cve/2018/CVE-2018-6242.md

36 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-6242](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6242)
![](https://img.shields.io/static/v1?label=Product&message=Some%20NVIDIA%20Tegra%20Mobile%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Code%20execution%2C%20escalation%20of%20privileges%2C%20and%20information%20disclosure&color=brighgreen)
### Description
Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer overflow vulnerability in BootROM Recovery Mode (RCM). An attacker with physical access to the device's USB and the ability to force the device to reboot into RCM could exploit the vulnerability to execute unverified code.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ChrisFigura/react-tegra-payload-launcher
- https://github.com/DavidBuchanan314/DavidBuchanan314
- https://github.com/DavidBuchanan314/NXLoader
- https://github.com/Geoselenic/de-switch
- https://github.com/Haruster/Haruster-Nintendo-CVE-2018-6242
- https://github.com/Qyriad/fusee-launcher
- https://github.com/Swiftloke/fusee-toy
- https://github.com/austinhartzheim/fusee-gelee
- https://github.com/benzhu56/fusee-launcher
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/erdzan12/switch-fusee
- https://github.com/geeksniper/reverse-engineering-toolkit
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/mologie/nxboot
- https://github.com/parallelbeings/usb-device-security
- https://github.com/perillamint/awesome-switch
- https://github.com/reswitched/rcm-modchips
- https://github.com/rgisreventlov/Nephael-Nintendo-CVE-2018-6242