Huawei TrustZone TCIS Vulnerability
Heap Pointer Leak in 
            
    This advisory contains information about the following vulnerabilities:
    
- HWPSIRT-2021-41488 Heap Pointer Leak in AuthAckSlave
Heap Pointer Leak in AuthAckSlave¶
The AuthAckSlave function contains a call to the SLog function that leaks a pointer to a heap allocated buffer. If GetAuthSession failed, AuthAckSlave will print the session pointer into the logs (there are accessible using logcat).
int AuthAckSlave(parcel_t *parcel_in, parcel_t *parcel_out) {
    // ...
    session = 0;
    create_tlv_cmd9_in(&tlv_in, 0xFFFF);
    create_tlv_cmd9_out(&tlv_out, 0xFFFF);
    decode_reg_tlv(&tlv_in.header.header, parcel_in);
    // ...
    ret = GetAuthSession(&tlv_in.field_28.value, &session);
    if (ret) {
        SLog("%s: GetAuthSession ret is %x and session data p is %x!!\n\n", "[Error]", ret, session);
    }
    // ...
}
Affected Devices¶
We have verified that the vulnerability impacted the following device(s):
- Kirin 990: P40 Pro (ELS)
Please note that other models might have been affected.
Patch¶
| Name | Severity | CVE | Patch | 
|---|---|---|---|
| Heap Pointer Leak in AuthAckSlave | Low | N/A | Fixed | 
Timeline¶
- Dec. 21, 2021 - A vulnerability report is sent to Huawei PSIRT.
- Jan. 12, 2022 - Huawei PSIRT acknowledges the vulnerability report.
- From Nov. 30, 2022 to Jul, 19 2023 - We exchange regularly about the release of our advisories.
Copyright © Impalabs 2021-2023