CVE-2021-22675

Summary

CVECVE-2021-22675
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-05-07 13:15:00 UTC
Updated2021-05-17 20:38:00 UTC
DescriptionThe affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior).

Risk And Classification

Problem Types: CWE-190

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Ti Cc3100 Software Development Kit All All All All
Application Ti Cc3100 Software Development Kit All All All All
Application Ti Cc3200 Software Development Kit All All All All
Application Ti Cc3200 Software Development Kit All All All All
Application Ti Simplelink Cc13x0 Software Development Kit All All All All
Application Ti Simplelink Cc13x2 Software Development Kit All All All All
Application Ti Simplelink Cc26xx Software Development Kit All All All All
Application Ti Simplelink Cc32xx Software Development Kit All All All All
Application Ti Simplelink Cc32xx Software Development Kit All All All All
Application Ti Simplelink Msp432e4 Software Development Kit All All All All
Application Ti Simplelink Msp432e4 Software Development Kit All All All All

References

ReferenceSourceLinkTags
Texas Instruments SimpleLink | CISA MISC us-cert.cisa.gov
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 590531 Texas Instruments SimpleLink Multiple Vulnerabilities (ICSA-21-119-01)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report