7.5

CVE-2022-48251

Exploit

The AES instructions on the ARMv8 platform do not have an algorithm that is "intrinsically resistant" to side-channel attacks. NOTE: the vendor reportedly offers the position "while power side channel attacks ... are possible, they are not directly caused by or related to the Arm architecture."

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArmCortex-a53 Firmware Version-
   ArmCortex-a53 Version-
ArmCortex-a55 Firmware Version-
   ArmCortex-a55 Version-
ArmCortex-a57 Firmware Version-
   ArmCortex-a57 Version-
ArmCortex-a72 Firmware Version-
   ArmCortex-a72 Version-
ArmCortex-a73 Firmware Version-
   ArmCortex-a73 Version-
ArmCortex-a75 Firmware Version-
   ArmCortex-a75 Version-
ArmCortex-a76 Firmware Version-
   ArmCortex-a76 Version-
ArmCortex-a76ae Firmware Version-
   ArmCortex-a76ae Version-
ArmCortex-a77 Firmware Version-
   ArmCortex-a77 Version-
ArmCortex-a78 Firmware Version-
   ArmCortex-a78 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.14% 0.353
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-203 Observable Discrepancy

The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.