There exists an unauthenticated accessible JTAG port on the Kioxia PM6, PM7 and CM6 devices - On the Kioxia CM6, PM6 and PM7 disk drives it was discovered that the 2 main CPU cores of the SoC can be accessed via an open JTAG debug port that is exposed on the drive’s circuit board. Due to the wide cutout of the enclosures, the JTAG port can be accessed without having to open the disk enclosure. Utilizing the JTAG debug port, an attacker with (temporary) physical access can get full access to the firmware and memory on the 2 main CPU cores within the drive including the execution of arbitrary code, the modification of firmware execution flow and data or bypassing the firmware signature verification during boot-up.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Jul 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kioxia
Kioxia cm6 Kioxia cm6 Firmware Kioxia pm6 Kioxia pm6 Firmware Kioxia pm7 Kioxia pm7 Firmware |
|
CPEs | cpe:2.3:h:kioxia:cm6:-:*:*:*:*:*:*:* cpe:2.3:h:kioxia:pm6:-:*:*:*:*:*:*:* cpe:2.3:h:kioxia:pm7:-:*:*:*:*:*:*:* cpe:2.3:o:kioxia:cm6_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kioxia:pm6_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:kioxia:pm7_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Kioxia
Kioxia cm6 Kioxia cm6 Firmware Kioxia pm6 Kioxia pm6 Firmware Kioxia pm7 Kioxia pm7 Firmware |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 20 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 20 Dec 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | There exists an unauthenticated accessible JTAG port on the Kioxia PM6, PM7 and CM6 devices - On the Kioxia CM6, PM6 and PM7 disk drives it was discovered that the 2 main CPU cores of the SoC can be accessed via an open JTAG debug port that is exposed on the drive’s circuit board. Due to the wide cutout of the enclosures, the JTAG port can be accessed without having to open the disk enclosure. Utilizing the JTAG debug port, an attacker with (temporary) physical access can get full access to the firmware and memory on the 2 main CPU cores within the drive including the execution of arbitrary code, the modification of firmware execution flow and data or bypassing the firmware signature verification during boot-up. | |
Title | Arbitrary Code execution via exposed JTAG port in Kioxia CM6, PM6, PM7 | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Google
Published: 2024-12-20T11:02:17.309Z
Updated: 2024-12-20T15:51:09.904Z
Reserved: 2024-08-12T21:49:35.702Z
Link: CVE-2024-7726

Updated: 2024-12-20T15:50:44.882Z

Status : Analyzed
Published: 2024-12-20T11:15:08.720
Modified: 2025-07-23T20:15:35.653
Link: CVE-2024-7726

No data.