Microchip Harmony 3 Core 库允许通过 SCSI READ 或 WRITE 命令对 RAM 进行读写访问(CVE-2024-30212)
CVE编号
CVE-2024-30212利用情况
暂无补丁情况
N/A披露时间
2024-05-29漏洞描述
If a SCSI READ(10) command is initiated via USB using the largest LBA (0xFFFFFFFF) with it's default block size of 512 and a count of 1, the first 512 byte of the 0x80000000 memory area is returned to the user. If the block count is increased, the full RAM can be exposed. The same method works to write to this memory area. If RAM contains pointers, those can be - depending on the application - overwritten to return data from any other offset including Progam and Boot Flash.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/Microchip-MPLAB-Harmony/core/blob/master/release_notes.md | |
https://github.com/Microchip-MPLAB-Harmony/core/commit/d4608a4f1a140bd899cd43... |
- 攻击路径 N/A
- 攻击复杂度 N/A
- 权限要求 N/A
- 影响范围 N/A
- 用户交互 N/A
- 可用性 N/A
- 保密性 N/A
- 完整性 N/A
CWE-ID | 漏洞类型 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论