CVE-2024-25077

An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697, and DA14699 devices. The Nonce used for on-the-fly decryption of flash images is stored in an unsigned header, allowing its value to be modified without invalidating the signature used for secureboot image verification. Because the encryption engine for on-the-fly decryption uses AES in CTR mode without authentication, an attacker-modified Nonce can result in execution of arbitrary code.
Configurations

No configuration.

History

21 Nov 2024, 09:00

Type Values Removed Values Added
References () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2024-0001.md - () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2024-0001.md -

08 Aug 2024, 14:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-94

11 Jul 2024, 13:05

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema en los dispositivos Renesas SmartBond DA14691, DA14695, DA14697 y DA14699. El Nonce utilizado para el descifrado sobre la marcha de imágenes flash se almacena en un encabezado sin firmar, lo que permite modificar su valor sin invalidar la firma utilizada para la verificación de imágenes de arranque seguro. Debido a que el motor de cifrado para el descifrado sobre la marcha utiliza AES en modo CTR sin autenticación, un Nonce modificado por un atacante puede provocar la ejecución de código arbitrario.

10 Jul 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-10 20:15

Updated : 2024-11-21 09:00


NVD link : CVE-2024-25077

Mitre link : CVE-2024-25077

CVE.ORG link : CVE-2024-25077


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')