PatchSiren

PatchSiren cyber security CVE debrief

CVE-2019-14199 Denx CVE debrief

CVE-2019-14199 is a critical memory-corruption issue in DENX U-Boot’s UDP packet handling. NVD describes an integer underflow in net_process_received_packet during udp_packet_handler processing that can lead to an unbounded memcpy when parsing a UDP packet.

Vendor
Denx
Product
CVE-2019-14199
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2019-07-31
Original CVE updated
2026-05-12
Advisory published
2019-07-31
Advisory updated
2026-05-12

Who should care

Organizations that ship or operate embedded devices using DENX U-Boot, especially systems that accept network traffic during boot or recovery, should review this immediately. Security teams responsible for firmware supply chains, device OEMs, and operators of remotely managed embedded hardware are the most likely to be affected.

Technical summary

According to NVD, the vulnerability affects U-Boot through version 2019.07 and is classified as CWE-191 (integer underflow). The reported flaw occurs in UDP packet parsing: an integer underflow in net_process_received_packet can result in an unbounded memcpy inside an *udp_packet_handler call. NVD rates the issue CVSS 3.0 9.8/CRITICAL with network attack vector and no privileges or user interaction required.

Defensive priority

Immediate. This is a remotely reachable pre-authentication firmware parsing flaw with critical CVSS severity and high impact ratings in NVD.

Recommended defensive actions

  • Inventory all devices and firmware builds that use DENX U-Boot and identify any builds at or below version 2019.07.
  • Prioritize updating to a vendor- or upstream-fixed U-Boot release; if a fixed version is not immediately known, confirm remediation guidance through the U-Boot project and vendor advisory references.
  • Reduce exposure of boot-time or recovery network services where feasible, especially UDP-based management or boot paths.
  • Validate whether affected products include the vulnerable packet-handling path in deployed configurations, including network boot scenarios.
  • Track vendor and upstream advisories for patch status and backport availability before field deployment.

Evidence notes

Source corpus support: NVD lists affected U-Boot versions through 2019.07, CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and CWE-191. The supplied CVE description states the issue is an unbounded memcpy during UDP packet parsing caused by an integer underflow in net_process_received_packet during udp_packet_handler. References in the record point to the U-Boot project repository, a Semmle advisory, and a Siemens product security advisory.

Official resources

Publicly disclosed on 2019-07-31. The supplied record was last modified by NVD on 2026-05-12.