Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2022-23005
Analyzed
More InfoOfficial Page
Source-psirt@wdc.com
View Known Exploited Vulnerability (KEV) details
Published At-23 Jan, 2023 | 22:15
Updated At-08 Feb, 2023 | 19:14

Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details of the vulnerability to the JEDEC standards body, multiple vendors of host processors, and software solutions providers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.7HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
Secondary3.18.7HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
Type: Primary
Version: 3.1
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
CPE Matches

jedec
jedec
>>universal_flash_storage>>-
cpe:2.3:a:jedec:universal_flash_storage:-:*:*:*:*:*:*:*
Western Digital Corp.
westerndigital
>>inand_eu311_mobile_mc_ufs>>-
cpe:2.3:h:westerndigital:inand_eu311_mobile_mc_ufs:-:*:*:*:*:*:*:*
Western Digital Corp.
westerndigital
>>inand_eu312_automotive_xa_at_ufs>>-
cpe:2.3:h:westerndigital:inand_eu312_automotive_xa_at_ufs:-:*:*:*:*:*:*:*
Western Digital Corp.
westerndigital
>>inand_eu312_industrial_ix_ufs>>-
cpe:2.3:h:westerndigital:inand_eu312_industrial_ix_ufs:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-662Primarynvd@nist.gov
CWE-1224Secondarypsirt@wdc.com
CWE-1233Secondarypsirt@wdc.com
CWE-1262Secondarypsirt@wdc.com
CWE ID: CWE-662
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-1224
Type: Secondary
Source: psirt@wdc.com
CWE ID: CWE-1233
Type: Secondary
Source: psirt@wdc.com
CWE ID: CWE-1262
Type: Secondary
Source: psirt@wdc.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdfpsirt@wdc.com
Exploit
Technical Description
Vendor Advisory
https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-featurepsirt@wdc.com
Vendor Advisory
Hyperlink: https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf
Source: psirt@wdc.com
Resource:
Exploit
Technical Description
Vendor Advisory
Hyperlink: https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature
Source: psirt@wdc.com
Resource:
Vendor Advisory
Change History
0Changes found

Details not found