4 results (0.008 seconds)

CVSS: 9.6EPSS: 0%CPEs: 4EXPL: 0

A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges. Existe una vulnerabilidad de cadena de formato en el controlador de comandos AT del firmware de la serie Motorola MTM5000 para el comando AT+CTGL. Una cadena controlable por un atacante se maneja incorrectamente, lo que permite un escenario en el que se puede escribir cualquier cosa en cualquier lugar. • https://tetraburst.com • CWE-134: Use of Externally-Controlled Format String •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives. Los firmwares de la serie Motorola MTM5000 carecen de validación de puntero en los argumentos pasados a los módulos Trusted Execution Environment (TEE). • https://tetraburst.com • CWE-763: Release of Invalid Pointer or Reference CWE-822: Untrusted Pointer Dereference •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

Motorola MTM5000 series firmwares lack properly configured memory protection of pages shared between the OMAP-L138 ARM and DSP cores. The SoC provides two memory protection units, MPU1 and MPU2, to enforce the trust boundary between the two cores. Since both units are left unconfigured by the firmwares, an adversary with control over either core can trivially gain code execution on the other, by overwriting code located in shared RAM or DDR2 memory regions. Los firmwares de la serie Motorola MTM5000 carecen de protección de memoria configurada correctamente para las páginas compartidas entre los núcleos OMAP-L138 ARM y DSP. El SoC proporciona dos unidades de protección de memoria, MPU1 y MPU2, para reforzar el límite de confianza entre los dos núcleos. • https://tetraburst.com • CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400. • https://tetraburst.com • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •