We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-38433

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness



AssignerINCD
Reserved2024-06-16
Published2024-07-11
Updated2024-08-02

Description

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code execution.



MEDIUM: 6.7CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-305: Authentication Bypass by Primary Weakness

Product status

Default status
unaffected

All versions before v10.10.19
affected

Credits

Ferdinand Nölscher of Google's OTS-HS Team 0x400214aed0

References

https://www.gov.il/en/Departments/faq/cve_advisories

cve.org CVE-2024-38433

nvd.nist.gov CVE-2024-38433

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.