NXP i.MX 6

CPE Details

NXP i.MX 6
-
2021-12-09
16h10 +00:00
2022-01-21
16h14 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:nxp:i.mx_6:-:*:*:*:*:*:*:*

Informations

Vendor

nxp

Product

i.mx_6

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-45163 2022-11-18 00h00 +00:00 An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
5.3
Medium
CVE-2021-36133 2021-12-07 19h42 +00:00 The OPTEE-OS CSU driver for NXP i.MX SoC devices lacks security access configuration for several models, resulting in TrustZone bypass because the NonSecure World can perform arbitrary memory read/write operations on Secure World memory. This involves a DMA capable peripheral.
7.1
High