First published: Mon Feb 19 2024(Updated: )
During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table “bl2_mem_params_descs”. For each image, the bl2 reads the image length and destination from the image’s certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not
Credit: cve@asrg.io
Affected Software | Affected Version | How to fix |
---|---|---|
ARM Trusted Firmware-A | >=c2f286820471ed276c57e603762bd831873e5a17< | |
All of | ||
Arm Trusted Firmware | =rcar_gen3_2.5 | |
Any of | ||
Renesas R-car D3e | ||
Renesas R-car E3e | ||
Renesas R-Car H3e | ||
Renesas R-car H3ne | ||
Renesas R-car M3e | ||
Renesas R-car M3ne | ||
Renesas R-car V3h | ||
Renesas R-Car V3H2 | ||
Renesas R-car V3m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1633 is classified as a high severity vulnerability due to its potential to compromise the secure boot process.
To mitigate CVE-2024-1633, users should upgrade to the latest version of Arm Trusted Firmware or apply available patches specific to their environment.
CVE-2024-1633 affects various versions of Arm Trusted Firmware and Renesas arm-trusted-firmware on specific hardware platforms.
CVE-2024-1633 can lead to unauthorized access or execution of malicious code during the boot process, undermining the system's integrity.
As of now, there are no public exploits reported that take advantage of CVE-2024-1633, but the vulnerability poses significant risk to affected systems.