Description
An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-50310 | An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections. |
References
History
Thu, 17 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-17T14:02:55.292Z
Reserved: 2022-12-19T00:00:00.000Z
Link: CVE-2022-47549
Updated: 2024-08-03T14:55:08.392Z
Status : Modified
Published: 2022-12-19T09:15:09.637
Modified: 2025-04-17T14:15:24.600
Link: CVE-2022-47549
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD