In ARM Trusted Firmware 1.3, RO memory is always executable at AArch64 Secure EL1, allowing attackers to bypass the MT_EXECUTE_NEVER protection mechanism. This issue occurs because of inconsistency in the number of execute-never bits (one bit versus two bits).
References
Link | Resource |
---|---|
https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-3 | Third Party Advisory |
Configurations
Information
Published : 2017-06-07 08:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-7563
Mitre link : CVE-2017-7563
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
arm
- arm_trusted_firmware