Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57254: CWE-190 Integer Overflow or Wraparound in denx U-Boot

0
High
VulnerabilityCVE-2024-57254cvecve-2024-57254cwe-190
Published: Tue Feb 18 2025 (02/18/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: denx
Product: U-Boot

Description

An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc1 occurs in the symlink size calculation via a crafted squashfs filesystem.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:05:01 UTC

Technical Analysis

CVE-2024-57254 is an integer overflow vulnerability classified under CWE-190 found in the sqfs_inode_size function of the denx U-Boot bootloader prior to version 2025.01-rc1. The vulnerability arises during the calculation of the size of symbolic links within a squashfs filesystem image. Specifically, a crafted squashfs filesystem can trigger an integer overflow or wraparound when computing the symlink size, leading to incorrect memory allocation or buffer handling. This can cause memory corruption, which attackers might leverage to execute arbitrary code, escalate privileges, or cause denial of service. The vulnerability has a CVSS 3.1 base score of 7.1, indicating high severity, with an attack vector of physical or local access (AV:P), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality, integrity, and availability impacts are all rated high. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to embedded systems and devices that utilize U-Boot as their bootloader, especially those that process squashfs filesystems. Since U-Boot is widely used in embedded devices, IoT, and industrial control systems, this vulnerability could be leveraged in targeted attacks if an attacker can supply a malicious squashfs image. The lack of a patch link suggests that fixes may be pending or recently released in versions 2025.01-rc1 and later.

Potential Impact

For European organizations, the impact of CVE-2024-57254 is considerable, particularly for sectors relying on embedded systems, IoT devices, and industrial control systems that use U-Boot as their bootloader. Exploitation could lead to unauthorized code execution, data breaches, or system outages, affecting operational technology environments and critical infrastructure. Confidentiality breaches could expose sensitive data, while integrity violations might allow attackers to alter system behavior or firmware. Availability impacts could result in denial of service, disrupting business operations or critical services. Given the high attack complexity and requirement for local or physical access, remote exploitation is less likely, but insider threats or supply chain attacks involving malicious squashfs images remain plausible. Organizations in manufacturing, telecommunications, energy, and transportation sectors are particularly vulnerable. Failure to address this vulnerability could lead to regulatory non-compliance under European data protection and cybersecurity frameworks, increasing legal and financial risks.

Mitigation Recommendations

To mitigate CVE-2024-57254, European organizations should prioritize updating U-Boot to version 2025.01-rc1 or later once official patches are available. Until then, organizations should implement strict controls on the sources and integrity of squashfs filesystem images used in their environments, including cryptographic verification and whitelisting trusted images. Employing runtime protections such as memory corruption mitigations (e.g., stack canaries, address space layout randomization) in embedded systems can reduce exploitation likelihood. Conduct thorough security audits of embedded devices and firmware to identify vulnerable U-Boot versions. Limit physical and local access to devices to reduce attack surface. Additionally, organizations should monitor for anomalous behavior indicative of exploitation attempts and maintain incident response readiness. Collaborating with device manufacturers to ensure timely firmware updates and secure supply chain practices is also critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690908557fff0e30cee23964

Added to database: 11/3/2025, 7:53:57 PM

Last enriched: 11/3/2025, 8:05:01 PM

Last updated: 11/5/2025, 1:51:13 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats