Severity
6.8MEDIUM
EPSS
0.1%
top 67.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 22
Latest updateMay 24

Description

The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages15 packages

🔴Vulnerability Details

2
GHSA
GHSA-vh28-q6j2-63w7: The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitr2022-05-24
CVEList
CVE-2021-33478: The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitr2021-07-22

📋Vendor Advisories

1
Cisco
Broadcom MediaxChange Vulnerability Affecting Cisco Products: July 20212021-07-07
CVE-2021-33478 (MEDIUM CVSS 6.8) | The TrustZone implementation in cer | cvebase.io