CVE-2022-45163

An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
References
Link Resource
https://nxp.com Product
https://research.nccgroup.com/2022/11/17/cve-2022-45163/ Exploit Technical Description Third Party Advisory
https://research.nccgroup.com/category/technical-advisory/ Exploit Technical Description Third Party Advisory
https://nxp.com Product
https://research.nccgroup.com/2022/11/17/cve-2022-45163/ Exploit Technical Description Third Party Advisory
https://research.nccgroup.com/category/technical-advisory/ Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:nxp:i.mx_6_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:nxp:i.mx_6dual_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6dual:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:nxp:i.mx_6duallite_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6duallite:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:nxp:i.mx_6dualplus_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6dualplus:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:nxp:i.mx_6quad_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6quad:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:nxp:i.mx_6quadplus_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6quadplus:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:nxp:i.mx_6solo_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6solo:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:nxp:i.mx_6sololite_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6sololite:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:nxp:i.mx_6solox_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6solox:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:nxp:i.mx_6ull_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6ull:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:nxp:i.mx_6ultralite_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6ultralite:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:nxp:i.mx_6ulz_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_6ulz:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:nxp:i.mx_7dual_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_7dual:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:nxp:i.mx_7solo_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_7solo:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:nxp:i.mx_7ulp_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_7ulp:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:nxp:i.mx_8m_mini_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_8m_mini:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:nxp:i.mx_8m_quad_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_8m_quad:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:nxp:i.mx_8m_vybrid_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_8m_vybrid:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:nxp:i.mx_rt1010_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_rt1010:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:nxp:i.mx_rt1015_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_rt1015:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:nxp:i.mx_rt1020_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_rt1020:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:nxp:i.mx_rt1050_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_rt1050:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:nxp:i.mx_rt1060_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:i.mx_rt1060:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.6
v2 : unknown
v3 : 5.3
References () https://nxp.com - Product () https://nxp.com - Product
References () https://research.nccgroup.com/2022/11/17/cve-2022-45163/ - Exploit, Technical Description, Third Party Advisory () https://research.nccgroup.com/2022/11/17/cve-2022-45163/ - Exploit, Technical Description, Third Party Advisory
References () https://research.nccgroup.com/category/technical-advisory/ - Exploit, Technical Description, Third Party Advisory () https://research.nccgroup.com/category/technical-advisory/ - Exploit, Technical Description, Third Party Advisory

Information

Published : 2022-11-18 23:15

Updated : 2024-11-21 07:28


NVD link : CVE-2022-45163

Mitre link : CVE-2022-45163

CVE.ORG link : CVE-2022-45163


JSON object : View

Products Affected

nxp

  • i.mx_6quad
  • i.mx_6quad_firmware
  • i.mx_6ultralite_firmware
  • i.mx_7solo_firmware
  • i.mx_6ulz_firmware
  • i.mx_8m_mini
  • i.mx_6solox
  • i.mx_6_firmware
  • i.mx_6quadplus
  • i.mx_rt1010
  • i.mx_6ultralite
  • i.mx_7ulp
  • i.mx_rt1060_firmware
  • i.mx_6solo
  • i.mx_6duallite_firmware
  • i.mx_rt1015_firmware
  • i.mx_6dualplus
  • i.mx_rt1060
  • i.mx_8m_mini_firmware
  • i.mx_6dual
  • i.mx_6dualplus_firmware
  • i.mx_6
  • i.mx_8m_quad_firmware
  • i.mx_6solo_firmware
  • i.mx_rt1010_firmware
  • i.mx_8m_vybrid_firmware
  • i.mx_6sololite_firmware
  • i.mx_6ull_firmware
  • i.mx_6sololite
  • i.mx_6duallite
  • i.mx_8m_vybrid
  • i.mx_rt1020
  • i.mx_6ulz
  • i.mx_7ulp_firmware
  • i.mx_6ull
  • i.mx_7dual
  • i.mx_7dual_firmware
  • i.mx_rt1050_firmware
  • i.mx_6dual_firmware
  • i.mx_8m_quad
  • i.mx_rt1015
  • i.mx_6solox_firmware
  • i.mx_6quadplus_firmware
  • i.mx_7solo
  • i.mx_rt1020_firmware
  • i.mx_rt1050
CWE
CWE-203

Observable Discrepancy