CVE-2024-1633
low-risk
Published 2024-02-19
During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table “bl2_mem_params_descs”. For each image, the bl2 reads the image length and destination from the image’s certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not
Do I need to act?
-
0.01% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
2
CVSS 2.0/10
Low
PHYSICAL
/ HIGH complexity
Affected Products (1)
Arm-Trusted-Firmware
Affected Vendors
References (2)
Third Party Advisory
https://asrg.io/security-advisories/CVE-2024-1633/
Third Party Advisory
https://asrg.io/security-advisories/CVE-2024-1633/
10
/ 100
low-risk
Severity
5/34 · Minimal
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal