Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Semtech LR11xx LoRa transceivers implement secure boot functionality using digital signatures to authenticate firmware. However, the implementation uses a non-standard cryptographic hashing algorithm that is vulnerable to second preimage attacks. An attacker with physical access to the device can exploit this weakness to generate a malicious firmware image with a hash collision, bypassing the secure boot verification mechanism and installing arbitrary unauthorized firmware on the device. | |
| Title | Semtech LR11xx Secure Boot Bypass | |
| First Time appeared |
Semtech
Semtech lr1110 Semtech lr1120 Semtech lr1121 |
|
| Weaknesses | CWE-327 | |
| CPEs | cpe:2.3:a:semtech:lr1110:*:*:*:*:*:*:*:* cpe:2.3:a:semtech:lr1120:*:*:*:*:*:*:*:* cpe:2.3:a:semtech:lr1121:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Semtech
Semtech lr1110 Semtech lr1120 Semtech lr1121 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: SWI
Published:
Updated: 2026-04-07T20:42:41.142Z
Reserved: 2025-12-18T00:09:40.606Z
Link: CVE-2025-14859
Updated: 2026-04-07T20:37:44.923Z
Status : Awaiting Analysis
Published: 2026-04-07T20:16:22.590
Modified: 2026-04-08T21:27:00.663
Link: CVE-2025-14859
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:45:55Z