CVE-2022-47549
6.4MEDIUMAn unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verif
Опубликовано: 12/19/2022Обновлено: 4/17/2025
Описание
An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
ИИ-АнализНа базе ИИ
Затронутые продукты
linaroop-tee
Ссылки
- https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6gThird Party Advisory
- https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdfExploitTechnical DescriptionVendor Advisory
- https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6gThird Party Advisory
- https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdfExploitTechnical DescriptionVendor Advisory