CVE-2022-25332

MEDIUM

Texas Instruments OMAP L138 - Timing Side Channel

Title source: llm
STIX 2.1

Description

The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK).

Scores

CVSS v3 4.4
EPSS 0.0005
EPSS Percentile 15.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-208 CWE-203
Status published
Products (1)
ti/omap_l138_firmware
Published Oct 19, 2023
Tracked Since Feb 18, 2026