First published: Wed Jun 07 2017(Updated: )
In ARM Trusted Firmware 1.3, RO memory is always executable at AArch64 Secure EL1, allowing attackers to bypass the MT_EXECUTE_NEVER protection mechanism. This issue occurs because of inconsistency in the number of execute-never bits (one bit versus two bits).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arm Trusted Firmware | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7563 is classified as a high-severity vulnerability due to its potential to allow unauthorized code execution in a secure environment.
To mitigate CVE-2017-7563, update the ARM Trusted Firmware to a version later than 1.3, which addresses the execute-never bit inconsistency.
CVE-2017-7563 can lead to exploits that bypass the MT_EXECUTE_NEVER protection and allow attackers to execute code in read-only memory.
All versions of ARM Trusted Firmware up to and including 1.3 are affected by CVE-2017-7563.
No reliable workaround is available for CVE-2017-7563; the recommended action is to upgrade to a patched version of the firmware.