NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update.
References
Link | Resource |
---|---|
https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom | Exploit Third Party Advisory |
https://www.nxp.com | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2022-03-23 15:15
Updated : 2022-04-15 11:16
NVD link : CVE-2022-22819
Mitre link : CVE-2022-22819
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
nxp
- lpc55s69jbd100
- lpc55s69jbd64_firmware
- lpc55s66jbd100_firmware
- lpc55s66jbd64_firmware
- lpc55s69jbd64
- lpc55s66jev98_firmware
- lpc55s66jev98
- lpc55s69jbd100_firmware
- lpc55s66jbd64
- lpc55s69jev98_firmware
- lpc55s66jbd100
- lpc55s69jev98