Lucene search

K
cvelistCertccCVELIST:CVE-2017-3226
HistoryJul 24, 2018 - 3:00 p.m.

CVE-2017-3226 Das U-Boot's AES-CBC encryption feature improperly handles an error condition and may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data

2018-07-2415:00:00
CWE-329
certcc
www.cve.org
5

AI Score

6

Confidence

High

EPSS

0.001

Percentile

33.5%

Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot’s AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.

CNA Affected

[
  {
    "product": "U-Boot",
    "vendor": "Das",
    "versions": [
      {
        "lessThan": "2017.09",
        "status": "affected",
        "version": "2017.09",
        "versionType": "custom"
      }
    ]
  }
]

AI Score

6

Confidence

High

EPSS

0.001

Percentile

33.5%

Related for CVELIST:CVE-2017-3226