脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Anti Rollback bypass with physical access and TOCTOU attack
脆弱性説明
ESP-IDF is the development framework for Espressif SoCs supported on Windows, Linux and macOS. A Time-of-Check to Time-of-Use (TOCTOU) vulnerability was discovered in the implementation of the ESP-IDF bootloader which could allow an attacker with physical access to flash of the device to bypass anti-rollback protection. Anti-rollback prevents rollback to application with security version lower than one programmed in eFuse of chip. This attack can allow to boot past (passive) application partition having lower security version of the same device even in the presence of the flash encryption scheme. The attack requires carefully modifying the flash contents after the anti-rollback checks have been performed by the bootloader (before loading the application). The vulnerability is fixed in 4.4.7 and 5.2.1.
CVSS情報
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
脆弱性タイプ
检查时间与使用时间(TOCTOU)的竞争条件
脆弱性タイトル
ESP-IDF 安全漏洞
脆弱性説明
ESP-IDF是Espressif Systems开源的一个 Windows、Linux 和 macOS 上支持的 Espressif SoC 的开发框架。 ESP-IDF存在安全漏洞,该漏洞源于存在TOCTOU漏洞。允许对设备闪存具有物理访问权限的攻击者绕过防回滚保护。受影响的产品和版本:ESP-IDF 4.4.6版本,5.0.6版本,5.1.3版本,5.2版本。
CVSS情報
N/A
脆弱性タイプ
N/A