PatchSiren cyber security CVE debrief
CVE-2019-14200 Denx CVE debrief
CVE-2019-14200 is a critical stack-based buffer overflow in Das U-Boot's NFS reply helper rpc_lookup_reply, affecting versions through 2019.07. Because the vulnerable path is network reachable and requires no authentication or user interaction, affected bootloader deployments should treat it as urgent.
- Vendor
- Denx
- Product
- CVE-2019-14200
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2019-07-31
- Original CVE updated
- 2026-05-12
- Advisory published
- 2019-07-31
- Advisory updated
- 2026-05-12
Who should care
OEMs, firmware maintainers, and operators of systems that use U-Boot for network booting or NFS-based boot workflows, especially where the bootloader is exposed on trusted or semi-trusted networks.
Technical summary
NVD describes a stack-based buffer overflow in the nfs_handler reply helper function rpc_lookup_reply, with affected CPE coverage for denx:u-boot through 2019.07. The published CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8), indicating a remotely reachable flaw with no privileges or user interaction required and high impact if triggered.
Defensive priority
Urgent. This is a critical, remotely reachable memory corruption issue in a foundational boot component; exposure during network boot or NFS reply handling can put firmware integrity and availability at risk.
Recommended defensive actions
- Upgrade to a U-Boot release or vendor backport that removes the vulnerable rpc_lookup_reply/NFS reply handling flaw.
- If you cannot patch immediately, disable or restrict NFS/network boot paths that rely on the affected U-Boot code.
- Limit access to boot services to trusted management networks and isolate them from general-purpose network segments.
- Inventory downstream firmware, board support packages, and OEM images that embed U-Boot through 2019.07 and verify whether the fix was backported.
- Watch for unexpected bootloader crashes or repeated boot failures on systems that use NFS-based booting.
Evidence notes
The supplied NVD record states that Das U-Boot through 2019.07 is affected and classifies the flaw as CWE-787. The CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. References in the record include a Semmle advisory, the U-Boot GitLab repository, and a Siemens product security advisory. No fixed version is provided in the supplied corpus.
Official resources
-
CVE-2019-14200 CVE record
CVE.org
-
CVE-2019-14200 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
CVE published: 2019-07-31T13:15:13.760Z. NVD last modified: 2026-05-12T10:16:35.440Z. This debrief uses the supplied CVE publication timeline and official record references.