First published: Fri Sep 08 2023(Updated: )
In Trusted Firmware-M through TF-Mv1.8.0, for platforms that integrate the CryptoCell accelerator, when the CryptoCell PSA Driver software Interface is selected, and the Authenticated Encryption with Associated Data Chacha20-Poly1305 algorithm is used, with the single-part verification function (defined during the build-time configuration phase) implemented with a dedicated function (i.e., not relying on usage of multipart functions), the buffer comparison during the verification of the authentication tag does not happen on the full 16 bytes but just on the first 4 bytes, thus leading to the possibility that unauthenticated payloads might be identified as authentic. This affects TF-Mv1.6.0, TF-Mv1.6.1, TF-Mv1.7.0, and TF-Mv1.8.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arm Trusted Firmware-m | =1.6.0 | |
Arm Trusted Firmware-m | =1.6.1 | |
Arm Trusted Firmware-m | =1.7.0 | |
Arm Trusted Firmware-m | =1.8.0 | |
Arm Trusted Firmware-m | =1.6.0 | |
Arm Trusted Firmware-m | =1.6.1 | |
Arm Trusted Firmware-m | =1.7.0 | |
Arm Trusted Firmware-m | =1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-40271.
The severity of CVE-2023-40271 is high with a severity value of 7.5.
Trusted Firmware-M versions 1.6.0, 1.6.1, 1.7.0, and 1.8.0 are affected by CVE-2023-40271.
To fix CVE-2023-40271, it is recommended to upgrade to a version of Trusted Firmware-M that is not affected by the vulnerability.
You can find more information about CVE-2023-40271 in the following references: [reference1], [reference2].