An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) prior to 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linaro op-tee |