Bypass of Stage-2 translation and/or GPT protection via Hardware Page Aggregation and Stage-1 and/or Stage-2 translation on select processors
CVE-2024-5660
Key Information:
- Vendor
- Arm
- Vendor
- CVE Published:
- 10 December 2024
What is CVE-2024-5660?
CVE-2024-5660 is a vulnerability affecting specific Arm processors, including various models within the Cortex and Neoverse families. This issue arises from the use of Hardware Page Aggregation (HPA) in conjunction with Stage-1 and/or Stage-2 translation processes. The vulnerability may allow an attacker to bypass critical protections, undermining the integrity and security of systems that rely on these processors. Organizations using these affected Arm processors could be at risk of exploitation, which could lead to unauthorized access to sensitive information or system instability.
Technical Details
The vulnerability arises due to the interaction of Hardware Page Aggregation (HPA) with translation mechanisms on a range of Arm processors, including Cortex-A77, Cortex-A78, Cortex-A710, and various Neoverse models. It specifically allows a potential bypass of Stage-2 translation and/or Generic Permission Table (GPT) protections, which are integral to secure memory access and isolation processes within the architecture. This could lead to improper handling of data, creating a pathway for attackers to exploit the weaknesses inherent in these translation processes.
Potential Impact of CVE-2024-5660
-
Unauthorized Data Access: The bypass of Stage-2 translation can enable attackers to access restricted memory sections, posing a risk of data theft and unauthorized information disclosure.
-
System Compromise: By circumventing critical protection mechanisms, an attacker may gain the ability to manipulate system functionality, leading to potential control over affected devices or networks.
-
Increased Malware Risk: The existence of this vulnerability could facilitate the deployment of malicious software, increasing the susceptibility of systems to ransomware attacks and other cyber threats that exploit these weaknesses.
Affected Version(s)
Cortex-78C 0
Cortex-A710 0
Cortex-A77 0
References
Timeline
Vulnerability published
Vulnerability Reserved