Vulnerabilites related to nxp - lpc55s69jbd64_firmware
Vulnerability from fkie_nvd
Published
2022-03-23 22:15
Modified
2024-11-21 06:47
Summary
NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s66jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5709A1-1B83-4DDC-B3DC-336867D318DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s66jbd64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD4A2DDD-E476-46D6-B715-ABFD2DBC1D88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s66jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09DE32B-7CA7-4737-AF06-90B864A50A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s66jbd100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1198FA4-CE4B-4637-B5EF-ED7C7F244DFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s66jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7610B9-70B5-451E-ABC6-A447B2AC6FDF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s66jev98:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26327E81-0B45-4184-B42F-6497F840230D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18444119-AF09-496A-A3EF-9417DE557916",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "785D9828-78BB-43C8-98E9-1AFDD717751F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01C4752-62DA-432C-A802-F9478F06CAAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C80F79A-520A-4A03-9D1A-8001DB385DBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C0290C-529A-42C8-AF2E-B26462E3824C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jev98:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7511FE0-734D-48E4-8F80-06992AE21C76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update."
    },
    {
      "lang": "es",
      "value": "Los microcontroladores NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100 y LPC55S69JEV98 (versi\u00f3n ROM 1B), presentan un desbordamiento de b\u00fafer al analizar las actualizaciones SB2 antes de verificar la firma. Esto puede permitir a un atacante lograr una ejecuci\u00f3n de c\u00f3digo no persistente por medio de una actualizaci\u00f3n sin firma dise\u00f1ada"
    }
  ],
  "id": "CVE-2022-22819",
  "lastModified": "2024-11-21T06:47:30.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-23T22:15:13.097",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nxp.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nxp.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-12-01 15:15
Modified
2024-11-21 06:23
Summary
NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01C4752-62DA-432C-A802-F9478F06CAAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAD0A6CB-74C5-4D26-A8AD-33BED194D6A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01C4752-62DA-432C-A802-F9478F06CAAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd100:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "E045483A-280E-4A52-AB78-AB646C5D1AE3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18444119-AF09-496A-A3EF-9417DE557916",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C7E243-8350-437B-A287-F874C39353C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18444119-AF09-496A-A3EF-9417DE557916",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd64:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B72B96A2-11BB-491F-908D-9744B64B83AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C0290C-529A-42C8-AF2E-B26462E3824C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jev98:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "A23F037B-E7D1-4BAC-AB4B-09CD8F8F77F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C0290C-529A-42C8-AF2E-B26462E3824C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jev98:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "37881CE5-1909-48D0-9BED-4031E520DE0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory."
    },
    {
      "lang": "es",
      "value": "Los dispositivos NXP LPC55S69 versiones anteriores a A3, presentan una lectura excesiva del b\u00fafer por medio de un valor wlength dise\u00f1ado en una petici\u00f3n GET Descriptor Configuration durante el uso del modo USB In-System Programming (ISP). Esto revela la memoria flash protegida"
    }
  ],
  "id": "CVE-2021-40154",
  "lastModified": "2024-11-21T06:23:40.750",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 4.2,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-01T15:15:07.603",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/Xen1thLabs-AE/CVE-2021-40154"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://www.darkmatter.ae/xen1thlabs/published-advisories/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/Xen1thLabs-AE/CVE-2021-40154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://www.darkmatter.ae/xen1thlabs/published-advisories/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-05-06 13:15
Modified
2024-11-21 06:05
Summary
NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01C4752-62DA-432C-A802-F9478F06CAAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAD0A6CB-74C5-4D26-A8AD-33BED194D6A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd100:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "E045483A-280E-4A52-AB78-AB646C5D1AE3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s66jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09DE32B-7CA7-4737-AF06-90B864A50A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s66jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE85F9-561D-40D4-BA58-53E4709EBAB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s66jbd100:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "3790AA82-3918-4697-BAAF-7AD09A79D77C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C0290C-529A-42C8-AF2E-B26462E3824C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jev98:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "A23F037B-E7D1-4BAC-AB4B-09CD8F8F77F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jev98:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "37881CE5-1909-48D0-9BED-4031E520DE0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpcs66jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "267460F6-E63B-4B62-AD1F-2445CD90F011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpcs66jev98:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95E7987-A8BB-4194-8850-5607E5BCE2EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpcs66jev98:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "680C23F3-A50D-427F-8560-A512AE01ECD4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s69jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18444119-AF09-496A-A3EF-9417DE557916",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C7E243-8350-437B-A287-F874C39353C0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s69jbd64:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "B72B96A2-11BB-491F-908D-9744B64B83AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpcs66jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70132218-3326-40B3-AC85-4679CF7A87F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpcs66jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "22DEEEC1-0213-4D06-96AE-F636CFDCE77C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpcs66jbd64:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62BE7068-1ADF-48BF-B87F-4C704A1161FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:i.mx_rt500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A1A7E9E-9B0A-48CB-BD8D-DD700920DCA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:i.mx_rt500:b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39D87D58-5444-4D80-BCBB-34C9F0AEDF6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:i.mx_rt500:b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E595E45-0858-471F-B1AC-81761977966F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:i.mx_rt600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C26E5AD-E6B3-44A3-910E-EFC4F6F6B94D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:i.mx_rt600:a0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5618FA-901B-448A-9A2D-86430F08707D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:i.mx_rt600:b0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6B6B59D-9C34-4A27-8567-37E50F82854E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s28_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CCAACEE-6A62-46BF-96A3-0EE2584828C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s28:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88B2385-8C4B-4A98-9255-2D99234A13C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s28:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "59AC6614-A200-4545-91ED-D105CA38249C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s26_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "473FED2F-64C5-4D95-AB32-FD0E00CAA919",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s26:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "794BBCDF-C65B-4B5E-9DCE-6277B0706E82",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s26:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "29528CB4-B0B9-4CF1-80DB-E2FFFC225262",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5528_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3407A7AB-16F5-4665-8629-6196D8D228B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5528:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F1DB2CD-8F26-4AF1-B85E-39E26666F0A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc5528:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C442D5D4-A570-47AE-9BF7-218A2DA81A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5526_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA772B1E-9936-40BD-974F-D181BE6763E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5526:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "228ED399-9C9C-4405-965E-1EF7FF55B906",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:nxp:lpc5526:1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23F0069-812A-4AA5-8A18-B35E8E996DD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s16jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8DA850-A3E9-4E2A-AA33-FCA8ED6AA800",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s16jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5796D8-5009-4C6F-92A0-D8C418967EE6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s16jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7210AB3-E010-4B8B-AC2C-7BF93D2DAABA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s16jev98:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D214191-EF7A-48D9-94CF-123523716EA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s16jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C482AFCA-581A-4CEE-B54B-9A9CB85D709A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s16jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F945B88A-EAAF-486E-86BD-8D6C6529607A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s14jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDB619D-729E-4B94-8F73-06DA57C4B428",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s14jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9463A7-7B4A-4E1B-873C-72A80ED05DDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc55s14jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93246FF-501C-4162-A978-C9B99A4169D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc55s14jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE36A31D-5ADB-455E-96E0-6A42ABBBCE7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5516jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48623257-530E-4FE4-ABDB-1DBD826BB870",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5516jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C02E13E7-9C52-43EE-B25D-F299B3165990",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5516jev98_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA31AE2-362F-42E0-ADB1-8B4E722B4E19",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5516jev98:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5BAC590-3D4D-4796-B03D-3A9A89FEBA1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5516jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50390641-708D-4724-B52B-B5E515A03B9B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5516jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F44502F-A383-4106-ADDE-CC2C694A3AA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5514jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "152F6782-A179-465F-A430-90E1CAF0A87A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5514jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8150A237-B3B9-4B63-AEFF-3A74138EE8B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5514jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1237E77E-4E08-47F2-A6E2-D9159F32429D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5514jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B26333DB-B724-4CA2-915F-AE5F017D99AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5512jbd100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABFA071-EB5F-4041-B0A2-C7BEA7BAF1FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5512jbd100:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D2A7874-E35A-483E-9389-1258E4B85BCD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:nxp:lpc5512jbd64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "343A3A84-E70D-48F8-8B20-7340DB918BEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:nxp:lpc5512jbd64:0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E99A86-7BAC-4B3E-8785-389F0DE262A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM."
