The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 27 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Arm
Arm scp-firmware
CPEs cpe:2.3:o:arm:scp-firmware:*:*:*:*:*:*:*:*
Vendors & Products Arm
Arm scp-firmware
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 16:30:00 +0000

Type Values Removed Values Added
Description The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware.
Weaknesses CWE-755
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Arm

Published:

Updated: 2024-11-27T15:35:14.153Z

Reserved: 2024-10-01T17:18:17.019Z

Link: CVE-2024-9413

cve-icon Vulnrichment

Updated: 2024-11-27T15:34:07.353Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-13T17:15:12.660

Modified: 2024-11-27T16:15:15.180

Link: CVE-2024-9413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.