Nuvoton - CWE-305: Authentication Bypass by Primary Weakness
An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock
reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code
execution.
            An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock
reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code
execution.
Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2024-37325 | Nuvoton - CWE-305: Authentication Bypass by Primary Weakness An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code execution. | 
Fixes
    Solution
Upgrade to v10.10.19
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| https://www.gov.il/en/Departments/faq/cve_advisories | 
                     | 
            
History
                    No history.
Status: PUBLISHED
Assigner: INCD
Published:
Updated: 2024-08-02T04:12:24.827Z
Reserved: 2024-06-16T08:00:52.285Z
Link: CVE-2024-38433
Updated: 2024-08-02T04:12:24.827Z
Status : Modified
Published: 2024-07-11T08:15:10.623
Modified: 2024-11-21T09:25:50.110
Link: CVE-2024-38433
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD