An application can be configured to block boot attempts after consecutive tamper resets are detected, which may not occur as expected.
This is possible because the TAMPERRSTCAUSE register may not be properly updated when a level 4 tamper event (a tamper reset) occurs. This impacts Series 2 HSE-SVH devices, including xG23B, xG24B, xG25B, and xG28B, but does not impact xG21B. To mitigate this issue, upgrade to SE Firmware version 2.2.6 or later.
Metrics
Affected Vendors & Products
References
History
Fri, 30 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 29 Aug 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An application can be configured to block boot attempts after consecutive tamper resets are detected, which may not occur as expected. This is possible because the TAMPERRSTCAUSE register may not be properly updated when a level 4 tamper event (a tamper reset) occurs. This impacts Series 2 HSE-SVH devices, including xG23B, xG24B, xG25B, and xG28B, but does not impact xG21B. To mitigate this issue, upgrade to SE Firmware version 2.2.6 or later. | |
Title | Failure to update the tamper reset cause register when a tamper event occurs | |
Weaknesses | CWE-754 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Silabs
Published: 2024-08-29T22:06:59.299Z
Updated: 2024-08-30T14:54:03.128Z
Reserved: 2024-03-15T13:34:41.105Z
Link: CVE-2024-2502
Vulnrichment
Updated: 2024-08-30T14:53:57.399Z
NVD
Status : Awaiting Analysis
Published: 2024-08-29T22:15:05.153
Modified: 2024-08-30T13:00:05.390
Link: CVE-2024-2502
Redhat
No data.