Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Moderate

CVE-2019-17519

Disclosure Date: February 12, 2020 (last updated November 27, 2024)
The Bluetooth Low Energy implementation on NXP SDK through 2.2.1 for KW41Z devices does not properly restrict the Link Layer payload length, allowing attackers in radio range to cause a buffer overflow via a crafted packet.
Attacker Value
Moderate

CVE-2019-17060

Disclosure Date: February 10, 2020 (last updated November 27, 2024)
The Bluetooth Low Energy (BLE) stack implementation on the NXP KW41Z (based on the MCUXpresso SDK with Bluetooth Low Energy Driver 2.2.1 and earlier) does not properly restrict the BLE Link Layer header and executes certain memory contents upon receiving a packet with a Link Layer ID (LLID) equal to zero. This allows attackers within radio range to cause deadlocks, cause anomalous behavior in the BLE state machine, or trigger a buffer overflow via a crafted BLE Link Layer frame.
Attacker Value
Unknown

CVE-2023-39902

Disclosure Date: October 17, 2023 (last updated October 25, 2023)
A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus.
Attacker Value
Unknown

CVE-2022-45163

Disclosure Date: November 18, 2022 (last updated October 08, 2023)
An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
Attacker Value
Unknown

CVE-2021-27421

Disclosure Date: May 03, 2022 (last updated October 07, 2023)
NXP MCUXpresso SDK versions prior to 2.8.2 are vulnerable to integer overflow in SDK_Malloc function, which could allow to access memory locations outside the bounds of a specified array, leading to unexpected behavior such segmentation fault when assigning a particular block of memory from the heap via malloc.
Attacker Value
Unknown

CVE-2021-22680

Disclosure Date: May 03, 2022 (last updated October 07, 2023)
NXP MQX Versions 5.1 and prior are vulnerable to integer overflow in mem_alloc, _lwmem_alloc and _partition functions. This unverified memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
Attacker Value
Unknown

CVE-2022-28379

Disclosure Date: April 03, 2022 (last updated October 07, 2023)
jc21.com Nginx Proxy Manager before 2.9.17 allows XSS during item deletion.
Attacker Value
Unknown

CVE-2022-22819

Disclosure Date: March 23, 2022 (last updated October 07, 2023)
NXP LPC55S66JBD64, LPC55S66JBD100, LPC55S66JEV98, LPC55S69JBD64, LPC55S69JBD100, and LPC55S69JEV98 microcontrollers (ROM version 1B) have a buffer overflow in parsing SB2 updates before the signature is verified. This can allow an attacker to achieve non-persistent code execution via a crafted unsigned update.
Attacker Value
Unknown

CVE-2021-44479

Disclosure Date: December 01, 2021 (last updated October 07, 2023)
NXP Kinetis K82 devices have a buffer over-read via a crafted wlength value in a GET Status-Other request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.
Attacker Value
Unknown

CVE-2021-40154

Disclosure Date: December 01, 2021 (last updated October 07, 2023)
NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.