Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Semtech LR11xx LoRa transceivers running early versions of firmware contains an information disclosure vulnerability in its firmware validation functionality. When a host issues a firmware validity check command via the SPI interface, the device decrypts the provided encrypted firmware package block-by-block to validate its integrity. However, the last decrypted firmware block remains uncleared in memory after the validation process completes. An attacker with access to the SPI interface can subsequently issue memory read commands to retrieve the decrypted firmware contents from this residual memory, effectively bypassing the firmware encryption protection mechanism. The attack requires physical access to the device's SPI interface. | |
| Title | Semtech LR11xx Encrypted Firmware Disclosure | |
| First Time appeared |
Semtech
Semtech lr1110 Semtech lr1120 Semtech lr1121 |
|
| Weaknesses | CWE-226 | |
| CPEs | cpe:2.3:a:semtech:lr1110:*:*:*:*:*:*:*:* cpe:2.3:a:semtech:lr1120:*:*:*:*:*:*:*:* cpe:2.3:a:semtech:lr1121:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Semtech
Semtech lr1110 Semtech lr1120 Semtech lr1121 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SWI
Published:
Updated: 2026-04-07T20:42:41.321Z
Reserved: 2025-12-18T00:09:38.279Z
Link: CVE-2025-14858
Updated: 2026-04-07T20:37:57.438Z
Status : Received
Published: 2026-04-07T20:16:22.397
Modified: 2026-04-07T20:16:22.397
Link: CVE-2025-14858
No data.
OpenCVE Enrichment
No data.