No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Barebox
Barebox barebox |
|
| Vendors & Products |
Barebox
Barebox barebox |
Fri, 20 Mar 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | barebox is a bootloader. In barebox from version 2016.03.0 to before version 2025.09.3 and from version 2025.10.0 to before version 2026.03.1, when creating a FIT, mkimage(1) sets the hashed-nodes property of the FIT signature node to list which nodes of the FIT were hashed as part of the signing process as these will need to be verified later on by the bootloader. However, hashed-nodes itself is not part of the hash and can therefore be modified by an attacker to trick the bootloader into booting different images than those that have been verified. This issue has been patched in barebox versions 2025.09.3 and 2026.03.1. | |
| Title | barebox: FIT Signature Verification Bypass Vulnerability | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T15:31:34.971Z
Reserved: 2026-03-18T02:42:27.509Z
Link: CVE-2026-33243
Updated: 2026-03-24T15:31:31.448Z
Status : Awaiting Analysis
Published: 2026-03-20T23:16:47.167
Modified: 2026-03-23T14:32:02.800
Link: CVE-2026-33243
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:52:12Z