// For flags

CVE-2017-3226

Das U-Boot's AES-CBC encryption feature improperly handles an error condition and may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data

Severity Score

6.4
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.

Das U-Boot es un bootloader de dispositivos que puede leer su configuración desde un archivo cifrado por AES. Los dispositivos que emplean la característica de cifrado AES-CBC de Das U-Boot mediante cifrado de entorno (por ejemplo, estableciendo el parámetro de configuración CONFIG_ENV_AES=y) leen variables de entorno del disco según se procesa la imagen del disco cifrada. Un atacante con acceso físico al dispositivo puede manipular los datos cifrados de entorno para incluir una secuencia de dos bytes manipulada que desencadena un error en el análisis de variables de entorno. Das U-Boot gestiona erróneamente esta condición de error, lo que resulta en la terminación inmediata del proceso con un mensaje de depuración.

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-05 CVE Reserved
  • 2018-07-24 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-310: Cryptographic Issues
  • CWE-329: Generation of Predictable IV with CBC Mode
CAPEC
References (2)
URL Tag Source
http://www.securityfocus.com/bid/100675 Third Party Advisory
https://www.kb.cert.org/vuls/id/166743 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Denx
Search vendor "Denx"
U-boot
Search vendor "Denx" for product "U-boot"
< 2017.09
Search vendor "Denx" for product "U-boot" and version " < 2017.09"
-
Affected