{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-26942","assignerOrgId":"cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39","state":"PUBLISHED","assignerShortName":"NCSC-NL","dateReserved":"2022-03-11T22:19:24.848Z","datePublished":"2023-10-19T09:35:24.386Z","dateUpdated":"2024-08-03T05:18:38.371Z"},"containers":{"cna":{"affected":[{"vendor":"Motorola","product":"Mobile Radio","versions":[{"version":"MTM5000","status":"affected"}]}],"title":"Multiple missing pointer validation checks in trusted execution module in Motorola MTM5000","descriptions":[{"lang":"en","value":"The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives."}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-822","description":"Untrusted Pointer Dereference","type":"CWE"}]}],"providerMetadata":{"orgId":"cf4a7ff5-dd38-4ede-a530-ffaa7ea59c39","shortName":"NCSC-NL","dateUpdated":"2024-07-15T00:27:54.327Z"},"references":[{"name":"TETRA:BURST","tags":["related"],"url":"https://tetraburst.com/"}],"credits":[{"lang":"en","value":"Midnight Blue","type":"finder"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H"}}]},"adp":[{"affected":[{"vendor":"motorola","product":"mtm5000_series_firmware","cpes":["cpe:2.3:h:motorola:mtm5000_series_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-15T16:23:58.876138Z","id":"CVE-2022-26942","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-15T16:25:32.089Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T05:18:38.371Z"},"title":"CVE Program Container","references":[{"name":"TETRA:BURST","tags":["related","x_transferred"],"url":"https://tetraburst.com/"}]}]}}