Description
An issue has been identified in Arm C1-Pro before r1p2-50eac0, where, under certain conditions, a TLBI+DSB might fail to ensure the completion of memory accesses related to SME.
Published: 2026-03-02
Score: 3.6 Low
EPSS: < 1% Very Low
KEV: No
Impact: Inconsistent SME memory access completion due to TLBI+DSB race condition on Arm C1-Pro
Action: Assess Impact
AI Analysis

Impact

An issue exists in Arm C1-Pro firmware before r1p2‑50eac0. During particular operations, the combination of a TLBI (TLB Invalidate) followed by a DSB (Data Synchronization Barrier) may fail to guarantee that all SME (Scalable Matrix Extension) memory accesses are completed before the next instruction. The failure could leave SME data in an incomplete or inconsistent state, potentially leading to data corruption or unpredictable system behavior. This vulnerability is characterized as a race condition (CWE‑362). The likely attack vector, inferred from the description, could involve manipulating SME access patterns under the compromised timing conditions, but a publicly documented exploit or remote entry point is not provided.

Affected Systems

The Arm C1‑Pro processor, specifically firmware versions prior to r1p2‑50eac0, is affected. No additional product or version details are supplied in the source data.

Risk and Exploitability

The CVSS score of 3.6 indicates limited impact, and the EPSS score of less than 1% reflects a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread attacks. The most probable exploitation scenario would require very specific hardware timing conditions and likely an insider or privileged attacker manipulating SME memory accesses, which reduces its overall risk to typical operational environments.

Generated by OpenCVE AI on April 16, 2026 at 14:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update for Arm C1‑Pro, which includes a fix for the TLBI+DSB race condition affecting SME memory accesses.
  • Review and, if possible, redesign SME‑related code paths to enforce explicit memory barriers and ensure correct ordering of memory operations.
  • Implement monitoring for abnormal SME activity or data corruption, and prepare a contingency plan to reboot or reset the processor if anomalies are detected.

Generated by OpenCVE AI on April 16, 2026 at 14:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Arm c1-pro Firmware
CPEs cpe:2.3:h:arm:c1-pro:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:c1-pro_firmware:*:*:*:*:*:*:*:*
Vendors & Products Arm c1-pro Firmware

Thu, 16 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Title Potential SME Memory Access Issue due to TLBI+DSB Failure on Arm C1-Pro

Wed, 04 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Arm
Arm c1-pro
Vendors & Products Arm
Arm c1-pro

Mon, 02 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.6, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description An issue has been identified in Arm C1-Pro before r1p2-50eac0, where, under certain conditions, a TLBI+DSB might fail to ensure the completion of memory accesses related to SME.
Weaknesses CWE-362
References

Subscriptions

Arm C1-pro C1-pro Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: Arm

Published:

Updated: 2026-03-02T16:16:02.649Z

Reserved: 2026-01-15T15:26:49.754Z

Link: CVE-2026-0995

cve-icon Vulnrichment

Updated: 2026-03-02T16:15:31.160Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T15:16:31.910

Modified: 2026-04-20T12:53:59.197

Link: CVE-2026-0995

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:45:25Z

Weaknesses