An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).
History

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Trustedfirmware
Trustedfirmware trusted Firmware-m
Weaknesses CWE-120
CPEs cpe:2.3:a:trustedfirmware:trusted_firmware-m:*:*:*:*:*:*:*:*
Vendors & Products Trustedfirmware
Trustedfirmware trusted Firmware-m
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 09 Oct 2024 16:45:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-09T00:00:00

Updated: 2024-10-10T17:13:21.838Z

Reserved: 2024-09-06T00:00:00

Link: CVE-2024-45746

cve-icon Vulnrichment

Updated: 2024-10-10T17:10:14.865Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2024-10-09T17:15:19.727

Modified: 2024-10-11T21:36:34.350

Link: CVE-2024-45746

cve-icon Redhat

No data.