Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details of the vulnerability to the JEDEC standards body, multiple vendors of host processors, and software solutions providers.
Published 2023-01-23 22:15:11
Updated 2023-02-08 19:14:16
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2022-23005

Probability of exploitation activity in the next 30 days: 0.07%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 29 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2022-23005

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
8.7
HIGH CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
2.3
5.8
NIST
8.7
HIGH CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
2.3
5.8
Western Digital

CWE ids for CVE-2022-23005

  • The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.
    Assigned by: nvd@nist.gov (Primary)
  • The hardware design control register "sticky bits" or write-once bit fields are improperly implemented, such that they can be reprogrammed by software.
    Assigned by: psirt@wdc.com (Secondary)
  • The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware system configuration.
    Assigned by: psirt@wdc.com (Secondary)
  • The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers.
    Assigned by: psirt@wdc.com (Secondary)

References for CVE-2022-23005

Products affected by CVE-2022-23005

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!