First published: Wed Apr 27 2022(Updated: )
In this physical attack, an attacker may potentially exploit the Zynq-7000 SoC First Stage Boot Loader (FSBL) by bypassing authentication and loading a malicious image onto the device. This in turn may further allow the attacker to perform additional attacks such as such as using the device as a decryption oracle. An anticipated mitigation via a 2022.1 patch will resolve the issue.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xilinx Zynq-7000s Firmware | <2022.1 | |
Xilinx Zynq-7000s | ||
Xilinx Zynq-7000 Firmware | <2022.1 | |
Xilinx Zynq-7000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-23822 is high due to the potential for an attacker to bypass authentication and load malicious firmware.
To fix CVE-2022-23822, update the Xilinx Zynq-7000 Firmware to version 2022.1 or later.
CVE-2022-23822 affects the Xilinx Zynq-7000 and Zynq-7000s devices' First Stage Boot Loader firmware versions prior to 2022.1.
CVE-2022-23822 allows an attacker to execute a physical attack by loading a malicious image onto the device.
Yes, CVE-2022-23822 involves an authentication bypass that permits unauthorized access to the device.