In the CC254x OAD solution:
AES-CTR cryptographic function is used in both the encryption functions above. The cryptographic function implementation resets the AES-CTR counter to its initial value every 4 AES blocks (64-bytes), resulting in keystream repetition every 64-bytes. This vulnerability can potentially be used to decrypt a firmware image without having to recover the AES key.
TI-PSIRT-2019-060025
8.1
CC2540/CC2541 BLE-Stack SDK v1.5.0 and earlier
The potential vulnerability can impact the OAD image encryption functionality.
The following service-pack release addresses the potential vulnerability:
Customers of affected products should apply this service-pack and consider further system-level security measures as appropriate. Customers are solely responsible for the security of their products and are encouraged to assess the possible risk of any potential security vulnerability.
We would like to thank researchers from COSIC, KU Leuven and imec for reporting this potential vulnerability to the TI Product Security Incident Response Team (PSIRT) and working toward a coordinated report.
Texas Instruments, Bluetooth Low Energy software stack
DATE | REVISION | NOTES |
---|---|---|
February 2020 | * | Initial Release |