CVE-2022-47549
6.4MEDIUMAn unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verif
Publicado: 12/19/2022Actualizado: 4/17/2025
Descripción
An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
Análisis IAImpulsado por IA
Productos Afectados
linaroop-tee
Referencias
- https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6gThird Party Advisory
- https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdfExploitTechnical DescriptionVendor Advisory
- https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6gThird Party Advisory
- https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdfExploitTechnical DescriptionVendor Advisory