6.7

CVE-2024-38433

Nuvoton - CWE-305: Authentication Bypass by Primary Weakness

An attacker with write access to the SPI-Flash on an NPCM7xx BMC subsystem that uses the Nuvoton BootBlock

reference code can modify the u-boot image header on flash parsed by the BootBlock which could lead to arbitrary code

execution.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NuvotonNpcm750r Firmware Version < 10.10.19
   NuvotonNpcm750r Version-
NuvotonNpcm710r Firmware Version < 10.10.19
   NuvotonNpcm710r Version-
NuvotonNpcm730r Firmware Version < 10.10.19
   NuvotonNpcm730r Version-
NuvotonNpcm705r Firmware Version < 10.10.19
   NuvotonNpcm705r Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.003
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cna@cyber.gov.il 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

CWE-305 Authentication Bypass by Primary Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.