#VU103509 Security features bypass in ARM products - CVE-2024-5660


Vulnerability identifier: #VU103509

Vulnerability risk: High

CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/U:Amber]

CVE-ID: CVE-2024-5660

CWE-ID: CWE-254

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cortex-A77
Hardware solutions / Firmware
Cortex-A78
Hardware solutions / Firmware
Cortex-A78C
Hardware solutions / Firmware
Cortex-A78AE
Hardware solutions / Firmware
Cortex-A710
Hardware solutions / Firmware
Cortex-X1
Hardware solutions / Firmware
Cortex-X1C
Hardware solutions / Firmware
Cortex-X2
Hardware solutions / Firmware
Cortex-X3
Hardware solutions / Firmware
Cortex-X4
Hardware solutions / Firmware
Cortex-X925
Hardware solutions / Firmware
Neoverse V1
Hardware solutions / Firmware
Neoverse V2
Hardware solutions / Firmware
Neoverse V3
Hardware solutions / Firmware
Neoverse V3AE
Hardware solutions / Firmware
Neoverse N2
Hardware solutions / Firmware

Vendor: ARM

Description

The vulnerability allows a malicious guest to compromise the hypervisor.

The vulnerability exists due to incorrect memory address translation when Hardware Page Aggregation (HPA) is enabled and Stage-1 and/or Stage-2 translation is enabled for the active translation regime. A malicious guest can bypass Stage-2 translation and/or GPT protection and compromise the host in certain hypervisor environments.

Mitigation
The vendor recommends disabling page aggregation by setting CPUECTLR_EL1[46] to 1.

Vulnerable software versions

Cortex-A77: All versions

Cortex-A78: All versions

Cortex-A78C: All versions

Cortex-A78AE: All versions

Cortex-A710: All versions

Cortex-X1: All versions

Cortex-X1C: All versions

Cortex-X2: All versions

Cortex-X3: All versions

Cortex-X4: All versions

Cortex-X925: All versions

Neoverse V1: All versions

Neoverse V2: All versions

Neoverse V3: All versions

Neoverse V3AE: All versions

Neoverse N2: All versions


External links
https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-5660


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability