On Xilinx Zynq-7000 SoC devices, physical modification of an SD boot image allows for a buffer overflow attack in the ROM. Because the Zynq-7000's boot image header is unencrypted and unauthenticated before use, an attacker can modify the boot header stored on an SD card so that a secure image appears to be unencrypted, and they will be able to modify the full range of register initialization values. Normally, these registers will be restricted when booting securely. Of importance to this attack are two registers that control the SD card's transfer type and transfer size. These registers could be modified a way that causes a buffer overflow in the ROM.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Amd
Subscribe
|
Xilinx Z-7007s
Subscribe
Xilinx Z-7007s Firmware
Subscribe
Xilinx Z-7010
Subscribe
Xilinx Z-7010 Firmware
Subscribe
Xilinx Z-7012s
Subscribe
Xilinx Z-7012s Firmware
Subscribe
Xilinx Z-7014s
Subscribe
Xilinx Z-7014s Firmware
Subscribe
Xilinx Z-7015
Subscribe
Xilinx Z-7015 Firmware
Subscribe
Xilinx Z-7020
Subscribe
Xilinx Z-7020 Firmware
Subscribe
Xilinx Z-7030
Subscribe
Xilinx Z-7030 Firmware
Subscribe
Xilinx Z-7035
Subscribe
Xilinx Z-7035 Firmware
Subscribe
Xilinx Z-7045
Subscribe
Xilinx Z-7045 Firmware
Subscribe
Xilinx Z-7100
Subscribe
Xilinx Z-7100 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31653 | On Xilinx Zynq-7000 SoC devices, physical modification of an SD boot image allows for a buffer overflow attack in the ROM. Because the Zynq-7000's boot image header is unencrypted and unauthenticated before use, an attacker can modify the boot header stored on an SD card so that a secure image appears to be unencrypted, and they will be able to modify the full range of register initialization values. Normally, these registers will be restricted when booting securely. Of importance to this attack are two registers that control the SD card's transfer type and transfer size. These registers could be modified a way that causes a buffer overflow in the ROM. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:32:13.265Z
Reserved: 2021-12-13T00:00:00
Link: CVE-2021-44850
No data.
Status : Modified
Published: 2022-02-10T19:15:09.273
Modified: 2024-11-21T06:31:36.447
Link: CVE-2021-44850
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD