenixtechPhoenixphoenixIntel Corporation
Product-core_i5-1240pcore_i5-14400fcore_i5-14500core_i7-12650hxatom_x7213ecore_i3-10105tcore_i7-8709gcore_i3-1000g4core_i5-9500core_i5-12500hlcore_i3-1115g4ecore_i5-14500hxcore_i9-14900tcore_5-220ucore_i7-1255ulcore_i3-7100xeon_gold_6338tcore_i3-8100core_i7-12800hcore_i5-8400tcore_i7-9850hxeon_platinum_8352vcore_i5-9400txeon_e-2274gcore_i7-9750hfxeon_w-10855mceleron_g6900tcore_i7-9700tcore_i5-9500txeon_gold_6338nxeon_e3-1505lcore_i5-1145grecore_i5-1235ucore_i3-1210ucore_i3-12300hlxeon_silver_4316xeon_e-2186gcore_i3-1215ulcore_i7-9750hceleron_g5900tcore_i5-12450hxceleron_g4930txeon_platinum_8368qcore_ultra_5_135hlcore_i7-8650ucore_i5-8305gcore_i3-8300tcore_i3-9350kcore_i7-8086kcore_i5-13600hcore_i7-1355uxeon_e-2144gcore_i3-1000ng4core_i5-10500hpentium_gold_g5500core_i9-14901exeon_e-2488core_i9-13950hxcore_i5-13400core_ultra_5_135ucore_m3-7y32core_i9-9900kfcore_i7-13700hxxeon_gold_5320core_i9-14901kecore_ultra_7_165uxeon_platinum_8358pentium_gold_g4600tcore_i5-12400fsecurecore_technologyxeon_gold_5318yxeon_gold_6348core_i9-12900kcore_i9-9900kscore_i3-9320core_i7-13850hxcore_i3-13100fcore_ultra_7_165hcore_i3-10105xeon_gold_6354core_i5-1245ulcore_i7-7820hqxeon_e-2224gcore_i5-9400fcore_i5-13600kfxeon_gold_6336ycore_i3-n305xeon_e-2276mcore_i5-7300uxeon_e-2124gceleron_n4500xeon_platinum_8352score_i7-12650hcore_i5-8257ucore_i7-8557uxeon_e3-1280core_i7-1185g7epentium_gold_g5400txeon_w-10885mcore_i3-7101tecore_i3-7167ucore_i3-14100core_i5-7360ucore_i5-8400core_i7-7700tcore_i5-1030g7core_i3-12100core_i9-12900fcore_i5-9600kxeon_gold_6334core_i7-1265ulxeon_e-2288gcore_i7-7700core_i5-10210ucore_i7-7740xcore_i7-13700kfpentium_gold_g5420tcore_i5-7y57core_i5-8500tcore_i9-12900hkcore_i7-7560ucore_i3-8130uceleron_g4900tcore_i5-11500hcore_i3-1000g1core_i3-9100core_i7-12800hlxeon_e3-1245core_7-250hcore_i5-8500core_ultra_5_135hcore_i5-8600tcore_3-100ucore_i7-13700eceleron_3965upentium_gold_g5400core_i5-14501ecore_i9-12950hxcore_i3-12300pentium_gold_g5420core_i7-14650hxcore_i3-1005g1core_ultra_9_185hcore_i5-9500fcore_i7-14790fcore_i7-1165g7core_i5-14501texeon_e3-1225celeron_g4950core_i5-12450hcore_i5-7500tcore_m3-6y30xeon_e-2276gcore_i7-7660ucore_i5-7267ucore_i7-1160g7xeon_e-2104gcore_i5-1340pxeon_platinum_8362core_i3-8350kxeon_w-1270pn97xeon_silver_4310core_i3-1215ucore_ultra_5_125ulxeon_gold_6330core_i5-1334ucore_i5-13500core_i3-12100tpentium_gold_g5500tcore_i5-1145g7core_i9-13900core_i7-1255ucore_i9-13900hkxeon_platinum_8351ncore_i7-8700kcore_i7-8559uxeon_w-3365atom_x7211ecore_i7-13620hcore_i5-9300hcore_i3-7350kcore_i7-8550ucore_i7-1195g7core_i5-12400celeron_3965yxeon_platinum_8360ypentium_6405uceleron_g3950core_i5-1035g1core_i7-1068ng7core_i3-8100hcore_i7-8809gcore_i7-14700kfcore_i3-7100ucore_i5-7400tcore_i5-14401ecore_i3-13100core_i5-1345uatom_x7425ecore_3-n355core_i5-8300hcore_i9-13900hxeon_e-2456core_i3-8100fceleron_3867ucore_i5-14401tecore_i5-10505celeron_6305core_i5-1350pcore_i5-13505hcore_i3-10305tcore_7-150ucore_m3-