NXP i.MX 8m Mini

CPE Details

NXP i.MX 8m Mini
-
2021-03-05
17h52 +00:00
2021-03-25
16h54 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:nxp:i.mx_8m_mini:-:*:*:*:*:*:*:*

Informations

Vendor

nxp

Product

i.mx_8m_mini

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-39902 2023-10-16 22h00 +00:00 A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus.
7.8
High
CVE-2022-45163 2022-11-18 00h00 +00:00 An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
5.3
Medium