The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK).
References
Link Resource
https://tetraburst.com/ Technical Description
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: NCSC-NL

Published: 2023-10-19T09:36:24.924Z

Updated: 2023-10-19T09:50:05.515Z

Reserved: 2022-02-18T17:18:33.455Z


Link: CVE-2022-25332

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-10-19T10:15:09.683

Modified: 2024-02-16T20:30:02.370


Link: CVE-2022-25332

JSON object: View

cve-icon Redhat Information

No data.