{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T07:48:57.262","vulnerabilities":[{"cve":{"id":"CVE-2020-10024","sourceIdentifier":"vulnerabilities@zephyrproject.org","published":"2020-05-11T23:15:11.583","lastModified":"2024-11-21T04:54:40.487","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions."},{"lang":"es","value":"El código arm específico de la plataforma utiliza una comparación de enteros con signo cuando se comprueban los números de llamada del sistema. Un atacante que ha obtenido una ejecución de código dentro de un subproceso (hilo) de usuario es capaz de elevar los privilegios a los del kernel. Consulte NCC-ZEP-001. Este problema afecta a: zephyrproject-rtos zephyr versión 1.14.0 y versiones posteriores. Versión 2.1.0 y versiones posteriores."}],"metrics":{"cvssMetricV31":[{"source":"vulnerabilities@zephyrproject.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.1,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vulnerabilities@zephyrproject.org","type":"Secondary","description":[{"lang":"en","value":"CWE-697"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-697"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zephyrproject:zephyr:1.14.2:*:*:*:*:*:*:*","matchCriteriaId":"B74694FC-5442-4F7E-AACF-0E1753F50148"},{"vulnerable":true,"criteria":"cpe:2.3:o:zephyrproject:zephyr:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"EF33DD80-0286-477C-88A4-FCEC0D80F520"}]}]}],"references":[{"url":"https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10024","source":"vulnerabilities@zephyrproject.org"},{"url":"https://github.com/zephyrproject-rtos/zephyr/pull/23323","source":"vulnerabilities@zephyrproject.org","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zephyrproject-rtos/zephyr/pull/23498","source":"vulnerabilities@zephyrproject.org","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zephyrproject-rtos/zephyr/pull/23535","source":"vulnerabilities@zephyrproject.org","tags":["Patch","Third Party Advisory"]},{"url":"https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30","source":"vulnerabilities@zephyrproject.org","tags":["Third Party Advisory"]},{"url":"https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10024","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/zephyrproject-rtos/zephyr/pull/23323","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zephyrproject-rtos/zephyr/pull/23498","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/zephyrproject-rtos/zephyr/pull/23535","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}