First published: Tue Jul 24 2018(Updated: )
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
DENX U-Boot | <2017.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3225 is a vulnerability in Das U-Boot bootloader that allows an attacker to decrypt the encrypted configuration file due to the use of a zero initialization vector.
The severity of CVE-2017-3225 is medium with a CVSS score of 4.6.
Devices utilizing Das U-Boot bootloader with versions up to and excluding 2017.09 are affected by CVE-2017-3225.
CVE-2017-3225 allows attacks against the underlying cryptographic implementation used by Das U-Boot bootloader.
For more information about CVE-2017-3225, you can refer to the following resources: http://www.securityfocus.com/bid/100675 and https://www.kb.cert.org/vuls/id/166743.