CVE-2023-49100

Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdei_interrupt_bind. The parameter is passed to a call to plat_ic_get_interrupt_type. It can be any arbitrary value passing checks in the function plat_ic_is_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.
Configurations

No configuration.

History

21 Nov 2024, 08:32

Type Values Removed Values Added
References () https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf0795ce641b6b4db5bc97e/services/std_svc/sdei/sdei_main.c#L708 - () https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf0795ce641b6b4db5bc97e/services/std_svc/sdei/sdei_main.c#L708 -
References () https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf0795ce641b6b4db5bc97e/services/std_svc/sdei/sdei_main.c#L714 - () https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf0795ce641b6b4db5bc97e/services/std_svc/sdei/sdei_main.c#L714 -
References () https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-11.html - () https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-11.html -

31 Oct 2024, 20:35

Type Values Removed Values Added
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4

22 Feb 2024, 19:07

Type Values Removed Values Added
Summary
  • (es) Trusted Firmware-A (TF-A) anterior a 2.10 tiene una posible lectura fuera de los límites en el servicio SDEI. El parámetro de entrada pasado en el registro x1 no está suficientemente validado en la función sdei_interrupt_bind. El parámetro se pasa a una llamada a plat_ic_get_interrupt_type. Puede ser cualquier valor arbitrario que pase las comprobaciones en la función plat_ic_is_sgi. Un Normal World (kernel de Linux) comprometido puede permitir que un atacante con privilegios de root emita llamadas SMC arbitrarias. Usando esta primitiva, puede controlar el contenido de los registros x0 a x6, que se utilizan para enviar parámetros a TF-A. Las direcciones fuera de los límites se pueden leer en el contexto de TF-A (EL3). Debido a que el valor leído nunca se devuelve a la memoria no segura o a los registros, no es posible ninguna fuga. Sin embargo, un atacante aún puede bloquear TF-A.

21 Feb 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-21 16:15

Updated : 2024-11-21 08:32


NVD link : CVE-2023-49100

Mitre link : CVE-2023-49100

CVE.ORG link : CVE-2023-49100


JSON object : View

Products Affected

No product.

CWE
CWE-125

Out-of-bounds Read