CVE-2026-33243 PUBLISHED

barebox: FIT Signature Verification Bypass Vulnerability

Assigner: GitHub_M
Reserved: 18.03.2026 Published: 20.03.2026 Updated: 20.03.2026

barebox is a bootloader. In barebox from version 2016.03.0 to before version 2025.09.3 and from version 2025.10.0 to before version 2026.03.1, when creating a FIT, mkimage(1) sets the hashed-nodes property of the FIT signature node to list which nodes of the FIT were hashed as part of the signing process as these will need to be verified later on by the bootloader. However, hashed-nodes itself is not part of the hash and can therefore be modified by an attacker to trick the bootloader into booting different images than those that have been verified. This issue has been patched in barebox versions 2025.09.3 and 2026.03.1.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 8.3

Product Status

Vendor barebox
Product barebox
Versions
  • Version >= 2016.03.0, < 2025.09.3 is affected
  • Version >= 2025.10.0, < 2026.03.1 is affected

References

Problem Types

  • CWE-345: Insufficient Verification of Data Authenticity CWE