Vulnerabilites related to nxp - i.mx_8m_mini
CVE-2023-39902 (GCVE-0-2023-39902)
Vulnerability from cvelistv5
Published
2023-10-17 00:00
Modified
2024-09-16 15:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:09.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://nxp.com" }, { "tags": [ "x_transferred" ], "url": "https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:u_boot_secondary_program_loader\\/spl\\/:u_boot_secondary_program_loader\\/spl\\/:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "u_boot_secondary_program_loader\\/spl\\/", "vendor": "u_boot_secondary_program_loader\\/spl\\/", "versions": [ { "lessThan": "2023.07", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39902", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T15:11:13.716945Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T15:15:58.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-17T11:59:21.198469", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://nxp.com" }, { "url": "https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-39902", "datePublished": "2023-10-17T00:00:00", "dateReserved": "2023-08-07T00:00:00", "dateUpdated": "2024-09-16T15:15:58.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45163 (GCVE-0-2022-45163)
Vulnerability from cvelistv5
Published
2022-11-18 00:00
Modified
2025-04-30 14:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:56.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://research.nccgroup.com/category/technical-advisory/" }, { "tags": [ "x_transferred" ], "url": "https://nxp.com" }, { "tags": [ "x_transferred" ], "url": "https://research.nccgroup.com/2022/11/17/cve-2022-45163/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45163", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-30T14:38:25.052695Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-30T14:38:50.059Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:L/AV:P/A:N/C:H/I:N/PR:N/S:C/UI:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-22T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://research.nccgroup.com/category/technical-advisory/" }, { "url": "https://nxp.com" }, { "url": "https://research.nccgroup.com/2022/11/17/cve-2022-45163/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-45163", "datePublished": "2022-11-18T00:00:00.000Z", "dateReserved": "2022-11-11T00:00:00.000Z", "dateUpdated": "2025-04-30T14:38:50.059Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-11-18 23:15
Modified
2025-04-30 15:15
Severity ?
5.3 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://nxp.com | Product | |
cve@mitre.org | https://research.nccgroup.com/2022/11/17/cve-2022-45163/ | Exploit, Technical Description, Third Party Advisory | |
cve@mitre.org | https://research.nccgroup.com/category/technical-advisory/ | Exploit, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://nxp.com | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://research.nccgroup.com/2022/11/17/cve-2022-45163/ | Exploit, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://research.nccgroup.com/category/technical-advisory/ | Exploit, Technical Description, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97F1F456-E167-4D6F-BD0F-8BE02D8334E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B3D9F06-FBAB-4271-81AF-D135995BC7CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "042E76C8-94AD-4F30-AFDC-D6E4C3F49FF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "74D9AB2D-303F-4C16-A584-0812DE52C7EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6duallite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28AF0906-B8CE-40FE-BEE0-03A814C55B0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6duallite:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40FEC3-EBBC-4B1D-9677-23B3A6D89B91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6dualplus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77688E97-E680-445E-B291-CEABBF0AC460", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6dualplus:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB41F948-3B57-4462-9FF5-890FBD038E66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6quad_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A062D5CA-B204-4209-A398-343E191A4AE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6quad:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C69EB9-C38F-41AF-B1A6-0E7BB841BA58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6quadplus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF0BC58B-DFD5-465A-AB3D-724DD05B6199", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6quadplus:-:*:*:*:*:*:*:*", "matchCriteriaId": "623866FF-4E6B-48F8-B601-09AB288294D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6solo_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA76C3C4-0030-4C52-BCDE-D4D963C2B511", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6solo:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A69747C-AE47-4219-8892-461341151E6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6sololite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25507E5C-FCAC-46E1-A90F-B9AE7D554F76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6sololite:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C42AF58-A53F-4307-A381-CD1A511F4569", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6solox_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BCB98D4-51CD-45AB-8C5D-79989A083946", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6solox:-:*:*:*:*:*:*:*", "matchCriteriaId": "71631A11-FB49-4335-BB1B-47EB9061F47B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6ull_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF45AD7-B959-452C-81CB-FD9A40D11378", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6ull:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2CD0D2A-C1A5-4771-ADAB-70375BF06670", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6ultralite_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3ECF45-3884-4AEF-B26E-72DA6E43F49A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6ultralite:-:*:*:*:*:*:*:*", "matchCriteriaId": "06A59F6D-0000-4E82-8F16-BC9BC946A7B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_6ulz_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7572762F-F69A-42FD-A16C-A831C18E2F54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_6ulz:-:*:*:*:*:*:*:*", "matchCriteriaId": "38EB61DF-AE1E-4073-89F3-86194D2B8C82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_7dual_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "079CC43E-F536-4C7A-BB92-DA2B0C051680", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_7dual:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4F7AFD4-FE4