CVE-2023-40271

In Trusted Firmware-M through TF-Mv1.8.0, for platforms that integrate the CryptoCell accelerator, when the CryptoCell PSA Driver software Interface is selected, and the Authenticated Encryption with Associated Data Chacha20-Poly1305 algorithm is used, with the single-part verification function (defined during the build-time configuration phase) implemented with a dedicated function (i.e., not relying on usage of multipart functions), the buffer comparison during the verification of the authentication tag does not happen on the full 16 bytes but just on the first 4 bytes, thus leading to the possibility that unauthenticated payloads might be identified as authentic. This affects TF-Mv1.6.0, TF-Mv1.6.1, TF-Mv1.7.0, and TF-Mv1.8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arm:trusted_firmware-m:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:arm:trusted_firmware-m:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:arm:trusted_firmware-m:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:arm:trusted_firmware-m:1.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:19

Type Values Removed Values Added
References () https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/docs/security/security_advisories/cc3xx_partial_tag_compare_on_chacha20_poly1305.rst - Exploit, Mitigation, Technical Description, Vendor Advisory () https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/docs/security/security_advisories/cc3xx_partial_tag_compare_on_chacha20_poly1305.rst - Exploit, Mitigation, Technical Description, Vendor Advisory
References () https://tf-m-user-guide.trustedfirmware.org/releases/index.html - Release Notes () https://tf-m-user-guide.trustedfirmware.org/releases/index.html - Release Notes

13 Sep 2023, 02:27

Type Values Removed Values Added
References (MISC) https://tf-m-user-guide.trustedfirmware.org/releases/index.html - (MISC) https://tf-m-user-guide.trustedfirmware.org/releases/index.html - Release Notes
References (MISC) https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/docs/security/security_advisories/cc3xx_partial_tag_compare_on_chacha20_poly1305.rst - (MISC) https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/docs/security/security_advisories/cc3xx_partial_tag_compare_on_chacha20_poly1305.rst - Exploit, Mitigation, Technical Description, Vendor Advisory
First Time Arm
Arm trusted Firmware-m
CWE CWE-697
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:arm:trusted_firmware-m:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:arm:trusted_firmware-m:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:arm:trusted_firmware-m:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:arm:trusted_firmware-m:1.7.0:*:*:*:*:*:*:*

08 Sep 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-08 02:15

Updated : 2024-11-21 08:19


NVD link : CVE-2023-40271

Mitre link : CVE-2023-40271

CVE.ORG link : CVE-2023-40271


JSON object : View

Products Affected

arm

  • trusted_firmware-m
CWE
CWE-697

Incorrect Comparison