First published: Tue May 25 2021(Updated: )
In Arm Trusted Firmware M through 1.2, the NS world may trigger a system halt, an overwrite of secure data, or the printing out of secure data when calling secure functions under the NSPE handler mode.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ARM Trusted Firmware-A | ||
Arm Trusted Firmware-m | <=1.2 | |
Arm Trusted Firmware-m | ||
All of | ||
Arm Trusted Firmware-m | <=1.2 | |
Arm Trusted Firmware-m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27562 has been classified as a serious vulnerability due to its potential impact on system stability and secure data integrity.
To mitigate CVE-2021-27562, it's recommended to update Arm Trusted Firmware M to version 1.2 or later, where the vulnerability is addressed.
CVE-2021-27562 is identified as an out-of-bounds write vulnerability within Arm Trusted Firmware M.
Exploitation of CVE-2021-27562 may lead to a system halt, overwrite of secure data, and unauthorized printing of secure information.
CVE-2021-27562 affects users and systems running Arm Trusted Firmware M versions up to and including 1.2.