CVE-2024-57254
Published: 18 February 2025
Summary
CVE-2024-57254 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Denx U-Boot. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Replication Through Removable Media (T1091); ranked at the 19.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 PE-3 (Physical Access Control) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of the integer overflow flaw in U-Boot by applying the fixing patch from version 2025.01-rc1 or later.
Prevents physical access (AV:P) required by an attacker to supply the crafted SquashFS filesystem image to trigger the symlink size calculation overflow.
Mitigates the integer overflow in symlink size calculation by enforcing validation of SquashFS inputs to reject malformed data.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Physical access vector with crafted SquashFS image on removable media enables initial access via hardware/removable media delivery leading to code execution in bootloader.
NVD Description
An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc1 occurs in the symlink size calculation via a crafted squashfs filesystem.
Deeper analysisAI
CVE-2024-57254 is an integer overflow vulnerability (CWE-190) in the sqfs_inode_size function within Das U-Boot versions prior to 2025.01-rc1. The issue arises during symlink size calculation when processing a crafted SquashFS filesystem, potentially leading to incorrect memory handling. It carries a CVSS v3.1 base score of 7.1 (AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating high impact across confidentiality, integrity, and availability with a changed scope.
An attacker with physical access to the target device could exploit this vulnerability by providing a specially crafted SquashFS filesystem image. The high attack complexity (AC:H) suggests it requires sophisticated preparation, but no privileges (PR:N) or user interaction (UI:N) are needed. Successful exploitation could result in high-impact consequences, including potential arbitrary code execution, data corruption, or denial of service due to the integer overflow.
Mitigation involves updating to Das U-Boot 2025.01-rc1 or later, as evidenced by the fixing commit c8e929e5758999933f9e905049ef2bf3fe6b140d in the U-Boot repository. Security advisories, including the oss-security mailing list announcement from February 17, 2025, and Debian LTS tracking from May 2025, recommend applying this patch to affected systems.
Details
- CWE(s)