ARM TFM Input Validation Flaw May Enable Privileged RD and DoS
CVE-2023-31339 Published on August 13, 2024

Improper input validation in ARM® Trusted Firmware used in AMDs Zynq UltraScale+) MPSoC/RFSoC may allow a privileged attacker to perform out of bound reads, potentially resulting in data leakage and denial of service.

NVD

Vulnerability Analysis

CVE-2023-31339 can be exploited with local system access, requires user interaction and user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity, and a high impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2023-31339

stack.watch emails you whenever new vulnerabilities are published in AMD Trusted Firmware A or Arm Trusted Firmware A. Just hit a watch button to start following.

 
 

Affected Versions

AMD Zynq™ UltraScale+™ MPSoC/RFSoC:

Exploit Probability

EPSS
0.10%
Percentile
26.92%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.