Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-40271


In Trusted Firmware-M through TF-Mv1.8.0, for platforms that integrate the CryptoCell accelerator, when the CryptoCell PSA Driver software Interface is selected, and the Authenticated Encryption with Associated Data Chacha20-Poly1305 algorithm is used, with the single-part verification function (defined during the build-time configuration phase) implemented with a dedicated function (i.e., not relying on usage of multipart functions), the buffer comparison during the verification of the authentication tag does not happen on the full 16 bytes but just on the first 4 bytes, thus leading to the possibility that unauthenticated payloads might be identified as authentic. This affects TF-Mv1.6.0, TF-Mv1.6.1, TF-Mv1.7.0, and TF-Mv1.8.


Published

2023-09-08T02:15:08.133

Last Modified

2024-11-27T20:03:20.203

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Primary
    CWE-697

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System arm trusted_firmware-m 1.6.0 Yes
Operating System arm trusted_firmware-m 1.6.1 Yes
Operating System arm trusted_firmware-m 1.7.0 Yes
Operating System arm trusted_firmware-m 1.8.0 Yes

References