Authentication Vulnerability when extending the Root of Trust

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Authentication Vulnerability when extending the Root of Trust

Authentication Vulnerability when extending the Root of Trust

Overview

The High Assurance Boot (HAB), provides an option to extend the root of trust beyond the initial primary boot image. An Application Programming Interface (API) is provided by the on-chip ROM that allows the use of the HAB library to extend the root of trust and authenticate additional software images.

A vulnerability has been identified that impacts the use of this HAB library ROM API to extend the root of trust and authenticate additional software images. This vulnerability can be used to bypass signature checks and allow the execution of an un-authenticated software image.

To prevent this vulnerability, simple checks in the customer application software are required, prior to calling the HAB library ROM API to authenticate additional software images. Impacted customers using the NXP BSP Reference software can apply two U-Boot software patches to address this vulnerability completely.

Impact

  • Only impacts devices configured in a security-enabled mode (SEC_CONFIG[1] eFUSE is programmed)
  • Designs that are not using security-enabled mode are hence not impacted.
  • All HAB versions up to 4.3.6 are impacted, only when using the HAB library ROM API to extend the root of trust and authenticate additional software images (e.g. Kernel)
  • Customer applications that are not using this optional feature of the HAB library ROM API to authenticate additional software images are hence not impacted.
  • This vulnerability does not impact the primary boot image
  • Applications extending the root of trust that expose methods (local or remote) to update the product software image may be impacted
  • Designs that prevent physical access to the device and do not utilize Over the Air (OTA) updates are not impacted.

Software Mitigation

Two U-Boot software patches to address this vulnerability were incorporated in the L4.9.88_2.0.0-ga software release. All subsequent NXP BSP GA software releases incorporate these checks in the U-Boot bootloader by default.

Hence the mitigations are already incorporated in the latest NXP BSP releases and no further action is required.

MLK-16703: HAB: Check if CSF is valid before authenticating image

MLK-14945: HAB: Check if IVT valid before authenticating image

Customers using U-Boot releases between L4.1.15_1.0.0-ga and L4.9.11_1.0.0-ga can refer to the following Yocto Patch releases.

imx_v2017.03_4.9.11_1.0.0_ga

imx_v2016.03_4.1.15_2.0.0_ga

imx_v2015.04_4.1.15_1.0.0_ga

For customers using older U-Boot Software releases patches are available on request.

Code signing Tool

Customers are recommended to use the latest version of the i.MX High Assurance Boot Reference Code Signing Tool - (CST) that has removed unsupported commands.

Additional Information

  • For more details, a Security Bulletin is available on the i.MX Security Portal for customers. For access or further information, please contact your NXP Field Support Representative or enter a support request. 

_________________________________________________________________________

Please note this information is preliminary and subject to change. To the best of NXP's knowledge, the information contained herein is accurate and reliable as of the date of publication; however, NXP does not assume any liability for the accuracy and completeness of the information.

100% helpful (1/1)
Version history
Last update:
‎08-26-2022 03:27 PM
Updated by: