Vulnerabilites related to nxp - lpcs66jev98
CVE-2021-31532 (GCVE-0-2021-31532)
Vulnerability from cvelistv5
Published
2021-05-06 10:49
Modified
2024-08-03 23:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM.
References
▼ | URL | Tags |
---|---|---|
https://www.nxp.com | x_refsource_MISC | |
https://oxide.computer/blog/lpc55/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.nxp.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://oxide.computer/blog/lpc55/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-09T19:05:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.nxp.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://oxide.computer/blog/lpc55/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.nxp.com", "refsource": "MISC", "url": "https://www.nxp.com" }, { "name": "https://oxide.computer/blog/lpc55/", "refsource": "MISC", "url": "https://oxide.computer/blog/lpc55/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31532", "datePublished": "2021-05-06T10:49:11", "dateReserved": "2021-04-21T00:00:00", "dateUpdated": "2024-08-03T23:03:33.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-05-06 13:15
Modified
2024-11-21 06:05
Severity ?
Summary
NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://oxide.computer/blog/lpc55/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.nxp.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oxide.computer/blog/lpc55/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.nxp.com | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s69jbd100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01C4752-62DA-432C-A802-F9478F06CAAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s69jbd100:0a:*:*:*:*:*:*:*", "matchCriteriaId": "EAD0A6CB-74C5-4D26-A8AD-33BED194D6A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc55s69jbd100:1b:*:*:*:*:*:*:*", "matchCriteriaId": "E045483A-280E-4A52-AB78-AB646C5D1AE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s66jbd100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B09DE32B-7CA7-4737-AF06-90B864A50A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s66jbd100:0a:*:*:*:*:*:*:*", "matchCriteriaId": "01FE85F9-561D-40D4-BA58-53E4709EBAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc55s66jbd100:1b:*:*:*:*:*:*:*", "matchCriteriaId": "3790AA82-3918-4697-BAAF-7AD09A79D77C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s69jev98_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C0290C-529A-42C8-AF2E-B26462E3824C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s69jev98:0a:*:*:*:*:*:*:*", "matchCriteriaId": "A23F037B-E7D1-4BAC-AB4B-09CD8F8F77F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc55s69jev98:1b:*:*:*:*:*:*:*", "matchCriteriaId": "37881CE5-1909-48D0-9BED-4031E520DE0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpcs66jev98_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "267460F6-E63B-4B62-AD1F-2445CD90F011", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpcs66jev98:0a:*:*:*:*:*:*:*", "matchCriteriaId": "E95E7987-A8BB-4194-8850-5607E5BCE2EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpcs66jev98:1b:*:*:*:*:*:*:*", "matchCriteriaId": "680C23F3-A50D-427F-8560-A512AE01ECD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s69jbd64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "18444119-AF09-496A-A3EF-9417DE557916", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s69jbd64:0a:*:*:*:*:*:*:*", "matchCriteriaId": "F4C7E243-8350-437B-A287-F874C39353C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc55s69jbd64:1b:*:*:*:*:*:*:*", "matchCriteriaId": "B72B96A2-11BB-491F-908D-9744B64B83AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpcs66jbd64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70132218-3326-40B3-AC85-4679CF7A87F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpcs66jbd64:0a:*:*:*:*:*:*:*", "matchCriteriaId": "22DEEEC1-0213-4D06-96AE-F636CFDCE77C", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpcs66jbd64:1b:*:*:*:*:*:*:*", "matchCriteriaId": "62BE7068-1ADF-48BF-B87F-4C704A1161FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_rt500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A1A7E9E-9B0A-48CB-BD8D-DD700920DCA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_rt500:b1:*:*:*:*:*:*:*", "matchCriteriaId": "39D87D58-5444-4D80-BCBB-34C9F0AEDF6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:i.mx_rt500:b2:*:*:*:*:*:*:*", "matchCriteriaId": "6E595E45-0858-471F-B1AC-81761977966F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:i.mx_rt600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C26E5AD-E6B3-44A3-910E-EFC4F6F6B94D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:i.mx_rt600:a0:*:*:*:*:*:*:*", "matchCriteriaId": "DF5618FA-901B-448A-9A2D-86430F08707D", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:i.mx_rt600:b0:*:*:*:*:*:*:*", "matchCriteriaId": "D6B6B59D-9C34-4A27-8567-37E50F82854E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CCAACEE-6A62-46BF-96A3-0EE2584828C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s28:0a:*:*:*:*:*:*:*", "matchCriteriaId": "F88B2385-8C4B-4A98-9255-2D99234A13C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc55s28:1b:*:*:*:*:*:*:*", "matchCriteriaId": "59AC6614-A200-4545-91ED-D105CA38249C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s26_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "473FED2F-64C5-4D95-AB32-FD0E00CAA919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s26:0a:*:*:*:*:*:*:*", "matchCriteriaId": "794BBCDF-C65B-4B5E-9DCE-6277B0706E82", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc55s26:1b:*:*:*:*:*:*:*", "matchCriteriaId": "29528CB4-B0B9-4CF1-80DB-E2FFFC225262", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5528_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3407A7AB-16F5-4665-8629-6196D8D228B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5528:0a:*:*:*:*:*:*:*", "matchCriteriaId": "1F1DB2CD-8F26-4AF1-B85E-39E26666F0A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc5528:1b:*:*:*:*:*:*:*", "matchCriteriaId": "C442D5D4-A570-47AE-9BF7-218A2DA81A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5526_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA772B1E-9936-40BD-974F-D181BE6763E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5526:0a:*:*:*:*:*:*:*", "matchCriteriaId": "228ED399-9C9C-4405-965E-1EF7FF55B906", "vulnerable": false }, { "criteria": "cpe:2.3:h:nxp:lpc5526:1b:*:*:*:*:*:*:*", "matchCriteriaId": "D23F0069-812A-4AA5-8A18-B35E8E996DD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s16jbd100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D8DA850-A3E9-4E2A-AA33-FCA8ED6AA800", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s16jbd100:0a:*:*:*:*:*:*:*", "matchCriteriaId": "5C5796D8-5009-4C6F-92A0-D8C418967EE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s16jev98_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7210AB3-E010-4B8B-AC2C-7BF93D2DAABA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s16jev98:0a:*:*:*:*:*:*:*", "matchCriteriaId": "9D214191-EF7A-48D9-94CF-123523716EA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s16jbd64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C482AFCA-581A-4CEE-B54B-9A9CB85D709A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s16jbd64:0a:*:*:*:*:*:*:*", "matchCriteriaId": "F945B88A-EAAF-486E-86BD-8D6C6529607A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s14jbd100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB619D-729E-4B94-8F73-06DA57C4B428", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s14jbd100:0a:*:*:*:*:*:*:*", "matchCriteriaId": "FD9463A7-7B4A-4E1B-873C-72A80ED05DDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc55s14jbd64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93246FF-501C-4162-A978-C9B99A4169D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc55s14jbd64:0a:*:*:*:*:*:*:*", "matchCriteriaId": "EE36A31D-5ADB-455E-96E0-6A42ABBBCE7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5516jbd100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48623257-530E-4FE4-ABDB-1DBD826BB870", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5516jbd100:0a:*:*:*:*:*:*:*", "matchCriteriaId": "C02E13E7-9C52-43EE-B25D-F299B3165990", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5516jev98_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA31AE2-362F-42E0-ADB1-8B4E722B4E19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5516jev98:0a:*:*:*:*:*:*:*", "matchCriteriaId": "B5BAC590-3D4D-4796-B03D-3A9A89FEBA1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5516jbd64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50390641-708D-4724-B52B-B5E515A03B9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5516jbd64:0a:*:*:*:*:*:*:*", "matchCriteriaId": "0F44502F-A383-4106-ADDE-CC2C694A3AA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5514jbd100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "152F6782-A179-465F-A430-90E1CAF0A87A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5514jbd100:0a:*:*:*:*:*:*:*", "matchCriteriaId": "8150A237-B3B9-4B63-AEFF-3A74138EE8B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5514jbd64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1237E77E-4E08-47F2-A6E2-D9159F32429D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5514jbd64:0a:*:*:*:*:*:*:*", "matchCriteriaId": "B26333DB-B724-4CA2-915F-AE5F017D99AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5512jbd100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ABFA071-EB5F-4041-B0A2-C7BEA7BAF1FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5512jbd100:0a:*:*:*:*:*:*:*", "matchCriteriaId": "3D2A7874-E35A-483E-9389-1258E4B85BCD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:lpc5512jbd64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "343A3A84-E70D-48F8-8B20-7340DB918BEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:lpc5512jbd64:0a:*:*:*:*:*:*:*", "matchCriteriaId": "39E99A86-7BAC-4B3E-8785-389F0DE262A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM." }, { "lang": "es", "value": "Microcontroladores NXP LPC55S6x (0A y 1B), i.MX RT500 (silicio rev B1 y B2), i. MX RT600 (silicio rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicio rev 0A, 1B), LPC55S1x, LPC551x (silicio rev 0A) y LPC55S0x, LPC550x (silicio rev 0A) incluyen un perif\u00e9rico de parcheo de ROM no documentado que permite la modificaci\u00f3n sin firma y no persistente de la ROM interna" } ], "id": "CVE-2021-31532", "lastModified": "2024-11-21T06:05:51.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-06T13:15:12.667", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://oxide.computer/blog/lpc55/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.nxp.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://oxide.computer/blog/lpc55/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.nxp.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }