FKIE_CVE-2024-7881
Vulnerability from fkie_nvd - Published: 2025-01-28 15:15 - Updated: 2025-12-18 15:36
Severity ?
Summary
An unprivileged context can trigger a data
memory-dependent prefetch engine to fetch the contents of a privileged location
and consume those contents as an address that is also dereferenced.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| arm | c1-premium_firmware | - | |
| arm | c1-premium | - | |
| arm | c1-pro_firmware | - | |
| arm | c1-pro | - | |
| arm | c1-ultra_firmware | - | |
| arm | c1-ultra | - | |
| arm | cortex-x3_firmware | - | |
| arm | cortex-x3 | - | |
| arm | cortex-x4_firmware | - | |
| arm | cortex-x4 | - | |
| arm | cortex-x925_firmware | - | |
| arm | cortex-x925 | - | |
| arm | neoverse-v2_firmware | - | |
| arm | neoverse-v2 | - | |
| arm | neoverse-v3_firmware | - | |
| arm | neoverse-v3 | - | |
| arm | neoverse-v3ae_firmware | - | |
| arm | neoverse-v3ae | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:c1-premium_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697A11F4-9A13-4DC4-90AD-A2CB215D5BCF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:c1-premium:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C6B2962-3F19-46B9-A74A-521FF4ECC357",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:c1-pro_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81BDFB4D-C287-46F8-8523-E5C33639C78C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:c1-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B682BB76-044E-416E-930E-19DDBB6DB940",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:c1-ultra_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46FBFC11-C12A-44A7-9EE0-504FFDEA7BC3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:c1-ultra:-:*:*:*:*:*:*:*",
"matchCriteriaId": "501E45AC-8E1E-4095-9771-04C739A864BB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:cortex-x3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E776B4A0-0642-489C-B03B-F6B9FFDFFD11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:cortex-x3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979779A2-D556-4EF5-932D-F38009186B91",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:cortex-x4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F8394E0-E173-41B5-B13D-6F45947D46E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:cortex-x4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63E0897F-9D56-4835-8C12-B3758CF38F96",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:cortex-x925_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF2C4EC2-711A-407A-A8F4-7E7134B4F06E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:cortex-x925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CE6CA3-E32E-4892-A7DB-D4A879956320",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:neoverse-v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E7E713-E11C-45CB-83E7-C21F57720A55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:neoverse-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF8B63B-C2E7-4C97-BA5C-79E2278F0C52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:neoverse-v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E84400-B02D-4B8D-9179-5428D38641CF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:neoverse-v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFC574FE-7462-4E50-AE4A-5204C339C1F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:neoverse-v3ae_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CDE1B2-393F-4D2A-B872-3317B26D06B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:neoverse-v3ae:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66BD33A8-6D01-4A63-B81E-E974CDFAD04A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unprivileged context can trigger a data\nmemory-dependent prefetch engine to fetch the contents of a privileged location\nand consume those contents as an address that is also dereferenced."
},
{
"lang": "es",
"value": "Un contexto sin privilegios puede activar un motor de precarga dependiente de la memoria de datos para obtener el contenido de una ubicaci\u00f3n privilegiada y consumir ese contenido como una direcci\u00f3n que tambi\u00e9n est\u00e1 desreferenciada."
}
],
"id": "CVE-2024-7881",
"lastModified": "2025-12-18T15:36:35.500",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-01-28T15:15:12.847",
"references": [
{
"source": "arm-security@arm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881"
}
],
"sourceIdentifier": "arm-security@arm.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…