PatchSiren cyber security CVE debrief
CVE-2019-14203 Denx CVE debrief
CVE-2019-14203 is a critical stack-based buffer overflow in Das U-Boot's nfs_handler reply helper function nfs_mount_reply. The issue is described as affecting U-Boot through 2019.07 and is rated CVSS 9.8, reflecting high impact with network access, no privileges, and no user interaction required.
- Vendor
- Denx
- Product
- CVE-2019-14203
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2019-07-31
- Original CVE updated
- 2026-05-12
- Advisory published
- 2019-07-31
- Advisory updated
- 2026-05-12
Who should care
Teams that build, ship, or maintain U-Boot-based firmware should prioritize this issue, especially where NFS-related boot functionality is used or exposed. Security teams tracking embedded device bootloaders and OEM firmware updates should also review it.
Technical summary
NVD classifies CVE-2019-14203 as CWE-787 and describes a stack-based buffer overflow in the nfs_handler reply helper function nfs_mount_reply in Das U-Boot through 2019.07. The published CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely reachable condition with no privileges or user interaction and potential high impact to confidentiality, integrity, and availability.
Defensive priority
High. The combination of a critical CVSS score, network reachability, and no authentication or user interaction makes this a strong patch-priority item for any environment that depends on affected U-Boot versions.
Recommended defensive actions
- Inventory firmware and images that include Das U-Boot versions through 2019.07.
- Apply the vendor or upstream U-Boot update that addresses CVE-2019-14203, using the linked advisory and repository references to identify the fixed release or commit.
- If immediate patching is not possible, minimize exposure of affected boot paths and review whether NFS-related boot functionality is required in deployed builds.
- Validate updated firmware in a staging environment before rollout to ensure boot reliability is preserved.
- Track downstream device/vendor advisories for packaged U-Boot updates and rebuilds.
Evidence notes
All core claims are supported by the supplied NVD record and linked references: the vulnerability description names a stack-based buffer overflow in nfs_mount_reply, the affected version range is through 2019.07, the weakness is CWE-787, and the CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The supplied enrichment marks this as not listed in KEV.
Official resources
-
CVE-2019-14203 CVE record
CVE.org
-
CVE-2019-14203 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Publicly disclosed on 2019-07-31. The supplied NVD record was modified on 2026-05-12. The provided enrichment indicates this vulnerability is not in CISA KEV.