First published: Tue Apr 24 2018(Updated: )
Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer overflow vulnerability in BootROM Recovery Mode (RCM). An attacker with physical access to the device's USB and the ability to force the device to reboot into RCM could exploit the vulnerability to execute unverified code.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nvidia Tegra Bootrom Rcm | ||
NVIDIA Tegra mobile processor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6242 is classified as a critical vulnerability due to its potential for unauthorized code execution with physical access.
To mitigate CVE-2018-6242, ensure that your device firmware is updated to the latest version provided by NVIDIA.
CVE-2018-6242 affects some NVIDIA Tegra mobile processors released prior to 2016.
No, CVE-2018-6242 requires physical access to the device, making remote exploitation impractical.
Exploitation of CVE-2018-6242 allows attackers to execute unverified code on the affected NVIDIA Tegra device.