7y30core_i3-7020ucore_i9-11900kbcore_3-n350core_i7-10870hxeon_e-2278gpentium_gold_g5620core_i7-8700core_i3-1125g4xeon_w-3345core_i5-7600kxeon_platinum_8380core_i5-13600core_i5-13500tcore_i9-14900pentium_gold_4415ucore_i7-12700kfn200core_i3-9300tcore_i5-14600kfcore_i5-9600celeron_7300core_i7-13700kpentium_8505xeon_e3-1270core_i5-1155g7core_i5-11320hcore_i7-10710uceleron_n5105core_i5-1135g7core_i5-7400celeron_g5920pentium_gold_g5600xeon_e-2226gxeon_e-2224xeon_gold_6346celeron_7305core_i5-14500tcore_i3-12100fxeon_e-2414core_i5-8250ucore_i5-9600kfcore_i5-14400tcore_ultra_5_125hlcore_i3-7130ucore_i9-13900tecore_i7-13700tecore_i7-8569ucore_i7-1185g7core_i7-12700tcore_i5-14490fpentium_gold_g6405txeon_e-2244gcore_i5-10300hcore_i7-1180g7core_i5-12400tcore_i5-7y54core_i7-10810ucore_ultra_7_155ulxeon_silver_4310tcore_i5-13500hxxeon_silver_4314core_i5-1335ucore_i7-13800hxeon_e3-1285celeron_n5095pentium_silver_n6000xeon_gold_6326core_i5-12490fcore_i5-1030g4core_i5-9600tn95core_i5-8279uxeon_e-2176mcore_i7-13700tcore_i3-7300core_i9-13900kscore_i5-12600tcore_i7-7700hqcore_i5-12600kcore_i7-8700bcore_i7-1280pcore_i5-1035g7xeon_gold_6312ucore_ultra_7_155hcore_i7-7700kcore_i5-8600kcore_i9-11980hkcore_i7-12700hcore_i7-7600ucore_i5-11300hxeon_11855mpentium_gold_g6605core_i5-7600tcore_i3-8109ucore_i3-1315ucore_i3-1110g4core_i7-14700fcore_ultra_7_165hlcore_ultra_5_125ucore_i7-7500uxeon_e-2246gcore_i9-12900hxcore_i9-11900hpentium_gold_g7400celeron_g5925pentium_gold_4415ycore_i7-13705hpentium_gold_4417uxeon_w-3375core_i3-7100txeon_e-2434xeon_e-2286mcore_i3-7300tcore_i5-14600kcore_i3-14100tpentium_silver_n6005n250core_ultra_7_165ulcore_i9-9900celeron_g3930tcore_i5-7500xeon_w-1290pcore_i5-13600tcore_i5-13400fcore_i7-1260uceleron_g4920core_i9-12900tcore_i9-12900kfcore_i5-1038ng7core_i5-13400tcore_i7-14701exeon_w-1250core_i5-1240uceleron_g5900core_ultra_3_105ulxeon_w-1250pcore_i5-8400hcore_i9-12900hcore_i7-11370hcore_i9-8950hkceleron_g6900core_i5-7300hqcore_i7-9700core_i5-1130g7xeon_silver_4309ycore_i3-n300core_i7-1250uxeon_e-2286gcore_i9-14900hxcore_i5-10310un100celeron_g5905core_5-210hcore_i9-9980hkcore_i5-1245ucore_i7-11600hceleron_g4930core_i9-14900kfceleron_n4505xeon_e-2436core_i3-9100fcore_i7-13700fxeon_e-2124core_i5-14600core_i5-1230uxeon_w-1290celeron_7305lxeon_platinum_8358pcore_i5-14400core_i7-10850hcore_i5-12600pentium_8500core_5-220hpentium_6805core_i5-13490fcore_i7-7y75core_i3-7100hcore_i3-10305core_i3-10325core_i7-14701tecore_i7-12850hxxeon_gold_6338xeon_e-2174gcore_i7-11800hu300xeon_w-1270core_i5-13500hcore_i9-13900exeon_e-2186mceleron_n5100core_i5-13420hcore_i3-8100tcore_i7-10750hcore_i7-10875hpentium_gold_7505core_i9-11950hpentium_gold_g6505tpentium_gold_g6505core_i5-12600hlcore_i7-12800hxcore_ultra_5_115ucore_i7-7920hqcore_i7-14700hxcore_i7-13790fcore_i5-8400bcore_i5-1250pcore_i9-9900kcore_i5-10200hcore_i7-1265ucore_i9-10885hcore_ultra_5_134ucore_i5-12500txeon_e-2136core_i7-11390hxeon_e3-1230core_i9-14900kscore_i3-7101ecore_i5-9400xeon_gold_5318spentium_gold_g7400txeon_e3-1505mceleron_g3930core_i5-11500bcore_i5-12500hxeon_e3-1275core_i5-12600hxeon_gold_5318ncore_i5-12600kfcore_9-270h300core_i9-12900kscore_i7-8706gcore_i3-1220pcore_i7-13650hxceleron_3865uceleron_g4900core_i7-9700fcore_i3-9100tcore_i3-9300core_i9-10980hkpentium_gold_g6405core_i7-11850hcore_i7-10610ucore_i7-1360pxeon_gold_6314ucore_i9-9880hcore_i9-14900kxeon_e3-1240core_i7-1185grecore_i5-9400hxeon_e-2126gpentium_gold_4410yxeon_e-2176gxeon_gold_5320tcore_i7-1365ucore_i5-9300hfxeon_e-2236core_i7-9700kfxeon_e-2468xeon_e3-1535mcore_i5-8260ucore_i5-1140g7core_i7-1270p300txeon_w-3335xeon_11955mcore_5-120ucore_7-240hcore_ultra_5_125hxeon_gold_5315ycore_i7-13700core_i5-14450hxcore_i5-12500core_i7-1260pcore_i9-13900fcore_i7-8705gcore_i9-12900n150xeon_e-2486pentium_gold_g5600tceleron_6305ecore_i9-13905hcore_i5-10400hcore_i3-14100fxeon_platinum_8368core_i3-1115g4core_i7-7820hkcore_i5-8600core_ultra_7_164ucore_i3-1305ucore_i5-13600kcore_i9-13900kcore_i3-10110ucore_i9-9900tcore_i3-8300core_i3-11100bcore_i7-1060ng7core_i3-8100bcore_i5-7600core_i9-13900kfcore_i7-9700kcore_i9-14900fcore_i5-8500bn50core_i7-11375hpentium_gold_g4600core_i7-8700tcore_i7-8750hxeon_gold_5317core_i5-1145g7exeon_gold_6330ncore_i9-13980hxcore_i3-13100tcore_i7-1370pcore_i5-13450hxcore_i7-11700bcore_i5-7640xpentium_gold_g4620core_i7-14700tcore_i9-14901tecore_i7-7567ucore_i5-12600hxcore_i5-7440hqcore_i7-1060g7core_i5-7287uceleron_g5905tcore_i5-8350uxeon_platinum_8352ycore_i5-8259uxeon_e-2478xeon_e-2234core_i7-12700fcore_7-250ucore_i7-10510ucore_ultra_5_135ulcore_ultra_7_155ucore_i3-7320core_i7-8500ycore_ultra_7_155hlcore_i7-12700hlxeon_e3-1220core_i5-13600hxcore_i5-1235ulcore_i5-1035g4core_i3-9350kfcore_i9-13900tcore_i3-10105fcore_i7-14700core_i5-7260ucore_i7-8850hxeon_w-3323core_i5-8269ucore_i7-14700kcore_i3-1115grecore_i7-12700kcore_i7-1065g7core_i5-7200ucore_i5-1030ng7core_i7-13700hxeon_gold_6342core_i3-12300tcore_i9-13900hxxeon_w-1290tcore_i5-14600txeon_e-2146gxeon_e-2134core_i7-12700SecureCore™ for Intel Comet LakeSecureCore™ for Intel Alder LakeSecureCore™ for Intel Meteor LakeSecureCore™ for Intel Tiger LakeSecureCore™ for Intel Jasper LakeSecureCore™ for Intel Kaby LakeSecureCore™ for Intel Coffee LakeSecureCore™ for Intel Raptor LakeSecureCore™ for Intel Ice Lakesecurecore_technology
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-0645
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.3||HIGH
EPSS-0.04% / 11.70%
||
7 Day CHG~0.00%
Published-17 Jan, 2024 | 13:47
Updated-10 Sep, 2024 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Overflow Vulnerability in Explorer++

Buffer overflow vulnerability in Explorer++ affecting version 1.3.5.531. A local attacker could execute arbitrary code via a long filename argument by monitoring Structured Exception Handler (SEH) records.

Action-Not Available
Vendor-explorerplusplusexplorerplusplus
Product-explorer\+\+Explorer++.exe
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 8
  • 9
  • Next
Details not found