There is a chipset I am working with that utilizes an ARM cortex -A7 as the Application processor and an ARM 9 Baseband processor.
I had a major concern since the ARM cortex A7 is utilizing android that the MPU and/or MMU could be subverted to see the whole DRAM which includes the ARM9 side as well. Although the architecture seems to suggest they are utilizing an MPU my concern is that the since the android kernel can be subverted that the MPU could be reconfigured at runtime to remove the restrictions. The concern is not just that the Android kernel of this embedded device could be rooted but that privileged escalation could occur so that a kernel process at runtime could modify the MPU registers (i am guessing). Although these processors do have trustzone however nothing out of the chipset has been created which means that there is no concept of NSbit to delineate between secure vs non secure world.
What kinds of vulnerabilities i could be looking at and if my concerns are legit? lastly, the device has secure boot but its the Applications processor side that I have serious concerns about and of course in runtime. Any help with potential vulnerabilities and/or solutions would be appreciated.