Логотип exploitDog
bind:CVE-2024-45746
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-45746

Количество 3

Количество 3

nvd логотип

CVE-2024-45746

больше 1 года назад

An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2024-45746

больше 1 года назад

An issue was discovered in Trusted Firmware-M through 2.1.0. User prov ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-jwrv-68vx-g565

больше 1 года назад

An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-45746

An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).

CVSS3: 9.8
7%
Низкий
больше 1 года назад
debian логотип
CVE-2024-45746

An issue was discovered in Trusted Firmware-M through 2.1.0. User prov ...

CVSS3: 9.8
7%
Низкий
больше 1 года назад
github логотип
GHSA-jwrv-68vx-g565

An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).

CVSS3: 9.8
7%
Низкий
больше 1 года назад

Уязвимостей на страницу