In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.
References
Link | Resource |
---|---|
https://developer.arm.com/support/arm-security-updates/armv8-m-stack-sealing | Vendor Advisory |
https://developer.arm.com/support/arm-security-updates/armv8-m-stack-sealing | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://developer.arm.com/support/arm-security-updates/armv8-m-stack-sealingĀ - Vendor Advisory |
Information
Published : 2020-11-12 19:15
Updated : 2024-11-21 05:07
NVD link : CVE-2020-16273
Mitre link : CVE-2020-16273
CVE.ORG link : CVE-2020-16273
JSON object : View
Products Affected
arm
- armv8-m_firmware
- armv8-m
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)