CVE-2022-46152
November 29, 2022
OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environment. Versions prior to 3.19.0, contain an Improper Validation of Array Index vulnerability. The function "cleanup_shm_refs()" is called by both "entry_invoke_command()" and "entry_open_session()". The commands "OPTEE_MSG_CMD_OPEN_SESSION" and "OPTEE_MSG_CMD_INVOKE_COMMAND" can be executed from the normal world via an OP-TEE SMC. This function is not validating the "num_params" argument, which is only limited to "OPTEE_MSG_MAX_NUM_PARAMS" (127) in the function "get_cmd_buffer()". Therefore, an attacker in the normal world can craft an SMC call that will cause out-of-bounds reading in "cleanup_shm_refs" and potentially freeing of fake-objects in the function "mobj_put()". A normal-world attacker with permission to execute SMC instructions may exploit this flaw. Maintainers believe this problem permits local privilege escalation from the normal world to the secure world. Version 3.19.0 contains a fix for this issue. There are no known workarounds.
Related ResourcesĀ (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.3
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
8.2
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Validation of Array Index
EPSS
Base Score:
0.33