There exists an unauthenticated accessible JTAG port on the Kioxia PM6, PM7 and CM6 devices - On the Kioxia CM6, PM6 and PM7 disk drives it was discovered that the 2 main CPU cores of the SoC can be accessed via an open JTAG debug port that is exposed on the drive’s circuit board. Due to the wide cutout of the enclosures, the JTAG port can be accessed without having to open the disk enclosure. Utilizing the JTAG debug port, an attacker with (temporary) physical access can get full access to the firmware and memory on the 2 main CPU cores within the drive including the execution of arbitrary code, the modification of firmware execution flow and data or bypassing the firmware signature verification during boot-up.
History

Wed, 23 Jul 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Kioxia
Kioxia cm6
Kioxia cm6 Firmware
Kioxia pm6
Kioxia pm6 Firmware
Kioxia pm7
Kioxia pm7 Firmware
CPEs cpe:2.3:h:kioxia:cm6:-:*:*:*:*:*:*:*
cpe:2.3:h:kioxia:pm6:-:*:*:*:*:*:*:*
cpe:2.3:h:kioxia:pm7:-:*:*:*:*:*:*:*
cpe:2.3:o:kioxia:cm6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:kioxia:pm6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:kioxia:pm7_firmware:*:*:*:*:*:*:*:*
Vendors & Products Kioxia
Kioxia cm6
Kioxia cm6 Firmware
Kioxia pm6
Kioxia pm6 Firmware
Kioxia pm7
Kioxia pm7 Firmware

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00036}

epss

{'score': 0.0004}


Fri, 20 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Dec 2024 11:15:00 +0000

Type Values Removed Values Added
Description There exists an unauthenticated accessible JTAG port on the Kioxia PM6, PM7 and CM6 devices - On the Kioxia CM6, PM6 and PM7 disk drives it was discovered that the 2 main CPU cores of the SoC can be accessed via an open JTAG debug port that is exposed on the drive’s circuit board. Due to the wide cutout of the enclosures, the JTAG port can be accessed without having to open the disk enclosure. Utilizing the JTAG debug port, an attacker with (temporary) physical access can get full access to the firmware and memory on the 2 main CPU cores within the drive including the execution of arbitrary code, the modification of firmware execution flow and data or bypassing the firmware signature verification during boot-up.
Title Arbitrary Code execution via exposed JTAG port in Kioxia CM6, PM6, PM7
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published: 2024-12-20T11:02:17.309Z

Updated: 2024-12-20T15:51:09.904Z

Reserved: 2024-08-12T21:49:35.702Z

Link: CVE-2024-7726

cve-icon Vulnrichment

Updated: 2024-12-20T15:50:44.882Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-20T11:15:08.720

Modified: 2025-07-23T20:15:35.653

Link: CVE-2024-7726

cve-icon Redhat

No data.