Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-45746

EPSS 8.90% · P93
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-45746

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linaro Trusted Firmware-M 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linaro Trusted Firmware-M(Tf-M)是英国Linaro公司的一个平台安全架构 (Psa) 物联网安全框架的参考实现。 Linaro Trusted Firmware-M 2.1.0版本存在安全漏洞,该漏洞源于没有验证用户提供的in_vec和out_vec列表的指针。攻击者利用该漏洞可以远程执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-45746

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-45746

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-10-09 · 26 CVEs total

CVE-2024-388186.7 MEDIUMVMware NSX 安全漏洞
CVE-2024-388176.7 MEDIUMVMware NSX 安全漏洞
CVE-2024-388154.3 MEDIUMVMware NSX 安全漏洞
CVE-2023-45361MediaWiki 安全漏洞
CVE-2024-42988CTFd 安全漏洞
CVE-2024-46316DrayTek Vigor 3900 安全漏洞
CVE-2024-46307Xingyuantu SparkShop 安全漏洞
CVE-2024-48941Syracom Secure Login 安全漏洞
CVE-2024-48933LemonLDAP::NG 安全漏洞
CVE-2024-48942Syracom Secure Login 安全漏洞
CVE-2023-36325I2P 安全漏洞
CVE-2023-46586Weborf 安全漏洞
CVE-2023-37154Nagios Plugins 安全漏洞
CVE-2024-45179za-internet C-MOR Video Surveillance 安全漏洞
CVE-2023-45359MediaWiki 安全漏洞
CVE-2023-45872Qt 安全漏洞
CVE-2024-42934OpenIPMI 安全漏洞
CVE-2024-47191OATH Toolkit 安全漏洞
CVE-2024-46292ModSecurity 安全漏洞
CVE-2024-46237PHPGurukul Hospital Management System 安全漏洞

Showing top 20 of 26 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-45746

No comments yet


Leave a comment