Buffer Overflow Risk in SCP-Firmware by ARM
CVE-2024-9413
Currently unrated
Summary
The transport_message_handler function within the SCP-Firmware versions 2.11.0 to 2.15.0 fails to manage errors effectively, creating a scenario where an Application Processor (AP) may exploit this inadequacy to induce a buffer overflow in the System Control Processor (SCP) firmware. This vulnerability raises significant concerns regarding the overall security posture of systems relying on affected versions, placing sensitive data and device functionality at risk. Implementing robust error handling measures and updating to the latest firmware versions is essential for safeguarding against potential exploitation.
References
Timeline
Vulnerability published