Vulnerability Details : CVE-2019-5478
A weakness was found in Encrypt Only boot mode in Zynq UltraScale+ devices. This could lead to an adversary being able to modify the control fields of the boot image leading to an incorrect secure boot behavior.
Products affected by CVE-2019-5478
- cpe:2.3:o:amd:zu11eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu15eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu17eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu19eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu1cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu1eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu21dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu25dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu27dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu28dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu29dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu2cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu2eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu39dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu3cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu3eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu3tcg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu3teg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu42dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu43dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu46dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu47dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu48dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu49dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu4cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu4eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu4ev_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu5cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu5eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu5ev_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu63dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu64dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu65dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu67dr_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu6cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu6eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu7cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu7eg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu7ev_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu9cg_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:zu9eg_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-5478
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-5478
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2019-5478
-
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.Assigned by: nvd@nist.gov (Primary)
-
The product violates well-established principles for secure design.Assigned by: support@hackerone.com (Secondary)
References for CVE-2019-5478
-
https://www.xilinx.com/support/answers/72588.html
AR# 72588: Design Advisory for Zynq UltraScale+ MPSoC/RFSoC: Encrypt Only Boot Mode - Unauthenticated Boot and Partition HeadersVendor Advisory
-
https://github.com/inversepath/advisories/blob/master/Security_Advisory-Ref_FSC-HWSEC-VR2019-0001-Xilinx_ZU+-Encrypt_Only_Secure_Boot_bypass.txt
advisories/Security_Advisory-Ref_FSC-HWSEC-VR2019-0001-Xilinx_ZU+-Encrypt_Only_Secure_Boot_bypass.txt at master · inversepath/advisories · GitHubThird Party Advisory
Jump to