Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-30212— Microchip Harmony 3 Core library allows read and write access to RAM via a SCSI READ or WRITE command

EPSS 0.25% · P48
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-30212

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microchip Harmony 3 Core library allows read and write access to RAM via a SCSI READ or WRITE command
Source: NVD (National Vulnerability Database)
Vulnerability Description
If a SCSI READ(10) command is initiated via USB using the largest LBA (0xFFFFFFFF) with it's default block size of 512 and a count of 1, the first 512 byte of the 0x80000000 memory area is returned to the user. If the block count is increased, the full RAM can be exposed. The same method works to write to this memory area. If RAM contains pointers, those can be - depending on the application - overwritten to return data from any other offset including Progam and Boot Flash.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
整数溢出或超界折返
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microchip MPLAB 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microchip MPLAB Net是Microchip公司的一个集成开发环境。 Microchip MPLAB存在安全漏洞,该漏洞源于存在数据验证问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrochipMPLAB® Harmony 3 Core Module 3.0.0 ~ 3.13.4 -

II. Public POCs for CVE-2024-30212

#POC DescriptionSource LinkShenlong Link
1CVE-2024-30212https://github.com/Fehr-GmbH/blackleakPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-30212

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-30212

No comments yet


Leave a comment