๐Ÿ” CVE Alert

CVE-2022-25333

HIGH 8.2

Flawed SK_LOAD module authenticity check in Texas Instruments OMAP L138

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) performs an RSA check implemented in mask ROM when loading a module through the SK_LOAD routine. However, only the module header authenticity is validated. An adversary can re-use any correctly signed header and append a forged payload, to be encrypted using the CEK (obtainable through CVE-2022-25332) in order to obtain arbitrary code execution in secure context. This constitutes a full break of the TEE security architecture.

CWE CWE-347
Vendor texas instruments
Product omap
Published Oct 19, 2023
Last Updated Aug 3, 2024
Stay Ahead of the Next One

Get instant alerts for texas instruments omap

Be the first to know when new high vulnerabilities affecting texas instruments omap are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C/CR:H/IR:H/AR:H/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High

Affected Versions

Texas Instruments / OMAP
L138

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tetraburst.com: https://tetraburst.com/

Credits

Midnight Blue