An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)

Project Subscriptions

Vendors Products
I.mx 6 Firmware Subscribe
I.mx 6dual Subscribe
I.mx 6dual Firmware Subscribe
I.mx 6duallite Subscribe
I.mx 6duallite Firmware Subscribe
I.mx 6dualplus Subscribe
I.mx 6dualplus Firmware Subscribe
I.mx 6quad Subscribe
I.mx 6quad Firmware Subscribe
I.mx 6quadplus Subscribe
I.mx 6quadplus Firmware Subscribe
I.mx 6solo Subscribe
I.mx 6solo Firmware Subscribe
I.mx 6sololite Subscribe
I.mx 6sololite Firmware Subscribe
I.mx 6solox Subscribe
I.mx 6solox Firmware Subscribe
I.mx 6ull Subscribe
I.mx 6ull Firmware Subscribe
I.mx 6ultralite Subscribe
I.mx 6ultralite Firmware Subscribe
I.mx 6ulz Subscribe
I.mx 6ulz Firmware Subscribe
I.mx 7dual Subscribe
I.mx 7dual Firmware Subscribe
I.mx 7solo Subscribe
I.mx 7solo Firmware Subscribe
I.mx 7ulp Subscribe
I.mx 7ulp Firmware Subscribe
I.mx 8m Mini Subscribe
I.mx 8m Mini Firmware Subscribe
I.mx 8m Quad Subscribe
I.mx 8m Quad Firmware Subscribe
I.mx 8m Vybrid Subscribe
I.mx 8m Vybrid Firmware Subscribe
I.mx Rt1010 Subscribe
I.mx Rt1010 Firmware Subscribe
I.mx Rt1015 Subscribe
I.mx Rt1015 Firmware Subscribe
I.mx Rt1020 Subscribe
I.mx Rt1020 Firmware Subscribe
I.mx Rt1050 Subscribe
I.mx Rt1050 Firmware Subscribe
I.mx Rt1060 Subscribe
I.mx Rt1060 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-48071 An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-30T14:38:50.059Z

Reserved: 2022-11-11T00:00:00.000Z

Link: CVE-2022-45163

cve-icon Vulnrichment

Updated: 2024-08-03T14:09:56.466Z

cve-icon NVD

Status : Modified

Published: 2022-11-18T23:15:29.807

Modified: 2025-04-30T15:15:59.090

Link: CVE-2022-45163

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses