11.1.6. Threat Model for TF-A with PSA FWU or TBBR FWU support
11.1.6.1. Introduction
This document provides a threat model of TF-A firmware for platforms with the feature PSA firmware update or TBBR firmware update or both enabled. To understand the design of the firmware update refer Firmware Update (FWU).
Although it is a separate document, it references the Generic Threat Model in a number of places, as some of the contents are applicable to this threat model.
11.1.6.2. Target of Evaluation
In this threat model, the target of evaluation is the Trusted Firmware for A-class Processors (TF-A) when PSA FWU support is enabled or TBBR FWU mode is enabled. This includes the boot ROM (BL1), the trusted boot firmware (BL2).
11.1.6.3. Threat Assessment
For this section, please reference the Threat Assessment under the Generic Threat Model. Here only the differences are highlighted.
11.1.6.4. PSA FWU
11.1.6.4.1. Threats to be Mitigated by the Boot Firmware
The following table analyses the Threats to be Mitigated by the Boot Firmware in the context of this threat model. Only additional details are pointed out.
ID |
Applicable? |
Comments |
---|---|---|
01 |
Yes |
Attacker can use arbitrary images to update the
system.
|
02 |
Yes |
Attacker tries to update the system with the
vulnerable/older firmware.
|
03 |
Yes |
|
04 |
Yes |
11.1.6.4.2. Threats to be mitigated by platform design
PSA FWU is driven by metadata stored in non-volatile storage. This metadata is not cryptographically signed. Also, depending on the hardware design, it may be stored in untrusted storage, which makes it possible for software outside of TF-A security boundary or for a physical attacker to modify it in order to change the behaviour of the FWU process.
Below we provide some possible FWU metadata corruption scenarios:
The FWU metadata includes the firmware bank for booting; the attacker tries to modify it to prevent the execution of the updated firmware.
The FWU metadata features a field indicating the firmware’s status, either in trial run or accepted run. The attacker tries to manipulate this field, ensuring the updated firmware consistently runs in trial mode, with the intention of preventing the anti-rollback update.
By design, no software mitigations exist to prevent this. The safeguarding of FWU metadata relies on the platform’s hardware design to mitigate potential attacks on it, if this is a concern in the platform’s threat model. For example, FWU metadata may be stored in secure storage under exclusive access from secure software, protecting it from physical, unauthenticated accesses and from non-secure software accesses.
11.1.6.5. TBBR FWU - Firmware Recovery
11.1.6.5.1. Threats to be Mitigated by the Boot Firmware
The following table analyses the Threats to be Mitigated by the Boot Firmware in the context of this threat model. Only additional details are pointed out.
ID |
Applicable? |
Comments |
---|---|---|
01 |
Yes |
Attacker can use arbitrary images to recover the
system.
|
02 |
Yes |
Attacker tries to recover the system with the
vulnerable/older firmware.
|
03 |
Yes |
|
04 |
Yes |
Copyright (c) 2024, Arm Limited. All rights reserved.