4 results (0.004 seconds)

CVSS: 9.6EPSS: 0%CPEs: 4EXPL: 0

19 Oct 2023 — A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges. Existe una vulnerabilidad de cadena de formato en el controlador de comandos AT del firmware de la serie Motorola MTM5000 para el comando AT+CTGL. Una cadena controlable por... • https://tetraburst.com • CWE-134: Use of Externally-Controlled Format String •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

19 Oct 2023 — The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptogr... • https://tetraburst.com • CWE-763: Release of Invalid Pointer or Reference CWE-822: Untrusted Pointer Dereference •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

19 Oct 2023 — Motorola MTM5000 series firmwares lack properly configured memory protection of pages shared between the OMAP-L138 ARM and DSP cores. The SoC provides two memory protection units, MPU1 and MPU2, to enforce the trust boundary between the two cores. Since both units are left unconfigured by the firmwares, an adversary with control over either core can trivially gain code execution on the other, by overwriting code located in shared RAM or DDR2 memory regions. Los firmwares de la serie Motorola MTM5000 carecen... • https://tetraburst.com • CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

19 Oct 2023 — The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the e... • https://tetraburst.com • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •