Successful exploitation of the vulnerability could allow an attacker that has physical access to interface with JTAG to inject or modify firmware.
History

Wed, 25 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1191

Tue, 24 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 24 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
Description Successful exploitation of the vulnerability could allow an attacker that has physical access to interface with JTAG to inject or modify firmware.
Title Open JTAG Debug Port
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CSA

Published: 2025-06-24T02:16:21.830Z

Updated: 2025-06-25T13:30:04.047Z

Reserved: 2025-05-22T09:41:25.402Z

Link: CVE-2025-48468

cve-icon Vulnrichment

Updated: 2025-06-24T15:22:52.866Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-24T03:15:34.267

Modified: 2025-06-26T18:58:14.280

Link: CVE-2025-48468

cve-icon Redhat

No data.