Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-25332


The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK).


Published

2023-10-19T10:15:09.683

Last Modified

2024-11-21T06:52:01.130

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.4 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-208
  • Type: Primary
    CWE-203

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System ti omap_l138_firmware - Yes
Hardware ti omap_l138 - No

References