When booting a Zync-7000 SOC device from nand flash memory, the nand driver in the ROM does not validate the inputs when reading in any parameters in the nand’s parameter page. IF a field read in from the parameter page is too large, this causes a buffer overflow that could lead to arbitrary code execution. Physical access and modification of the board assembly on which the Zynq-7000 SoC device mounted is needed to replace the original NAND flash memory with a NAND flash emulation device for this attack to be successful.
2021-03-15T13:15:14.967
2024-11-21T05:57:34.830
Modified
CVSSv3.1: 6.8 (MEDIUM)
AV:L/AC:L/Au:N/C:P/I:P/A:P
3.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | xilinx | zynq-7000s_firmware | - | Yes |
Hardware | xilinx | zynq-7000s | - | No |
Operating System | xilinx | zynq-7000_firmware | - | Yes |
Hardware | xilinx | zynq-7000 | - | No |