In this physical attack, an attacker may potentially exploit the Zynq-7000 SoC First Stage Boot Loader (FSBL) by bypassing authentication and loading a malicious image onto the device. This in turn may further allow the attacker to perform additional attacks such as such as using the device as a decryption oracle. An anticipated mitigation via a 2022.1 patch will resolve the issue.
2022-04-27T17:15:07.517
2024-11-21T06:49:19.200
Modified
CVSSv3.1: 6.8 (MEDIUM)
AV:L/AC:M/Au:N/C:P/I:P/A:P
3.4
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | xilinx | zynq-7000s_firmware | < 2022.1 | Yes |
Hardware | xilinx | zynq-7000s | - | No |
Operating System | xilinx | zynq-7000_firmware | < 2022.1 | Yes |
Hardware | xilinx | zynq-7000 | - | No |