{"id": "CVE-2021-44850", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.8, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.9}]}, "published": "2022-02-10T19:15:09.273", "references": [{"url": "https://support.xilinx.com/s/article/47915", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://support.xilinx.com/s/article/76964", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://support.xilinx.com/s/article/47915", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.xilinx.com/s/article/76964", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-345"}]}], "descriptions": [{"lang": "en", "value": "On Xilinx Zynq-7000 SoC devices, physical modification of an SD boot image allows for a buffer overflow attack in the ROM. Because the Zynq-7000's boot image header is unencrypted and unauthenticated before use, an attacker can modify the boot header stored on an SD card so that a secure image appears to be unencrypted, and they will be able to modify the full range of register initialization values. Normally, these registers will be restricted when booting securely. Of importance to this attack are two registers that control the SD card's transfer type and transfer size. These registers could be modified a way that causes a buffer overflow in the ROM."}, {"lang": "es", "value": "En los dispositivos Xilinx Zynq-7000 SoC, la modificaci\u00f3n f\u00edsica de una imagen de arranque de la SD permite un ataque de desbordamiento del b\u00fafer en la ROM. Dado que el encabezado de la imagen de arranque del Zynq-7000 no est\u00e1 cifrada ni autenticada antes de su uso, un atacante puede modificar el encabezado de arranque almacenado en una tarjeta SD para que una imagen segura parezca no estar cifrada, y podr\u00e1 modificar toda la gama de valores de inicializaci\u00f3n de registros. Normalmente, estos registros estar\u00e1n restringidos cuando el arranque sea seguro. De importancia para este ataque son dos registros que controlan el tipo y el tama\u00f1o de transferencia de la tarjeta SD. Estos registros podr\u00edan modificarse de forma que causen un desbordamiento del b\u00fafer en la ROM"}], "lastModified": "2024-11-21T06:31:36.447", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7012s_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81DAB2B9-2132-4B97-A905-36978147A762"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7012s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D76CE1B4-C565-4E61-8F2D-52ECF619F736"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7014s_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86C6A24C-5289-4B93-8018-9053BFE495E4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7014s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8AD46B06-3CDA-45F1-965A-B1F17855B20B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7010_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "392A630E-7281-4298-A1CB-5414C8C3485D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B88387AF-457E-4AB0-A2A7-F710BA314773"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7015_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86197392-C8F2-47E7-A734-25678FD656B2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7015:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DCA94318-29BF-4E77-82C7-01645B202376"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7020_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "498E7EFE-CDEF-4514-9832-A335B82B90BB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7020:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0B71A3EB-FDDE-45CE-B234-C01C9A7D3AC9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7030_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F52D03E4-847F-43A0-BA89-1BD3F0C45139"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7030:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "196C05DE-B75B-41CD-A15C-A49869738586"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7035_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB0637D7-806D-4D97-97AA-ED951740FD2E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7035:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C196D35B-9727-45DA-88D4-3D69D77F3A3B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7045_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15DDF11C-8C7F-49F7-A8E7-C48C5D4130CA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7045:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "90A236BC-2AB5-48B1-AEB2-271A9001E5A0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7100_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0DB5382-D7CD-457C-BEE1-E9C0ECB43FE8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EB7A30E3-7BAD-4E7C-AF9A-B75F6BCC8BAF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:amd:xilinx_z-7007s_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26891BC7-D987-4761-80CD-A0D10D12A0B3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:amd:xilinx_z-7007s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1482DCD2-5C32-414E-98CA-00209F75CED1"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}