First published: Wed Dec 01 2021(Updated: )
NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nxp Lpc55s69jbd100 Firmware | ||
Nxp Lpc55s69jbd100 | =0a | |
Nxp Lpc55s69jbd100 | =1b | |
Nxp Lpc55s69jbd64 Firmware | ||
Nxp Lpc55s69jbd64 | =0a | |
Nxp Lpc55s69jbd64 | =1b | |
Nxp Lpc55s69jev98 Firmware | ||
Nxp Lpc55s69jev98 | =0a | |
Nxp Lpc55s69jev98 | =1b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40154 is a vulnerability found in NXP LPC55S69 devices before A3 that allows for a buffer over-read.
CVE-2021-40154 works by exploiting a crafted wlength value in a GET Descriptor Configuration request during the use of USB In-System Programming (ISP) mode, which leads to a buffer over-read and discloses protected flash memory.
The severity of CVE-2021-40154 is medium, with a severity value of 5.5.
NXP LPC55S69 devices before A3 are affected by CVE-2021-40154.
To fix CVE-2021-40154, it is recommended to apply the necessary firmware updates provided by NXP for the LPC55S69 devices.