Skip to main content
Disclosures

Renesas · FSP

GCM Tag Length Stack Buffer Overflow in MbedTLS

SecMateSECMATE-2025-0022
VendorRenesas
ProductFSP
ReportedDecember 8, 2025
AcknowledgedDecember 8, 2025
PublishedFebruary 10, 2026
AdvisoryIssue #428

FSP versions prior to v6.3.0 contain a stack buffer overflow vulnerability in the GCM alt process (rm_psa_crypto/gcm_alt_process.c). The sce_gcm_crypt_and_tag function copies tag_len bytes from a caller-supplied tag into a fixed 16-byte local buffer padded_tag without validating the tag length. When tag_len > 16, this causes stack buffer overflow of the 16-byte padded_tag buffer, potential local memory corruption leading to arbitrary code execution or device crash, and stack corruption that may enable more severe exploits depending on context.

What's hidden in yours?

Find out