CVE-2019-14193

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to exploit a flaw in the U-Boot bootloader to potentially overwrite memory, which could lead to system crashes or unauthorized code execution. It requires the attacker to have access to the system's network file system, making it a risk primarily in environments where untrusted users can interact with the bootloader.

Technical Description

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 2386 days

Quick Information

Published

Jul 31, 2019

over 6 years ago

Last Modified

Feb 10, 2026

10 days ago

Vendor

denx

Product

u-boot