An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
Project Subscriptions
| Vendors | Products |
|---|---|
|
Nxp
Subscribe
|
I.mx 6
Subscribe
I.mx 6 Firmware
Subscribe
I.mx 6dual
Subscribe
I.mx 6dual Firmware
Subscribe
I.mx 6duallite
Subscribe
I.mx 6duallite Firmware
Subscribe
I.mx 6dualplus
Subscribe
I.mx 6dualplus Firmware
Subscribe
I.mx 6quad
Subscribe
I.mx 6quad Firmware
Subscribe
I.mx 6quadplus
Subscribe
I.mx 6quadplus Firmware
Subscribe
I.mx 6solo
Subscribe
I.mx 6solo Firmware
Subscribe
I.mx 6sololite
Subscribe
I.mx 6sololite Firmware
Subscribe
I.mx 6solox
Subscribe
I.mx 6solox Firmware
Subscribe
I.mx 6ull
Subscribe
I.mx 6ull Firmware
Subscribe
I.mx 6ultralite
Subscribe
I.mx 6ultralite Firmware
Subscribe
I.mx 6ulz
Subscribe
I.mx 6ulz Firmware
Subscribe
I.mx 7dual
Subscribe
I.mx 7dual Firmware
Subscribe
I.mx 7solo
Subscribe
I.mx 7solo Firmware
Subscribe
I.mx 7ulp
Subscribe
I.mx 7ulp Firmware
Subscribe
I.mx 8m Mini
Subscribe
I.mx 8m Mini Firmware
Subscribe
I.mx 8m Quad
Subscribe
I.mx 8m Quad Firmware
Subscribe
I.mx 8m Vybrid
Subscribe
I.mx 8m Vybrid Firmware
Subscribe
I.mx Rt1010
Subscribe
I.mx Rt1010 Firmware
Subscribe
I.mx Rt1015
Subscribe
I.mx Rt1015 Firmware
Subscribe
I.mx Rt1020
Subscribe
I.mx Rt1020 Firmware
Subscribe
I.mx Rt1050
Subscribe
I.mx Rt1050 Firmware
Subscribe
I.mx Rt1060
Subscribe
I.mx Rt1060 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-48071 | An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 30 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-30T14:38:50.059Z
Reserved: 2022-11-11T00:00:00.000Z
Link: CVE-2022-45163
Updated: 2024-08-03T14:09:56.466Z
Status : Modified
Published: 2022-11-18T23:15:29.807
Modified: 2025-04-30T15:15:59.090
Link: CVE-2022-45163
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD