In ARM Trusted Firmware 1.3, RO memory is always executable at AArch64 Secure EL1, allowing attackers to bypass the MT_EXECUTE_NEVER protection mechanism. This issue occurs because of inconsistency in the number of execute-never bits (one bit versus two bits).
References
Link | Resource |
---|---|
https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-3 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-06-07 15:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-7563
Mitre link : CVE-2017-7563
CVE.ORG link : CVE-2017-7563
JSON object : View
Products Affected
arm
- arm_trusted_firmware
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource