CVE-2022-25332

Published Oct 19, 2023

Last updated 9 months ago

Overview

Description
The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK).
Source
cert@ncsc.nl
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
4.1
Impact score
3.6
Exploitability score
0.5
Vector string
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Severity
MEDIUM

Weaknesses

nvd@nist.gov
CWE-203
cert@ncsc.nl
CWE-208

Social media

Hype score
Not currently trending

Configurations