CVE-2025-46733Improper Handling of Exceptional Conditions in Optee-os

Severity
7.9HIGHNVD
EPSS
0.0%
top 91.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 4

Description

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In version 4.5.0, using a specially crafted tee-supplicant binary running in REE userspace, an attacker can trigger a panic in a TA that uses the libutee Secure Storage API. Many functions in libutee, specifically those which make up the Secure Storage API, will panic if a system call returns an unexpected return code. This behavior is

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:LExploitability: 2.0 | Impact: 5.3

🔴Vulnerability Details

1
OSV
CVE-2025-46733: OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone2025-07-04

📋Vendor Advisories

2
Debian
CVE-2025-46733: optee-os - OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-s...2025
Microsoft
btrfs: fix qgroup reserve leaks in cow_file_range2024-09-10