An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
References
Link | Resource |
---|---|
https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdf | Exploit Technical Description Vendor Advisory |
https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6g | Third Party Advisory |
Configurations
Information
Published : 2022-12-19 01:15
Updated : 2022-12-28 11:28
NVD link : CVE-2022-47549
Mitre link : CVE-2022-47549
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
linaro
- op-tee