The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK).
2023-10-19T10:15:09.683
2024-11-21T06:52:01.130
Modified
CVSSv3.1: 4.4 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | ti | omap_l138_firmware | - | Yes |
Hardware | ti | omap_l138 | - | No |