CVE-2022-26942

The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives.
References
Link Resource
https://tetraburst.com/ Technical Description
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-10-19 10:15

Updated : 2023-11-07 03:45


NVD link : CVE-2022-26942

Mitre link : CVE-2022-26942

CVE.ORG link : CVE-2022-26942


JSON object : View

Products Affected

motorola

  • mtm5500_firmware
  • mtm5400
  • mtm5500
  • mtm5400_firmware
CWE
CWE-763

Release of Invalid Pointer or Reference

CWE-822

Untrusted Pointer Dereference