← Back
CVE-2022-30790
high
CVSS 7.8
Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552.
Summary
Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552.
AI summary snake-internal / snake-template-v1
A weakness called CVE-2022-30790 was discovered in Das U-Boot 2022.01 has a Buffer.
In plain terms, it is an out-of-bounds write that can let attackers hijack the program.
Severity is High (CVSS 7.8/10). If exploited, attackers can leak data or disrupt key functionality.
What you should do: update the affected software to the latest version. If unsure, ask your IT team or search the vendor's site for "Das U-Boot 2022.01 has a Buffer CVE-2022-30790".
CVE-2022-30790 (Das U-Boot 2022.01 has a Buffer). Severity: High / CVSSv3 7.8. Category: CWE-787.
Response plan:
1. Check the vendor advisory for affected versions and the patched release.
2. If a vulnerable version is running in production, schedule maintenance (urgency from KEV/CVSS).
3. If no patch yet, mitigate via WAF rule, disabling the affected feature, etc.
4. Monitor logs / SIEM for known IOC and PoC signatures of this CVE.
PoCs and fix commits: see the 'References' section, MITRE, and NVD.
❓ What is the problem
A weakness (CVE-2022-30790) in Das U-Boot 2022.01 has a Buffer. In plain words, it is an out-of-bounds write that can let attackers hijack the program.
📍 Affected scope
Target versions of Das U-Boot 2022.01 has a Buffer (see vendor advisory). If running in production, identify exposure immediately.
🔥 Severity
Severity: High (CVSS 7.8/10). If exploited, attackers can leak data or disrupt key functionality.
🔧 How to fix
Update to the patched release as listed in the vendor advisory. (Typical mitigation pattern for CWE-787)
🛡️ Workaround
If a patch is not yet available, consider disabling the affected feature, applying WAF rules, blocking via network ACLs, or isolating the vulnerable version.
🔍 Detection
Check version information, scan dependencies via SBOM, and monitor SIEM for IOC and PoC signatures related to this CVE.
References
- exploit af854a3a-2127-422b-91ae-364da2661108
- web https://github.com/u-boot/u-boot/tags
- web https://lists.debian.org/debian-lts-announce/2025/05/msg00001.html
- web https://cert-portal.siemens.com/productcert/html/ssa-577017.html
- web https://nvd.nist.gov/vuln/detail/CVE-2022-30790
- web https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552
- web https://github.com/advisories/GHSA-mrg2-fqpf-5crp