SWRA694 February 2020 CC2540 , CC2541
TI-PSIRT-2019-060032
8.1
The potential vulnerability can impact the OAD image signing and encryption functionality.
The following SDK release addresses the potential vulnerability with a constant time memcmp function in aesSignature():
Customers of affected products should apply this service-pack and consider further system-level security measures as appropriate. Customers are solely responsible for the security of their products and are encouraged to assess the possible risk of any potential security vulnerability.
We would like to thank researchers from COSIC, KU Leuven and imec for reporting this potential vulnerability to the TI Product Security Incident Response Team (PSIRT) and working toward a coordinated report.