A-4D1F-9944-BF67D77E8E5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_7solo_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7206B367-4736-4045-8468-C39A41A8435C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_7solo:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F78E63-D311-4D82-A0CE-5A756D469396", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_7ulp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E548183E-FD55-4483-AA6C-D7E5869C8449", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_7ulp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D97BB820-55FF-4852-852B-92270D999564", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_8m_mini_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF734E60-E83D-4388-962E-69FC53D2FF7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_8m_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1822E0E-4DF8-411F-A890-D748F2124869", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_8m_quad_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0207759A-0914-45EF-BF28-357A3A3C8168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_8m_quad:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B8FD196-4DC4-4B60-8B39-FD4AAE016E38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_8m_vybrid_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8EA5E75-91F9-4D67-A21D-3C346777168E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_8m_vybrid:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECA942EF-73DC-4D03-B160-C28943157BFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_rt1010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "766EB181-7DFB-4EEE-A6CE-B08C3AA7FA96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_rt1010:-:*:*:*:*:*:*:*", "matchCriteriaId": "980986F1-98ED-4584-8AE3-4993852557E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_rt1015_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D354D258-CB10-4A49-9047-94E83F4B917A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_rt1015:-:*:*:*:*:*:*:*", "matchCriteriaId": "350AEDA2-3B0D-423F-8C6C-48C4C70FE51A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_rt1020_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E6900DD-6233-461B-8774-A63DAFF9D4C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_rt1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "13E0EB3F-D1FA-4B82-8494-F067E2FE0933", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_rt1050_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CDC51BD-BF4E-44D2-9443-2F75DF37CDE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_rt1050:-:*:*:*:*:*:*:*", "matchCriteriaId": "4872031C-1F8D-4E42-B8E1-D85E3EE5E8C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_rt1060_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "868F2F82-E41F-4480-ADF3-DBCA6432782F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_rt1060:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9476F4D-3676-4AE6-88BF-41E50FCD5839", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)" }, { "lang": "es", "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en dispositivos NXP seleccionados cuando se configuran en modo Serial Download Protocol (SDP):i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, y Vybrid. En una configuraci\u00f3n habilitada para la seguridad del dispositivo, el contenido de la memoria podr\u00eda potencialmente filtrarse a atacantes f\u00edsicamente pr\u00f3ximos a trav\u00e9s del puerto SDP respectivo en ataques de arranque en fr\u00edo y en caliente. (La mitigaci\u00f3n recomendada es desactivar completamente el modo SDP programando un eFUSE programable por \u00fanica vez. Los clientes pueden comunicarse con NXP para obtener informaci\u00f3n adicional)." } ], "id": "CVE-2022-45163", "lastModified": "2025-04-30T15:15:59.090", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 4.0, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-18T23:15:29.807", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://nxp.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://research.nccgroup.com/2022/11/17/cve-2022-45163/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://research.nccgroup.com/category/technical-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://nxp.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://research.nccgroup.com/2022/11/17/cve-2022-45163/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://research.nccgroup.com/category/technical-advisory/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-17 12:15
Modified
2024-11-21 08:16
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196 | Mitigation, Patch, Vendor Advisory | |
cve@mitre.org | https://nxp.com | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196 | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://nxp.com | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
nxp | uboot_secondary_program_loader | * | |
nxp | i.mx_8m | - | |
nxp | i.mx_8m_mini | - | |
nxp | i.mx_8m_nano | - | |
nxp | i.mx_8m_plus | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:uboot_secondary_program_loader:*:*:*:*:*:*:*:*", "matchCriteriaId": "D09473A1-CB04-4CD7-9540-D48F86FBC25C", "versionEndExcluding": "2023.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_8m:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0ED3090-0E33-4183-BFC6-1136BDDAE352", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:i.mx_8m_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1822E0E-4DF8-411F-A890-D748F2124869", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:i.mx_8m_nano:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFA7C7D-B4D6-4D5A-A411-492A112B30D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:i.mx_8m_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "006051D6-02C6-4E4C-928C-F43AB5B32859", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus." }, { "lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de software en U-Boot Secondary Program Loader (SPL) antes de 2023.07 en procesadores seleccionados de la familia NXP i.MX 8M. En determinadas condiciones, se puede utilizar una estructura de Flattened Image Tree (FIT) manipulada para sobrescribir la memoria SPL, lo que permite que se ejecute software no autenticado en el destino, lo que lleva a una escalada de privilegios. Esto afecta a i.MX 8M, i.MX 8M Mini, i.MX 8M Nano y i.MX 8M Plus." } ], "id": "CVE-2023-39902", "lastModified": "2024-11-21T08:16:00.530", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-17T12:15:09.960", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://nxp.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://nxp.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }