CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
33.5%
Das U-Boot is a device bootloader that can read its configuration from an
AES encrypted file. Devices that make use of Das U-Boot’s AES-CBC
encryption feature using environment encryption (i.e., setting the
configuration parameter CONFIG_ENV_AES=y) read environment variables from
disk as the encrypted disk image is processed. An attacker with physical
access to the device can manipulate the encrypted environment data to
include a crafted two-byte sequence which triggers an error in environment
variable parsing. This error condition is improperly handled by Das U-Boot,
resulting in an immediate process termination with a debugging message.
Author | Note |
---|---|
mdeslaur | xenial doesn’t build with ENV_AES, and later releases removed the code completely |
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
33.5%