CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-38532

Medium Severity
SVRS
34/100

CVSSv3
NA/10

EPSS
0.00066/1

CVE-2024-38532 affects the NXP Data Co-Processor (DCP), a hardware module for encryption/decryption. This vulnerability in the dcp_tool reference implementation caused it to always select the test key. This occurred regardless of the specified -t argument, potentially leading to security issues. Despite a low SVRS score of 34, indicating a less critical immediate threat level than a score above 80, it’s important to note that this vulnerability could still allow for unintended use of default keys. The issue has been patched, but systems using the unpatched version are still vulnerable. Because the DCP is used for cryptographic operations, exposure of test keys presents a risk. This vulnerability can reduce overall system security. Upgrade to the patched version is recommended to mitigate any associated threats.

In The Wild
2024-06-28

2024-06-28

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-38532 | usbarmory mxs-dcp dcp_tool hard-coded key (GHSA-g85c-rh49-p8cq)
vuldb.com2024-06-29
CVE-2024-38532 | usbarmory mxs-dcp dcp_tool hard-coded key (GHSA-g85c-rh49-p8cq) | A vulnerability was found in usbarmory mxs-dcp. It has been rated as critical. Affected by this issue is the function dcp_tool. The manipulation leads to use of hard-coded cryptographic key . This vulnerability is handled as CVE-2024-38532. The attack may be launched remotely. There is
cve-2024-38532
domains
urls
cves

Social Media

CVE-2024-38532 The NXP Data Co-Processor (DCP) is a built-in hardware module for specific NXP SoCs¹ that implements a dedicated AES cryptographic engine for encryption/decryption operations. The dcp_tool reference... https://t.co/fXL5nRogf7
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/usbarmory/mxs-dcp/commit/e5a99cb3d9429e6145495da7d01525c75af426a7
[email protected]https://github.com/usbarmory/mxs-dcp/security/advisories/GHSA-g85c-rh49-p8cq

CWE Details

CWE IDCWE NameDescription
CWE-321Use of Hard-coded Cryptographic KeyThe use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence