Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 23 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arm scp Firmware
|
|
| CPEs | cpe:2.3:o:arm:scp_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Arm scp Firmware
|
Wed, 27 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arm
Arm scp-firmware |
|
| CPEs | cpe:2.3:o:arm:scp-firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Arm
Arm scp-firmware |
|
| Metrics |
cvssV3_1
|
Wed, 13 Nov 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The transport_message_handler function in SCP-Firmware release versions 2.11.0-2.15.0 does not properly handle errors, potentially allowing an Application Processor (AP) to cause a buffer overflow in System Control Processor (SCP) firmware. | |
| Weaknesses | CWE-755 | |
| References |
|
Status: PUBLISHED
Assigner: Arm
Published:
Updated: 2024-11-27T15:35:14.153Z
Reserved: 2024-10-01T17:18:17.019Z
Link: CVE-2024-9413
Updated: 2024-11-27T15:34:07.353Z
Status : Analyzed
Published: 2024-11-13T17:15:12.660
Modified: 2025-12-23T16:41:59.993
Link: CVE-2024-9413
No data.
OpenCVE Enrichment
No data.