First published: Mon Jan 23 2023(Updated: )
Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details of the vulnerability to the JEDEC standards body, multiple vendors of host processors, and software solutions providers.
Credit: psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jedec Universal Flash Storage | ||
Westerndigital Inand Eu311 Mobile Mc Ufs | ||
Westerndigital Inand Eu312 Automotive Xa At Ufs | ||
Westerndigital Inand Eu312 Industrial Ix Ufs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23005 is a vulnerability identified in the UFS standard that could result in a security vulnerability.
Western Digital products that implement the UFS Boot feature to boot from UFS compliant storage devices may be affected by CVE-2022-23005.
CVE-2022-23005 has a severity rating of 8.7 (high).
To check if your Western Digital product is affected, refer to the Western Digital support page provided in the references.
Follow the mitigation steps provided in the Western Digital white paper linked in the references to mitigate the vulnerability.