cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-48982,https://securityvulnerability.io/vulnerability/CVE-2024-48982,Buffer Overflow and Integer Overflow Vulnerability in MBed OS by Arm,"In MBed OS version 6.16.0, a vulnerability exists in the hci parsing software that improperly assumes the length of certain hci packets will always be three bytes or greater. When a packet length less than three is supplied, it triggers a buffer overflow due to insufficient validation of the packet length. Additionally, the vulnerability allows for an integer overflow by supplying excessively large length values, as the system increases the received length for accounting additional data. This flaw can be easily exploited for denial of service purposes, although it does not definitively lead to a complete system failure. Furthermore, the dynamically allocated buffer limits the extent of potential exploitation.",Arm,Mbed,7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-20T21:15:00.000Z,0 CVE-2024-48986,https://securityvulnerability.io/vulnerability/CVE-2024-48986,Buffer Overflow Vulnerability in MBed OS 6.16.0 Affecting HCI Packet Processing,"A buffer overflow vulnerability exists in MBed OS 6.16.0 due to a flaw in the HCI parsing logic. The software dynamically calculates the length of specific HCI packets based on a byte in the packet header. This calculation may lead to the allocation of an insufficiently sized buffer based on events triggered during packet processing. As a result, the data copied during write operations could exceed the buffer's allocated size, potentially resulting in a denial of service situation. While this vulnerability provides an opportunity for exploitation, the dynamic nature of the buffer allocation limits the ability to compromise the entire system further.",Arm,Mbed,7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-20T21:15:00.000Z,0 CVE-2024-48985,https://securityvulnerability.io/vulnerability/CVE-2024-48985,Buffer Overflow in MBed OS 6.16.0 by Arm,"In MBed OS 6.16.0, an issue was found during the processing of HCI packets. The software reads two bytes from the packet data to dynamically determine the length of the packet body, leading to an allocated buffer intended to store the complete packet. However, if the allocation fails due to excessive size requirements, no exception handling is implemented. Consequently, the function hciTrSerialRxIncoming continues to write beyond the intended bounds into a temporary 4-byte header buffer. This behavior exposes the system to potential buffer overflow vulnerabilities. An attacker can exploit this flaw to achieve arbitrary write capabilities, potentially compromising the integrity of the system by overwriting critical pointers and state variables during the parsing process of packet data.",Arm,Mbed,7.5,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2024-11-20T20:15:00.000Z,0 CVE-2024-48983,https://securityvulnerability.io/vulnerability/CVE-2024-48983,Buffer Overflow Vulnerability in MBed OS from Arm,"A vulnerability in MBed OS 6.16.0 can lead to a buffer overflow when processing HCI packets. The software calculates the length of packet data based on two bytes from the packet header, allocating a buffer to accommodate the entire packet's size, which includes the packet body and the header. Due to a flaw in this length calculation, an integer overflow could occur, resulting in a dynamically allocated buffer that is insufficient to hold the packet, potentially leading to a buffer overflow of up to 65 KB. While this vulnerability is primarily exploitable for causing denial of service, its exploitability is limited due to the dynamic nature of the buffer allocation.",Arm,Mbed,7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-20T20:15:00.000Z,0 CVE-2024-48981,https://securityvulnerability.io/vulnerability/CVE-2024-48981,Buffer Overflow Vulnerability in MBed OS 6.16.0 by Arm,"A buffer overflow vulnerability has been identified in MBed OS version 6.16.0, specifically during the processing of HCI packets. The implementation improperly handles packet header lengths by dynamically determining them based on the first identifying byte. However, in cases where the identifier is invalid, the parsing mechanism fails to discard and does not provide a safe default for unknown packet lengths. This oversight can be