THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-38433

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness

AssignerINCD
Reserved2024-06-16
Published2024-07-11
Updated2024-07-11

Description

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code execution.



MEDIUM: 6.7CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-305: Authentication Bypass by Primary Weakness

Product status

Default status
unaffected

All versions before v10.10.19
affected

Credits

Ferdinand Nölscher of Google's OTS-HS Team finder

References

https://www.gov.il/en/Departments/faq/cve_advisories

cve.org CVE-2024-38433

nvd.nist.gov CVE-2024-38433

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-38433
© Copyright 2024 THREATINT. Made in Cyprus with +