SWRA746 June 2022
Publication date: June 8, 2022
Texas Instruments provides the TI 15.4-Stack implementing the IEEE 802.15.4e and 802.15.4g specifications. This stack is provided in several configurations, including an SM configuration. The SM configuration includes a “Secure Manager” which provides device commissioning services. The device commissioning service provided in this configuration is a custom service provided by Texas Instruments and it is not part of the IEEE standards. The use of this service is demonstrated in the Secure Commissioning example included with the TI 15.4-Stack.
The TI 15.4-Stack with Secure Manager did not include logic to check the frame counter of incoming packets as described in step h of section 9.2.4 of the IEEE 802.15.4-2020 standard. This allows attackers to capture network packets and resend those packets. The receiving device will process the packet as if it was sent by the original source of the packet.
CVSS base score: 4.3
CVSS vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected products and versions
|Part||SDK||SDK Version||TI-15.4-Stack Version|
|CC2652RB, CC1311P3, CC1311R3, CC1312R7, CC1312R, CC1352P, CC1352P7, CC1352R, CC2651R3, CC2652P, CC2652P7, CC2652R, CC2652R7, CC2652PSIP, CC2652RSIP||SimpleLink™ CC13xx and CC26xx software development kit (SDK)||5.40.00.40 and earlier||4.40 and earlier|
Because the impact is constrained to only the SM configuration, devices with an SDK that does not include the SM configuration are not impacted. Thus, the CC1310 and CC1350 devices are not impacted.
To determine if your product is impacted, check if the SM configuration of the library is built into your product. The SM configuration’s library is named maclib_sm_[device].a, where [device] is a SimpleLink device family designation. For example: maclib_sm_cc13x2.a or maclib_sm_cc26x1_2_4g.a. You may also check if your product’s development team started with the Secure Commissioning example project included in the SDK.
Potentially impacted features
The failure to correctly validate the frame counter may allow an attacker to replay network packets. The vulnerability does not allow an attacker to decrypt or modify packets.
Customers are encouraged to upgrade to the latest SDK for their 802.15.4 product. After obtaining the latest SDK, customers should confirm a TI 15.4-Stack version of 5.10 or greater and upgrade their device to use the new version of the stack.
The following SDK releases address these vulnerabilities:
|SDK||First SDK version with mitigations||First TI-15.4-Stack version with mitigations|
|SimpleLink™ CC13xx and CC26xx software development kit (SDK)||6.10||5.10.00|
In addition, the MAC Comm Status Indication Callback may now receive an ApiMac_commStatusReason_rxSecure reason code when a frame is received with an unexpected frame counter. Customers may wish to update their callback’s processing to handle this reason code. For example, customers may wish to log the occurrences of such an event. However, handling this new reason code is not required to achieve security or correct device operation.
We would like to thank Ryan Walker of TallyFi for reporting this vulnerability to the TI Product Security Incident Response Team (PSIRT).
IEEE Std 802.15.4-2020, IEEE Standard for Low-Rate Wireless Networks, July 2020.