In the CC254x OAD solution:
The signature verification implementation uses a non-constant time memcmp function, which potentially enables the MAC check to be vulnerable to a timing attack.
TI-PSIRT-2019-060032
8.1
The potential vulnerability can impact the OAD image signing and encryption functionality.
The following SDK release addresses the potential vulnerability with a constant time memcmp function in aesSignature():
Customers of affected products should apply this service-pack and consider further system-level security measures as appropriate. Customers are solely responsible for the security of their products and are encouraged to assess the possible risk of any potential security vulnerability.
We would like to thank researchers from COSIC, KU Leuven and imec for reporting this potential vulnerability to the TI Product Security Incident Response Team (PSIRT) and working toward a coordinated report.