The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives.
References
Link | Resource |
---|---|
https://tetraburst.com/ | Technical Description |
Configurations
History
25 Oct 2023, 19:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:* cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:* cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
First Time |
Motorola mtm5500
Motorola mtm5400 Motorola mtm5400 Firmware Motorola Motorola mtm5500 Firmware |
|
References | (MISC) https://tetraburst.com/ - Technical Description | |
CWE | CWE-763 |
19 Oct 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-19 10:15
Updated : 2024-02-28 20:33
NVD link : CVE-2022-26942
Mitre link : CVE-2022-26942
CVE.ORG link : CVE-2022-26942
JSON object : View
Products Affected
motorola
- mtm5500
- mtm5500_firmware
- mtm5400
- mtm5400_firmware