Impact
RAUC, the update manager for embedded Linux devices, contains an integer overflow in its handling of plain-format bundles larger than 2 GiB. The overflow limits the calculated digital signature to only the first portion of the payload. A bundle that still bears a legitimate signature can therefore have the remaining bytes modified without being detected. This flaw effectively bypasses RAUC's built-in integrity verification and permits an attacker to inject malicious code or corrupt system data within the update.
Affected Systems
This vulnerability affects all versions of RAUC older than v1.15.2. The update mechanism is used on a wide range of embedded products that rely on RAUC for over-the-air or USB‑based firmware upgrades. The fix was applied in release v1.15.2 and in all later revisions.
Risk and Exploitability
The item scores a CVSS 7.2, indicating high severity. Exploitation requires only that an attacker deliver a malicious plain-format bundle that exceeds the 2‑GiB ceiling to a device that accepts that bundle as a trusted update. No local privilege escalation is necessary, but the attacker must control the update source. The vulnerability is not listed in CISA's KEV catalog and EPSS data are not available.
OpenCVE Enrichment