Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-43997 : Vulnerability Insights and Analysis

Learn about CVE-2021-43997 affecting FreeRTOS versions 10.2.0 to 10.4.5, allowing privilege escalation through crafted stack frames. Find mitigation steps and updates.

FreeRTOS versions 10.2.0 through 10.4.5 have vulnerabilities that allow non-kernel code to raise privilege and enable further privilege escalation.

Understanding CVE-2021-43997

What is CVE-2021-43997?

FreeRTOS versions 10.2.0 through 10.4.5 do not prevent non-kernel code from calling xPortRaisePrivilege to raise privilege. A third party with injected code can further escalate privilege through crafted stack frames, affecting ARMv7-M MPU ports and ARMv8-M ports with MPU support.

The Impact of CVE-2021-43997

These vulnerabilities can result in privilege escalation, allowing unauthorized access and control of affected systems.

Technical Details of CVE-2021-43997

Vulnerability Description

The issues allow non-kernel code to raise privilege and enable further escalation through crafted stack frames, impacting specific MPU ports.

Affected Systems and Versions

        Vendor: n/a
        Product: n/a
        Versions: 10.2.0 to 10.4.5

Exploitation Mechanism

        Non-kernel code can call xPortRaisePrivilege to raise privilege
        Third parties with injected code can further escalate privilege by crafting stack frames

Mitigation and Prevention

Immediate Steps to Take

        Upgrade to FreeRTOS V10.5.0 or V10.4.3-LTS Patch 3
        Restrict access to vulnerable systems

Long-Term Security Practices

        Regularly update software and firmware
        Implement least privilege access controls

Patching and Updates

        Apply the recommended patches provided by FreeRTOS

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now