Buffer Overflow Risk in SCP-Firmware by ARM
CVE-2024-9413

Currently unrated

Key Information:

Vendor
ARM
Vendor
CVE Published:
13 November 2024

Summary

The transport_message_handler function within the SCP-Firmware versions 2.11.0 to 2.15.0 fails to manage errors effectively, creating a scenario where an Application Processor (AP) may exploit this inadequacy to induce a buffer overflow in the System Control Processor (SCP) firmware. This vulnerability raises significant concerns regarding the overall security posture of systems relying on affected versions, placing sensitive data and device functionality at risk. Implementing robust error handling measures and updating to the latest firmware versions is essential for safeguarding against potential exploitation.

References

Timeline

  • Vulnerability published

.