ID |
CVE-2022-25332
|
Sažetak |
The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK). |
Reference |
|
CVSS |
Base: | 4.1 |
Impact: | 3.6 |
Exploitability: | 0.5 |
|
Pristup |
Vektor | Složenost | Autentikacija |
LOCAL |
HIGH |
HIGH |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
NONE |
NONE |
|
CVSS vektor |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N |
Zadnje važnije ažuriranje |
16-02-2024 - 20:30 |
Objavljeno |
19-10-2023 - 10:15 |