First published: Thu Oct 19 2023(Updated: )
The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) performs an RSA check implemented in mask ROM when loading a module through the SK_LOAD routine. However, only the module header authenticity is validated. An adversary can re-use any correctly signed header and append a forged payload, to be encrypted using the CEK (obtainable through CVE-2022-25332) in order to obtain arbitrary code execution in secure context. This constitutes a full break of the TEE security architecture.
Credit: cert@ncsc.nl
Affected Software | Affected Version | How to fix |
---|---|---|
OMAP-L138 | ||
OMAP-L138 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-25333.
The severity of CVE-2022-25333 is high with a severity value of 8.2.
The Ti Omap L138 Firmware is affected by CVE-2022-25333.
CVE-2022-25333 exploits the vulnerability by re-using any correctly signed header and applying malicious payload.
No, Ti Omap L138 is not vulnerable to CVE-2022-25333.