SecMateSECMATE-2025-0019
VendorRenesas
ProductFSP
ReportedDecember 8, 2025
AcknowledgedDecember 8, 2025
PublishedFebruary 10, 2026
AdvisoryIssue #423
In SCE Protected Mode (r_sce_protected), the R_SCE_RSASSA_PKCSxxxx_SignatureVerify() APIs can trigger a pointer underflow when the provided signature is larger than the expected size (signature->data_length > HW_SCE_RSA_xxxx_DATA_BYTE_SIZE, where xxxx is 1024, 2048, 3072, or 4096). The underflow occurs because the API copies signature->data_length bytes into a fixed-size buffer using an offset calculated as ptr_data = HW_SCE_RSA_xxxx_DATA_BYTE_SIZE - signature->data_length. If signature->data_length exceeds the buffer size, ptr_data becomes negative, leading to out-of-bounds writes and potential data corruption.