{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1633","assignerOrgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","state":"PUBLISHED","assignerShortName":"ASRG","dateReserved":"2024-02-19T16:36:31.290Z","datePublished":"2024-02-19T16:42:29.949Z","dateUpdated":"2024-08-01T18:48:20.650Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","packageName":"arm-trusted-firmware","product":"rcar_gen3_v2.5","repo":"https://github.com/renesas-rcar/arm-trusted-firmware","vendor":"Renesas","versions":[{"status":"affected","version":"v2.5"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Tomer.Fichman@cymotive.com"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"During the secure boot, bl2 (the second stage of\nthe bootloader) loops over images defined in the table “bl2_mem_params_descs”.\nFor each image, the bl2 reads the image length and destination from the image’s\ncertificate.&nbsp;Because of the way of reading from the image, which base on&nbsp;32-bit unsigned integer value, it can result to&nbsp;an integer overflow.&nbsp;An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot.<br><br> Affected git version from&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">c2f286820471ed276c57e603762bd831873e5a17 until (not&nbsp;</span><br>"}],"value":"During the secure boot, bl2 (the second stage of\nthe bootloader) loops over images defined in the table “bl2_mem_params_descs”.\nFor each image, the bl2 reads the image length and destination from the image’s\ncertificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot.\n\n Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not \n"}],"impacts":[{"capecId":"CAPEC-92","descriptions":[{"lang":"en","value":"CAPEC-92 Forced Integer Overflow"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"NONE","baseScore":2,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-190","description":"CWE-190 Integer Overflow or Wraparound","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c15abc07-96a9-4d11-a503-5d621bfe42ba","shortName":"ASRG","dateUpdated":"2024-02-19T16:43:18.206Z"},"references":[{"url":"https://asrg.io/security-advisories/CVE-2024-1633/"}],"source":{"discovery":"UNKNOWN"},"title":"FIP Header Integer Overflow","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-26T15:25:37.839796Z","id":"CVE-2024-1633","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-26T15:26:06.442Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:48:20.650Z"},"title":"CVE Program Container","references":[{"url":"https://asrg.io/security-advisories/CVE-2024-1633/","tags":["x_transferred"]}]}]}}