Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
denx u-boot vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2020-10648
Das U-Boot up to and including 2020.01 allows malicious users to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
Denx U-boot
Denx U-boot 2020.01
Opensuse Leap 15.2
9.8
CVSSv3
CVE-2022-30767
nfs_lookup_reply in net/nfs.c in Das U-Boot up to and including 2022.04 (and up to and including 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
Denx U-boot
Denx U-boot 2022.07
Fedoraproject Fedora 36
7.8
CVSSv3
CVE-2019-13104
In Das U-Boot versions 2016.11-rc1 up to and including 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem.
Denx U-boot 2019.07
Denx U-boot
Opensuse Leap 15.0
Opensuse Leap 15.1
7.8
CVSSv3
CVE-2019-13106
Das U-Boot versions 2016.09 up to and including 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.
Denx U-boot 2019.07
Denx U-boot
Opensuse Leap 15.0
Opensuse Leap 15.1
5.9
CVSSv3
CVE-2019-11690
gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows malicious users to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot devic...
Denx U-boot
4.6
CVSSv3
CVE-2017-3225
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow ...
Denx U-boot
6.4
CVSSv3
CVE-2017-3226
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables...
Denx U-boot
7.1
CVSSv3
CVE-2022-2347
There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a...
Denx U-boot
9.8
CVSSv3
CVE-2019-14198
An issue exists in Das U-Boot up to and including 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case.
Denx U-boot
9.8
CVSSv3
CVE-2019-14199
An issue exists in Das U-Boot up to and including 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.
Denx U-boot
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »