First published: Sat Apr 13 2013(Updated: )
The TrustZone kernel, when used in conjunction with a certain Motorola build of Android 4.1.2, on Motorola Razr HD, Razr M, and Atrix HD devices with the Qualcomm MSM8960 chipset does not verify the association between a certain physical-address argument and a memory region, which allows local users to unlock the bootloader by using kernel mode to perform crafted 0x9 and 0x2 SMC operations, a different vulnerability than CVE-2013-2596.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm MSM8960 Firmware | ||
Motorola Android | =4.1.2 | |
Motorola Atrix HD | ||
Motorola Razr HD | ||
Motorola Razr M |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3051 is categorized as a high-severity vulnerability due to its potential exploitation by local users.
To mitigate CVE-2013-3051, users should update their devices to the latest firmware provided by Motorola.
CVE-2013-3051 affects the Motorola Razr HD, Razr M, and Atrix HD devices that run on Android 4.1.2 with the Qualcomm MSM8960 chipset.
CVE-2013-3051 allows local users to exploit a memory vulnerability due to the lack of verification by the TrustZone kernel.
CVE-2013-3051 is primarily a software vulnerability present in the Android operating system and TrustZone implementation on specific Motorola devices.