Description

There exists an unauthenticated accessible JTAG port on the Kioxia PM6, PM7 and CM6 devices - On the Kioxia CM6, PM6 and PM7 disk drives it was discovered that the 2 main CPU cores of the SoC can be accessed via an open JTAG debug port that is exposed on the drive’s circuit board. Due to the wide cutout of the enclosures, the JTAG port can be accessed without having to open the disk enclosure. Utilizing the JTAG debug port, an attacker with (temporary) physical access can get full access to the firmware and memory on the 2 main CPU cores within the drive including the execution of arbitrary code, the modification of firmware execution flow and data or bypassing the firmware signature verification during boot-up.

INFO

Published Date :

2024-12-20T11:02:17.309Z

Last Modified :

2024-12-20T15:51:09.904Z

Source :

Google
AFFECTED PRODUCTS

The following products are affected by CVE-2024-7726 vulnerability.

Vendors Products
Kioxia
  • Cm6
  • Cm6 Firmware
  • Pm6
  • Pm6 Firmware
  • Pm7
  • Pm7 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-7726.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact