CVE-2024-9413

The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware.
Configurations

Configuration 1 (hide)

cpe:2.3:o:arm:scp_firmware:*:*:*:*:*:*:*:*

History

23 Dec 2025, 16:41

Type Values Removed Values Added
References () https://developer.arm.com/Arm%20Security%20Center/SCP-Firmware%20Vulnerability - () https://developer.arm.com/Arm%20Security%20Center/SCP-Firmware%20Vulnerability - Vendor Advisory
CPE cpe:2.3:o:arm:scp_firmware:*:*:*:*:*:*:*:*
First Time Arm
Arm scp Firmware

27 Nov 2024, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0

15 Nov 2024, 14:00

Type Values Removed Values Added
Summary
  • (es) La función transport_message_handler en las versiones de lanzamiento de firmware SCP 2.11.0 a 2.15.0 no maneja adecuadamente los errores, lo que potencialmente permite que un procesador de aplicaciones (AP) cause un desbordamiento de búfer en el firmware del procesador de control del sistema (SCP).

13 Nov 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-13 17:15

Updated : 2025-12-23 16:41


NVD link : CVE-2024-9413

Mitre link : CVE-2024-9413

CVE.ORG link : CVE-2024-9413


JSON object : View

Products Affected

arm

  • scp_firmware
CWE
CWE-755

Improper Handling of Exceptional Conditions