    },
    {
      "lang": "es",
      "value": "Microcontroladores NXP LPC55S6x (0A y 1B), i.MX RT500 (silicio rev B1 y B2), i. MX RT600 (silicio rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicio rev 0A, 1B), LPC55S1x, LPC551x (silicio rev 0A) y LPC55S0x, LPC550x (silicio rev 0A) incluyen un perif\u00e9rico de parcheo de ROM no documentado que permite la modificaci\u00f3n sin firma y no persistente de la ROM interna"
    }
  ],
  "id": "CVE-2021-31532",
  "lastModified": "2024-11-21T06:05:51.807",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-06T13:15:12.667",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://oxide.computer/blog/lpc55/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nxp.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://oxide.computer/blog/lpc55/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nxp.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2021-40154 (GCVE-0-2021-40154)
Vulnerability from cvelistv5
Published
2021-12-01 14:50
Modified
2024-08-04 02:27
CWE
  • n/a
Summary
NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:27:31.524Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.darkmatter.ae/xen1thlabs/published-advisories/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/Xen1thLabs-AE/CVE-2021-40154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:L/AV:L/A:L/C:H/I:N/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-01T14:50:48",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.darkmatter.ae/xen1thlabs/published-advisories/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Xen1thLabs-AE/CVE-2021-40154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-40154",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:L/AV:L/A:L/C:H/I:N/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.darkmatter.ae/xen1thlabs/published-advisories/",
              "refsource": "MISC",
              "url": "https://www.darkmatter.ae/xen1thlabs/published-advisories/"
            },
            {
              "name": "https://github.com/Xen1thLabs-AE/CVE-2021-40154",
              "refsource": "MISC",
              "url": "https://github.com/Xen1thLabs-AE/CVE-2021-40154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-40154",
    "datePublished": "2021-12-01T14:50:48",
    "dateReserved": "2021-08-27T00:00:00",
    "dateUpdated": "2024-08-04T02:27:31.524Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-31532 (GCVE-0-2021-31532)
Vulnerability from cvelistv5
Published
2021-05-06 10:49
Modified
2024-08-03 23:03
Severity ?
CWE
  • n/a
Summary
NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM.
References
https://www.nxp.comx_refsource_MISC
https://oxide.computer/blog/lpc55/x_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T23:03:33.271Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nxp.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://oxide.computer/blog/lpc55/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-09T19:05:18",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nxp.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://oxide.computer/blog/lpc55/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-31532",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.nxp.com",
              "refsource": "MISC",
              "url": "https://www.nxp.com"
            },
            {
              "name": "https://oxide.computer/blog/lpc55/",
              "refsource": "MISC",
              "url": "https://oxide.computer/blog/lpc55/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-31532",
    "datePublished": "2021-05-06T10:49:11",
    "dateReserved": "2021-04-21T00:00:00",
    "dateUpdated": "2024-08-03T23:03:33.271Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-22819 (GCVE-0-2022-22819)
Vulnerability from cvelistv5
Published
2022-03-23 21:13
Modified
2024-08-03 03:21
Severity ?
CWE
  • n/a
Summary
NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:21:49.121Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nxp.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-23T21:13:46",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nxp.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-22819",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.nxp.com",
              "refsource": "MISC",
              "url": "https://www.nxp.com"
            },
            {
              "name": "https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom",
              "refsource": "MISC",
              "url": "https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-22819",
    "datePublished": "2022-03-23T21:13:46",
    "dateReserved": "2022-01-07T00:00:00",
    "dateUpdated": "2024-08-03T03:21:49.121Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}