Link | Resource |
---|---|
https://oxide.computer/blog/lpc55/ | Exploit Third Party Advisory |
https://www.nxp.com | Vendor Advisory |
https://oxide.computer/blog/lpc55/ | Exploit Third Party Advisory |
https://www.nxp.com | Vendor Advisory |
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
Configuration 23 (hide)
AND |
|
Configuration 24 (hide)
AND |
|
21 Nov 2024, 06:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://oxide.computer/blog/lpc55/ - Exploit, Third Party Advisory | |
References | () https://www.nxp.com - Vendor Advisory |
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
09 Jun 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocumented ROM patch peripheral that allows unsigned, non-persistent modification of the internal ROM. |
19 May 2021, 19:01
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 6.8 |
CPE | cpe:2.3:h:nxp:lpc5526:1b:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5514jbd64_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s66jbd100_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpcs66jev98_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s28:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s16jbd100_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5512jbd100_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5512jbd64:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:i.mx_rt600_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5516jbd100:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5514jbd64:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s14jbd100_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s14jbd64_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:i.mx_rt500:b2:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s69jbd100_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s16jbd100:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s66jbd100:1b:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s16jev98_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5516jbd64_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpcs66jbd64:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:i.mx_rt500:b1:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s69jbd100:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5514jbd100_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s66jbd100:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5516jev98_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpcs66jev98:1b:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s69jbd100:1b:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5516jbd64:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5516jbd100_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpcs66jbd64:1b:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s69jbd64_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s16jbd64:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s69jev98:1b:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s26:1b:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s16jbd64_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5528_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5526_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s69jbd64:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpcs66jev98:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:i.mx_rt600:b0:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s69jev98_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5528:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s14jbd64:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:i.mx_rt600:a0:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s26:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5514jbd100:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s69jev98:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpcs66jbd64_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5516jev98:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s69jbd64:1b:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc5512jbd64_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5512jbd100:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s16jev98:0a:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s28_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:lpc55s26_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5526:0a:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s28:1b:*:*:*:*:*:*:* cpe:2.3:o:nxp:i.mx_rt500_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc5528:1b:*:*:*:*:*:*:* cpe:2.3:h:nxp:lpc55s14jbd100:0a:*:*:*:*:*:*:* |
|
References | (MISC) https://www.nxp.com - Vendor Advisory | |
References | (MISC) https://oxide.computer/blog/lpc55/ - Exploit, Third Party Advisory |
Published : 2021-05-06 13:15
Updated : 2024-11-21 06:05
NVD link : CVE-2021-31532
Mitre link : CVE-2021-31532
CVE.ORG link : CVE-2021-31532
JSON object : View
nxp
- lpc55s16jbd64
- lpcs66jev98
- lpc55s69jev98
- lpcs66jbd64
- i.mx_rt500
- lpc5516jev98
- lpc5516jev98_firmware
- lpc55s26
- lpc55s66jbd100
- lpc55s28
- i.mx_rt500_firmware
- lpc5514jbd100
- lpc5514jbd64
- lpc55s16jbd64_firmware
- i.mx_rt600_firmware
- lpc5516jbd64_firmware
- lpc5526
- lpc5528
- lpc55s69jbd100_firmware
- lpc55s69jbd64_firmware
- lpc55s14jbd100
- lpc55s16jev98_firmware
- lpc55s16jev98
- lpcs66jev98_firmware
- lpc5526_firmware
- lpc5516jbd100_firmware
- lpc55s14jbd100_firmware
- lpc5516jbd100
- lpc5514jbd100_firmware
- lpc55s69jbd64
- lpc55s66jbd100_firmware
- lpc55s69jev98_firmware
- lpc55s14jbd64_firmware
- lpc5512jbd64_firmware
- lpc5512jbd100_firmware
- lpc55s14jbd64
- lpc55s16jbd100
- lpcs66jbd64_firmware
- lpc55s28_firmware
- lpc5512jbd64
- i.mx_rt600
- lpc55s69jbd100
- lpc55s16jbd100_firmware
- lpc5516jbd64
- lpc5528_firmware
- lpc55s26_firmware
- lpc5514jbd64_firmware
- lpc5512jbd100