Vulnerability Name:

CVE-2021-43619 (CCN-220851)

Assigned:2021-11-15
Published:2022-02-11
Updated:2022-03-09
Summary:Trusted Firmware M 1.4.x through 1.4.1 has a buffer overflow issue in the Firmware Update partition. In the IPC model, a psa_fwu_write caller from SPE or NSPE can overwrite stack memory locations.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-120
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-43619

Source: MISC
Type: Vendor Advisory
https://developer.arm.com/support/arm-security-updates

Source: XF
Type: UNKNOWN
trustedfirmware-cve202143619-bo(220851)

Source: MISC
Type: Patch, Third Party Advisory
https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/

Source: CCN
Type: Advisory TFMV-5
psa_fwu_write() may cause buffer overflow in SPE

Source: CONFIRM
Type: Exploit, Patch, Third Party Advisory
https://tf-m-user-guide.trustedfirmware.org/docs/security/security_advisories/fwu_write_vulnerability.html

Source: MISC
Type: Product
https://www.trustedfirmware.org

Vulnerable Configuration:Configuration 1:
  • cpe:/a:arm:trusted_firmware-m:1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:arm:trusted_firmware-m:1.4.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    arm trusted firmware-m 1.4.0
    arm trusted firmware-m 1.4.1