Описание
In ARM Trusted Firmware 1.3, RO memory is always executable at AArch64 Secure EL1, allowing attackers to bypass the MT_EXECUTE_NEVER protection mechanism. This issue occurs because of inconsistency in the number of execute-never bits (one bit versus two bits).
Уязвимые конфигурации
Конфигурация 1Версия до 1.3 (включая)
cpe:2.3:a:arm:arm_trusted_firmware:*:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00345
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-732
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
In ARM Trusted Firmware 1.3, RO memory is always executable at AArch64 Secure EL1, allowing attackers to bypass the MT_EXECUTE_NEVER protection mechanism. This issue occurs because of inconsistency in the number of execute-never bits (one bit versus two bits).
EPSS
Процентиль: 56%
0.00345
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-732