The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware.
Metrics
Affected Vendors & Products
References
History
Wed, 27 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Arm
Arm scp-firmware |
|
CPEs | cpe:2.3:o:arm:scp-firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Arm
Arm scp-firmware |
|
Metrics |
cvssV3_1
|
Wed, 13 Nov 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware. | |
Weaknesses | CWE-755 | |
References |
|

Status: PUBLISHED
Assigner: Arm
Published:
Updated: 2024-11-27T15:35:14.153Z
Reserved: 2024-10-01T17:18:17.019Z
Link: CVE-2024-9413

Updated: 2024-11-27T15:34:07.353Z

Status : Awaiting Analysis
Published: 2024-11-13T17:15:12.660
Modified: 2024-11-27T16:15:15.180
Link: CVE-2024-9413

No data.