- Description
- An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot.
- Source
- talos-cna@cisco.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 8.2
- Impact score
- 6
- Exploitability score
- 1.5
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4.4
- Impact score
- 6.4
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-347
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1C8DB5B6-2A9F-44EA-B3DC-CDE840C14540",
"versionEndIncluding": "2014.07",
"versionStartIncluding": "2013.07"
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2013.07:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6C787638-BDD7-485A-B024-803B9651D54A"
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2013.07:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CD7B4F31-7C15-4EF6-9E09-923C0A396415"
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2013.07:rc3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B6179563-B4D6-4521-B7D3-89A2A8EC48A7"
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2014.07:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9356F059-9AE8-4A34-9B94-7690E068F212"
},
{
"criteria": "cpe:2.3:a:denx:u-boot:2014.07:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D588DDD7-46D5-4BFF-9732-DEE4DEDC4D39"
}
],
"operator": "OR"
}
]
}
]