CVE-2020-16273

In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:arm:armv8-m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:arm:armv8-m:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-11-12 19:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-16273

Mitre link : CVE-2020-16273

CVE.ORG link : CVE-2020-16273


JSON object : View

Products Affected

arm

  • armv8-m
  • armv8-m_firmware
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)