An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633 - Exploit, Third Party Advisory |
Information
Published : 2019-03-21 17:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-3968
Mitre link : CVE-2018-3968
CVE.ORG link : CVE-2018-3968
JSON object : View
Products Affected
denx
- u-boot
CWE
CWE-347
Improper Verification of Cryptographic Signature