Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-16273


In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.


Published

2020-11-12T19:15:14.583

Last Modified

2024-11-21T05:07:04.670

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-191

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System arm armv8-m_firmware * Yes
Hardware arm armv8-m - No

References