The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives.

Project Subscriptions

Vendors Products
Motorola Subscribe
Mtm5400 Subscribe
Mtm5400 Firmware Subscribe
Mtm5500 Subscribe
Mtm5500 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-31487 The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://tetraburst.com/ cve-icon cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published:

Updated: 2024-08-03T05:18:38.371Z

Reserved: 2022-03-11T22:19:24.848Z

Link: CVE-2022-26942

cve-icon Vulnrichment

Updated: 2024-08-03T05:18:38.371Z

cve-icon NVD

Status : Modified

Published: 2023-10-19T10:15:09.913

Modified: 2024-11-21T06:54:50.667

Link: CVE-2022-26942

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses