Vulnerability Description
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Denx | U-Boot | < 2017.09 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100675Third Party AdvisoryVDB Entry
- https://www.kb.cert.org/vuls/id/166743Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/100675Third Party AdvisoryVDB Entry
- https://www.kb.cert.org/vuls/id/166743Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-3225?
CVE-2017-3225 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may a...
How severe is CVE-2017-3225?
CVE-2017-3225 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-3225?
Check the references section above for vendor advisories and patch information. Affected products include: Denx U-Boot.