There exists an unauthenticated accessible JTAG port on the Kioxia PM6, PM7 and CM6 devices - On the Kioxia CM6, PM6 and PM7 disk drives it was discovered that the 2 main CPU cores of the SoC can be accessed via an open JTAG debug port that is exposed on the drive’s circuit board. Due to the wide cutout of the enclosures, the JTAG port can be accessed without having to open the disk enclosure. Utilizing the JTAG debug port, an attacker with (temporary) physical access can get full access to the firmware and memory on the 2 main CPU cores within the drive including the execution of arbitrary code, the modification of firmware execution flow and data or bypassing the firmware signature verification during boot-up.
References
Link | Resource |
---|---|
https://github.com/google/security-research/security/advisories/GHSA-3hh8-94j4-62rh | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
23 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/google/security-research/security/advisories/GHSA-3hh8-94j4-62rh - Exploit, Vendor Advisory | |
First Time |
Kioxia
Kioxia pm6 Kioxia cm6 Firmware Kioxia cm6 Kioxia pm7 Firmware Kioxia pm6 Firmware Kioxia pm7 |
|
CPE | cpe:2.3:h:kioxia:pm6:-:*:*:*:*:*:*:* cpe:2.3:o:kioxia:pm6_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kioxia:pm7_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kioxia:cm6_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:kioxia:cm6:-:*:*:*:*:*:*:* cpe:2.3:h:kioxia:pm7:-:*:*:*:*:*:*:* |
20 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-20 11:15
Updated : 2025-07-23 20:15
NVD link : CVE-2024-7726
Mitre link : CVE-2024-7726
CVE.ORG link : CVE-2024-7726
JSON object : View
Products Affected
kioxia
- pm6
- cm6
- pm6_firmware
- cm6_firmware
- pm7
- pm7_firmware
CWE
CWE-306
Missing Authentication for Critical Function