First published: Wed Mar 23 2022(Updated: )
NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nxp Lpc55s66jbd64 Firmware | ||
NXP LPC55S66JBD64 | ||
Nxp Lpc55s66jbd100 Firmware | ||
Nxp Lpc55s66jbd100 | ||
Nxp Lpc55s66jev98 Firmware | ||
Nxp Lpc55s66jev98 | ||
Nxp Lpc55s69jbd64 Firmware | ||
Nxp Lpc55s69jbd64 | ||
Nxp Lpc55s69jbd100 Firmware | ||
Nxp Lpc55s69jbd100 | ||
Nxp Lpc55s69jev98 Firmware | ||
Nxp Lpc55s69jev98 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NXP vulnerability is CVE-2022-22819.
The severity of CVE-2022-22819 is high.
The NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers are affected by CVE-2022-22819.
The vulnerability in the NXP microcontrollers occurs due to a buffer overflow in parsing SB2 updates before the signature is verified.
Yes, an attacker can achieve non-persistent code execution through a crafted unsigned firmware update.