Replay Attack Affecting op-tee/optee_os package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-OPTEEOPTEEOS-2366022
  • published26 Jan 2022
  • disclosed18 Nov 2020
  • creditUnknown

Introduced: 18 Nov 2020

CVE-2020-13799  (opens in a new tab)
CWE-294  (opens in a new tab)

How to fix?

There is no fixed version for op-tee/optee_os.

Overview

Affected versions of this package are vulnerable to Replay Attack. Western Digital has identified a security vulnerability in the Replay Protected Memory Block (RPMB) protocol as specified in multiple standards for storage device interfaces, including all versions of eMMC, UFS, and NVMe. The RPMB protocol is specified by industry standards bodies and is implemented by storage devices from multiple vendors to assist host systems in securing trusted firmware. Several scenarios have been identified in which the RPMB state may be affected by an attacker without the knowledge of the trusted component that uses the RPMB feature.

References

CVSS Scores

version 3.1