Unknown
CVE-2022-45163
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-45163
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- nxp
Products
- i.mx 6 firmware -,
- i.mx 6dual firmware -,
- i.mx 6duallite firmware -,
- i.mx 6dualplus firmware -,
- i.mx 6quad firmware -,
- i.mx 6quadplus firmware -,
- i.mx 6solo firmware -,
- i.mx 6sololite firmware -,
- i.mx 6solox firmware -,
- i.mx 6ull firmware -,
- i.mx 6ultralite firmware -,
- i.mx 6ulz firmware -,
- i.mx 7dual firmware -,
- i.mx 7solo firmware -,
- i.mx 7ulp firmware -,
- i.mx 8m mini firmware -,
- i.mx 8m quad firmware -,
- i.mx 8m vybrid firmware -,
- i.mx rt1010 firmware -,
- i.mx rt1015 firmware -,
- i.mx rt1020 firmware -,
- i.mx rt1050 firmware -,
- i.mx rt1060 firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: