20 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus. Se identificó una vulnerabilidad de software en U-Boot Secondary Program Loader (SPL) antes de 2023.07 en procesadores seleccionados de la familia NXP i.MX 8M. En determinadas condiciones, se puede utilizar una estructura de Flattened Image Tree (FIT) manipulada para sobrescribir la memoria SPL, lo que permite que se ejecute software no autenticado en el destino, lo que lleva a una escalada de privilegios. • https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196 https://nxp.com • CWE-281: Improper Preservation of Permissions •

CVSS: 5.3EPSS: 0%CPEs: 46EXPL: 2

An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.) Existe una vulnerabilidad de divulgación de información en dispositivos NXP seleccionados cuando se configuran en modo Serial Download Protocol (SDP):i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, y Vybrid. • https://nxp.com https://research.nccgroup.com/2022/11/17/cve-2022-45163 https://research.nccgroup.com/category/technical-advisory • CWE-203: Observable Discrepancy •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

NXP MQX Versions 5.1 and prior are vulnerable to integer overflow in mem_alloc, _lwmem_alloc and _partition functions. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. NXP MQX versiones 5.1 y anteriores, son vulnerables a un desbordamiento de enteros en las funciones mem_alloc, _lwmem_alloc y _partition. Esta asignación de memoria no verificada puede conllevar a una asignación de memoria arbitraria, resultando en un comportamiento no esperado como un bloqueo o una inyección/ejecución de código remoto • https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04 • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

NXP MCUXpresso SDK versions prior to 2.8.2 are vulnerable to integer overflow in SDK_Malloc function, which could allow to access memory locations outside the bounds of a specified array, leading to unexpected behavior such segmentation fault when assigning a particular block of memory from the heap via malloc. NXP MCUXpresso SDK versiones anteriores a 2.8.2, son vulnerables a un desbordamiento de enteros en la función SDK_Malloc, que podría permitir el acceso a ubicaciones de memoria fuera de los límites de una matriz especificada, conllevando a un comportamiento no esperado, como un fallo de segmentación, cuando es asignado un bloque concreto de memoria de la pila por medio de malloc • https://mcuxpresso.nxp.com/en/welcome https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 1

NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update. Los microcontroladores NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100 y LPC55S69JEV98 (versión ROM 1B), presentan un desbordamiento de búfer al analizar las actualizaciones SB2 antes de verificar la firma. Esto puede permitir a un atacante lograr una ejecución de código no persistente por medio de una actualización sin firma diseñada • https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom https://www.nxp.com • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •