The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware.
References
| Link | Resource |
|---|---|
| https://developer.arm.com/Arm%20Security%20Center/SCP-Firmware%20Vulnerability | Vendor Advisory |
Configurations
History
23 Dec 2025, 16:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://developer.arm.com/Arm%20Security%20Center/SCP-Firmware%20Vulnerability - Vendor Advisory | |
| CPE | cpe:2.3:o:arm:scp_firmware:*:*:*:*:*:*:*:* | |
| First Time |
Arm
Arm scp Firmware |
27 Nov 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.0 |
15 Nov 2024, 14:00
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
13 Nov 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-11-13 17:15
Updated : 2025-12-23 16:41
NVD link : CVE-2024-9413
Mitre link : CVE-2024-9413
CVE.ORG link : CVE-2024-9413
JSON object : View
Products Affected
arm
- scp_firmware
CWE
CWE-755
Improper Handling of Exceptional Conditions
