Vulnerability Description
Trusted Firmware-A through 2.8 has an out-of-bounds read in the X.509 parser for parsing boot certificates. This affects downstream use of get_ext and auth_nvctr. Attackers might be able to trigger dangerous read side effects or obtain sensitive information about microarchitectural state.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arm | Trusted Firmware-A | >= 1.2, <= 2.8 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2023/01/16/8Mailing ListPatchThird Party Advisory
- https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-PatchVendor Advisory
- https://www.trustedfirmware.org/news/Vendor Advisory
- http://www.openwall.com/lists/oss-security/2023/01/16/8Mailing ListPatchThird Party Advisory
- https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-PatchVendor Advisory
- https://www.trustedfirmware.org/news/Vendor Advisory
FAQ
What is CVE-2022-47630?
CVE-2022-47630 is a vulnerability with a CVSS score of 7.4 (HIGH). Trusted Firmware-A through 2.8 has an out-of-bounds read in the X.509 parser for parsing boot certificates. This affects downstream use of get_ext and auth_nvctr. Attackers might be able to trigger da...
How severe is CVE-2022-47630?
CVE-2022-47630 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-47630?
Check the references section above for vendor advisories and patch information. Affected products include: Arm Trusted Firmware-A.