CVE-2022-45163

Summary

CVECVE-2022-45163
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-11-18 23:15:00 UTC
Updated2022-11-28 15:21:00 UTC
DescriptionAn information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)

Risk And Classification

Problem Types: CWE-203

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Nxp I.mx 6 - All All All
Hardware Nxp I.mx 6dual - All All All
Hardware Nxp I.mx 6duallite - All All All
Operating System Nxp I.mx 6duallite Firmware - All All All
Hardware Nxp I.mx 6dualplus - All All All
Operating System Nxp I.mx 6dualplus Firmware - All All All
Operating System Nxp I.mx 6dual Firmware - All All All
Hardware Nxp I.mx 6quad - All All All
Hardware Nxp I.mx 6quadplus - All All All
Operating System Nxp I.mx 6quadplus Firmware - All All All
Operating System Nxp I.mx 6quad Firmware - All All All
Hardware Nxp I.mx 6solo - All All All
Hardware Nxp I.mx 6sololite - All All All
Operating System Nxp I.mx 6sololite Firmware - All All All
Hardware Nxp I.mx 6solox - All All All
Operating System Nxp I.mx 6solox Firmware - All All All
Operating System Nxp I.mx 6solo Firmware - All All All
Hardware Nxp I.mx 6ull - All All All
Operating System Nxp I.mx 6ull Firmware - All All All
Hardware Nxp I.mx 6ultralite - All All All
Operating System Nxp I.mx 6ultralite Firmware - All All All
Hardware Nxp I.mx 6ulz - All All All
Operating System Nxp I.mx 6ulz Firmware - All All All
Operating System Nxp I.mx 6 Firmware - All All All
Hardware Nxp I.mx 7dual - All All All
Operating System Nxp I.mx 7dual Firmware - All All All
Hardware Nxp I.mx 7solo - All All All
Operating System Nxp I.mx 7solo Firmware - All All All
Hardware Nxp I.mx 7ulp - All All All
Operating System Nxp I.mx 7ulp Firmware - All All All
Hardware Nxp I.mx 8m Mini - All All All
Operating System Nxp I.mx 8m Mini Firmware - All All All
Hardware Nxp I.mx 8m Quad - All All All
Operating System Nxp I.mx 8m Quad Firmware - All All All
Hardware Nxp I.mx 8m Vybrid - All All All
Operating System Nxp I.mx 8m Vybrid Firmware - All All All
Hardware Nxp I.mx Rt1010 - All All All
Operating System Nxp I.mx Rt1010 Firmware - All All All
Hardware Nxp I.mx Rt1015 - All All All
Operating System Nxp I.mx Rt1015 Firmware - All All All
Hardware Nxp I.mx Rt1020 - All All All
Operating System Nxp I.mx Rt1020 Firmware - All All All
Hardware Nxp I.mx Rt1050 - All All All
Operating System Nxp I.mx Rt1050 Firmware - All All All
Hardware Nxp I.mx Rt1060 - All All All
Operating System Nxp I.mx Rt1060 Firmware - All All All

References

ReferenceSourceLinkTags
Automotive, IoT & Industrial Solutions | NXP Semiconductors MISC nxp.com
Technical Advisory – NCC Group Research MISC research.nccgroup.com
Technical Advisory – NXP i.MX SDP_READ_DISABLE Fuse Bypass (CVE-2022-45163) – NCC Group Research MISC research.nccgroup.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report