We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-38433

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness



Description

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code execution.

Reserved 2024-06-16 | Published 2024-07-11 | Updated 2024-08-02 | Assigner INCD


MEDIUM: 6.7CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-305: Authentication Bypass by Primary Weakness

Product status

Default status
unaffected

All versions before v10.10.19
affected

Credits

Ferdinand Nölscher of Google's OTS-HS Team finder

References

www.gov.il/en/Departments/faq/cve_advisories

cve.org (CVE-2024-38433)

nvd.nist.gov (CVE-2024-38433)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-38433

Support options

Helpdesk Chat, Email, Knowledgebase