Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-57255: CWE-190 Integer Overflow or Wraparound in denx U-Boot

0
High
VulnerabilityCVE-2024-57255cvecve-2024-57255cwe-190
Published: Tue Feb 18 2025 (02/18/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: denx
Product: U-Boot

Description

An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:05:20 UTC

Technical Analysis

CVE-2024-57255 is an integer overflow vulnerability classified under CWE-190 found in the denx U-Boot bootloader, a widely used open-source bootloader for embedded devices. The vulnerability exists in the sqfs_resolve_symlink function, which handles symbolic links within squashfs filesystems. Specifically, when processing a crafted squashfs image containing an inode size field set to the maximum 32-bit unsigned integer value (0xffffffff), the code miscalculates the required memory allocation size, resulting in a malloc call with zero bytes. This leads to a memory overwrite due to subsequent operations assuming a valid allocation. The consequence is a corruption of memory that can be exploited to compromise system confidentiality, integrity, and availability during the boot process. The vulnerability requires local access to the device's boot environment and has a high attack complexity, as crafting a malicious squashfs image and triggering the vulnerable code path is non-trivial. There are no known public exploits or active exploitation campaigns reported at this time. The vulnerability affects all U-Boot versions prior to 2025.01-rc1, which includes many embedded systems and IoT devices that rely on U-Boot for initial bootstrapping. Given U-Boot's prevalence in embedded Linux environments, this vulnerability poses a significant risk to devices that process untrusted squashfs filesystems during boot. The vulnerability has a CVSS v3.1 score of 7.1, reflecting its high severity due to the potential for complete system compromise without user interaction or privileges but requiring physical or local access.

Potential Impact

For European organizations, the impact of CVE-2024-57255 can be substantial, particularly for those operating embedded systems in critical infrastructure, telecommunications, industrial automation, and IoT deployments. Successful exploitation could allow attackers to execute arbitrary code or cause denial of service at the bootloader level, potentially leading to persistent device compromise or operational disruption. This could affect confidentiality by exposing sensitive boot-time data, integrity by allowing malicious code injection, and availability by causing device failures or bricking. The high attack complexity and requirement for local access limit remote exploitation risks but do not eliminate threats from insider attacks, supply chain compromises, or physical access scenarios. Organizations relying on devices with vulnerable U-Boot versions should consider this a serious risk, especially where devices are deployed in untrusted environments or where physical security is limited. The lack of known exploits currently provides a window for proactive mitigation before active exploitation emerges.

Mitigation Recommendations

1. Immediately upgrade all affected devices to U-Boot version 2025.01-rc1 or later, where the vulnerability is patched. 2. Implement strict validation and sanitization of squashfs filesystem inputs before they are processed by the bootloader, ideally rejecting filesystems with suspicious inode sizes or malformed metadata. 3. Enforce physical security controls to prevent unauthorized local access to devices, including tamper-evident seals and secure boot mechanisms. 4. Employ secure boot and trusted platform module (TPM) technologies to ensure bootloader integrity and prevent unauthorized code execution during boot. 5. Conduct thorough inventory and risk assessments of embedded devices running U-Boot to identify vulnerable systems. 6. Monitor device firmware update channels and subscribe to vendor security advisories for timely patch deployment. 7. For critical infrastructure, consider network segmentation and device isolation to limit exposure of embedded devices to untrusted networks or users. 8. Develop incident response plans that include procedures for bootloader compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690908557fff0e30cee23969

Added to database: 11/3/2025, 7:53:57 PM

Last enriched: 11/3/2025, 8:05:20 PM

Last updated: 11/5/2025, 11:13:17 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats