Arbitrary Code Execution via Modified U-Boot Image Header
CVE-2024-38433

6.7MEDIUM

Key Information:

Vendor

Nuvoton

Vendor
CVE Published:
11 July 2024

What is CVE-2024-38433?

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness

An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock

reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code

execution.

Affected Version(s)

NPCM7xx (Poleg) BootBlock All versions

References

CVSS V3.1

Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ferdinand Nölscher of Google's OTS-HS Team
.