A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus.
References
Link | Resource |
---|---|
https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196 | Mitigation Patch Vendor Advisory |
https://nxp.com | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-10-17 12:15
Updated : 2023-10-24 19:30
NVD link : CVE-2023-39902
Mitre link : CVE-2023-39902
CVE.ORG link : CVE-2023-39902
JSON object : View
Products Affected
nxp
- i.mx_8m_nano
- i.mx_8m
- i.mx_8m_plus
- i.mx_8m_mini
- uboot_secondary_program_loader
CWE
CWE-281
Improper Preservation of Permissions