CVE-2022-47549
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/12/2022
Last modified:
17/04/2025
Description
An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
Impact
Base Score 3.x
6.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linaro:op-tee:*:*:*:*:*:*:*:* | 3.20 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6g
- https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdf
- https://github.com/OP-TEE/optee_os/security/advisories/GHSA-r64m-h886-hw6g
- https://people.linaro.org/~joakim.bech/reports/Breaking_cross-world_isolation_on_ARM_TrustZone_through_EM_faults_coredumps_and_UUID_confusion.pdf



