20 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

17 Oct 2023 — A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus. Se identificó una vulnerabilidad de software en U-Boot Secondary Program Loader (SPL) an... • https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196 • CWE-281: Improper Preservation of Permissions •

CVSS: 5.3EPSS: 0%CPEs: 46EXPL: 2

18 Nov 2022 — An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the S... • https://nxp.com • CWE-203: Observable Discrepancy •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

03 May 2022 — NXP MQX Versions 5.1 and prior are vulnerable to integer overflow in mem_alloc, _lwmem_alloc and _partition functions. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. NXP MQX versiones 5.1 y anteriores, son vulnerables a un desbordamiento de enteros en las funciones mem_alloc, _lwmem_alloc y _partition. Esta asignación de memoria no verificada puede conllevar a una asignación de memoria arbitrar... • https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04 • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

03 May 2022 — NXP MCUXpresso SDK versions prior to 2.8.2 are vulnerable to integer overflow in SDK_Malloc function, which could allow to access memory locations outside the bounds of a specified array, leading to unexpected behavior such segmentation fault when assigning a particular block of memory from the heap via malloc. NXP MCUXpresso SDK versiones anteriores a 2.8.2, son vulnerables a un desbordamiento de enteros en la función SDK_Malloc, que podría permitir el acceso a ubicaciones de memoria fuera de los límites d... • https://mcuxpresso.nxp.com/en/welcome • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 1

23 Mar 2022 — NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update. Los microcontroladores NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100 y LPC55S69JEV98 (versión ROM 1B), presentan un desbordamiento de búfer al analizar las actualizac... • https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

07 Dec 2021 — An issue was discovered in Trusted Firmware OP-TEE Trusted OS through 3.15.0. The OPTEE-OS CSU driver for NXP i.MX6UL SoC devices lacks security access configuration for wakeup-related registers, resulting in TrustZone bypass because the NonSecure World can perform arbitrary memory read/write operations on Secure World memory. This involves a v cycle. Se ha detectado un problema en Trusted Firmware OP-TEE Trusted OS versiones hasta 3.15.0. El controlador CSU de OPTEE-OS para los dispositivos SoC NXP i.MX6UL... • https://github.com/OP-TEE/optee_os/tags •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

07 Dec 2021 — The OPTEE-OS CSU driver for NXP i.MX SoC devices lacks security access configuration for several models, resulting in TrustZone bypass because the NonSecure World can perform arbitrary memory read/write operations on Secure World memory. This involves a DMA capable peripheral. El controlador CSU de OPTEE-OS para los dispositivos NXP i.MX SoC carece de configuración de acceso de seguridad para varios modelos, resultando en una omisión de TrustZone porque el Mundo no Seguro puede llevar a cabo operaciones arb... • https://github.com/f-secure-foundry/advisories/blob/master/Security_Advisory-Ref_FSC-HWSEC-VR2021-0001-OP-TEE_TrustZone_bypass.txt • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

01 Dec 2021 — NXP Kinetis K82 devices have a buffer over-read via a crafted wlength value in a GET Status-Other request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory. Los dispositivos NXP Kinetis K82 presentan una lectura excesiva del búfer por medio de un valor wlength diseñado en una petición GET Status-Other durante el uso del modo USB In-System Programming (ISP). Esto revela la memoria flash protegida • https://github.com/Xen1thLabs-AE/CVE-2021-40154 • CWE-125: Out-of-bounds Read •

CVSS: 6.1EPSS: 0%CPEs: 12EXPL: 1

01 Dec 2021 — NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory. Los dispositivos NXP LPC55S69 versiones anteriores a A3, presentan una lectura excesiva del búfer por medio de un valor wlength diseñado en una petición GET Descriptor Configuration durante el uso del modo USB In-System Programming (ISP). Esto revela la memoria flash protegida • https://github.com/Jeromeyoung/CVE-2021-40154 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

25 Oct 2021 — NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostParseDeviceConfigurationDescriptor(). Se ha detectado que NXP MCUXpresso SDK versión v2.7.0, contiene un desbordamiento de búfer en la función USB_HostParseDeviceConfigurationDescriptor() • https://mcusec.github.io/vulnerabilities_details#nxp_usb • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •