Description
In this physical attack, an attacker may potentially exploit the Zynq-7000 SoC First Stage Boot Loader (FSBL) by bypassing authentication and loading a malicious image onto the device. This in turn may further allow the attacker to perform additional attacks such as such as using the device as a decryption oracle. An anticipated mitigation via a 2022.1 patch will resolve the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28751 | In this physical attack, an attacker may potentially exploit the Zynq-7000 SoC First Stage Boot Loader (FSBL) by bypassing authentication and loading a malicious image onto the device. This in turn may further allow the attacker to perform additional attacks such as such as using the device as a decryption oracle. An anticipated mitigation via a 2022.1 patch will resolve the issue. |
References
History
No history.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-09-16T22:25:01.331Z
Reserved: 2022-01-21T00:00:00.000Z
Link: CVE-2022-23822
No data.
Status : Modified
Published: 2022-04-27T17:15:07.517
Modified: 2024-11-21T06:49:19.200
Link: CVE-2022-23822
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD