Learn about CVE-2021-34389 impacting NVIDIA Jetson, TX2, AGX Xavier series, allowing memory access by local users. Get mitigation steps and update recommendations.
Trusty contains a vulnerability in NVIDIA OTE protocol message parsing code, allowing a local user to access memory from the heap in the TrustZone, potentially leading to information disclosure.
Understanding CVE-2021-34389
This CVE impacts NVIDIA Jetson, TX2 series, TX2 NX, AGX Xavier series, and Xavier NX devices due to a vulnerability within the Trusty platform's NVIDIA OTE protocol message parsing code.
What is CVE-2021-34389?
Trusty is affected by a vulnerability in NVIDIA OTE protocol message parsing code, which could be exploited by a local user through a malicious client to access memory from the heap in the TrustZone, potentially resulting in information disclosure.
The Impact of CVE-2021-34389
The vulnerability poses a medium risk with a CVSS base score of 5. It has a high impact on confidentiality, allowing unauthorized disclosure of sensitive information stored in the TrustZone memory.
Technical Details of CVE-2021-34389
The CVE affects all Jetson Linux versions prior to r32.5.1. Here are the technical details:
Vulnerability Description
An incorrect bounds check in the NVIDIA OTE protocol message parsing code can be exploited by a local user to access heap memory in TrustZone.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by a local user through a malicious client, leveraging the incorrect bounds check to access heap memory, potentially leading to information disclosure.
Mitigation and Prevention
To mitigate the risks associated with CVE-2021-34389, consider the following:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Keep abreast of security advisories from NVIDIA to stay informed about patches and updates related to Trusty and the NVIDIA OTE protocol.