microsoft azure-rtos-threadx CVE-2023-48693 is a vulnerability in Microsoft Azure Rtos Threadx
Published on December 5, 2023

Azure RTOS ThreadX is an advanced real-time operating system (RTOS) designed specifically for deeply embedded applications. An attacker can cause arbitrary read and write due to vulnerability in parameter checking mechanism in Azure RTOS ThreadX, which may lead to privilege escalation. The affected components include RTOS ThreadX v6.2.1 and below. The fixes have been included in ThreadX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

NVD

Vulnerability Analysis

CVE-2023-48693 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2023-48693

You can be notified by stack.watch whenever vulnerabilities like CVE-2023-48693 are published in these products:

 

What versions of Azure Rtos Threadx are vulnerable to CVE-2023-48693?