exploited to achieve arbitrary write operations by manipulating pointers to unallocated buffers, enabling an attacker to overwrite crucial state variables and potentially modify the function's flow during packet parsing. Such exploitation can lead to significant security risks, including unauthorized access and system compromise.",Arm,Mbed,7.5,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2024-11-20T20:15:00.000Z,0 CVE-2024-23170,https://securityvulnerability.io/vulnerability/CVE-2024-23170,Timing Side Channel Vulnerability in Mbed TLS by Arm,"A timing side channel vulnerability in Mbed TLS versions 2.x prior to 2.28.7 and 3.x prior to 3.5.2 can potentially allow local attackers to recover plaintext from RSA private operations. This vulnerability arises when an attacker is able to send a significant number of decryption messages, utilizing the weaknesses described in 'Everlasting ROBOT: the Marvin Attack.' It highlights the importance of robust security practices to mitigate such risks.",Arm,Mbed Tls,5.5,MEDIUM,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-31T00:00:00.000Z,0 CVE-2024-23775,https://securityvulnerability.io/vulnerability/CVE-2024-23775,Integer Overflow Vulnerability in Mbed TLS 2.x and 3.x by Arm,"An Integer Overflow vulnerability in Mbed TLS versions 2.x prior to 2.28.7 and 3.x prior to 3.5.2 exists, which may allow an attacker to exploit the mbedtls_x509_set_extension() function to cause a Denial of Service (DoS). This flaw can be particularly damaging as it can disrupt the normal operation of applications relying on Mbed TLS for secure communications.",Arm,Mbed Tls,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2024-01-31T00:00:00.000Z,0 CVE-2023-52353,https://securityvulnerability.io/vulnerability/CVE-2023-52353,Vulnerability in Mbed TLS Affects TLS Version Negotiation,"An identified issue in Mbed TLS, particularly affecting version 3.5.1, revolves around the mishandling of the maximum negotiable TLS version during SSL session resets. When a connection negotiated TLS 1.2, this version inadvertently becomes the new maximum, potentially undermining expected security configurations. This vulnerability impacts secure communication protocols, highlighting the need for careful version management and vigilance in cryptographic implementations.",Arm,Mbed Tls,7.5,HIGH,0.0006799999973736703,false,,false,false,false,,,false,false,,2024-01-21T00:00:00.000Z,0 CVE-2024-23744,https://securityvulnerability.io/vulnerability/CVE-2024-23744,Denial of Service Vulnerability in Mbed TLS 3.5.1,"A vulnerability has been identified in Mbed TLS 3.5.1, where a persistent handshake denial occurs if a client sends a TLS 1.3 ClientHello message without including any extensions. This flaw can disrupt secure communication, resulting in service interruptions for affected applications. It is crucial for users of Mbed TLS to ensure they are implementing the latest version and configurations to mitigate potential exploitation risks.",Arm,Mbed Tls,7.5,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2024-01-21T00:00:00.000Z,0 CVE-2023-43615,https://securityvulnerability.io/vulnerability/CVE-2023-43615,Buffer Overflow Vulnerability in Mbed TLS by ARM,"The Mbed TLS library in its versions 2.x prior to 2.28.5 and 3.x prior to 3.5.0 is susceptible to a buffer overflow vulnerability. This flaw could lead to unauthorized access or manipulation of memory, potentially allowing an attacker to execute arbitrary code or disrupt service. It is critical for users and organizations relying on these versions to update promptly and mitigate any associated risks.",Arm,Mbed Tls,7.5,HIGH,0.001230000052601099,false,,false,false,false,,,false,false,,2023-10-07T01:15:00.000Z,0 CVE-2023-45199,https://securityvulnerability.io/vulnerability/CVE-2023-45199,Buffer Overflow Vulnerability in Mbed TLS Affects Multiple Versions,"The Mbed TLS library versions 3.2.x to 3.4.x prior to 3.5 are susceptible to a buffer overflow vulnerability, which could enable attackers to execute arbitrary code remotely. This flaw arises from improper handling of user-supplied input, leading to potential exploitation. Users of Mbed TLS are urged to upgrade to the latest version to mitigate this risk.",Arm,Mbed Tls,9.8,CRITICAL,0.005270000081509352,false,,false,false,false,,,false,false,,2023-10-07T01:15:00.000Z,0 CVE-2022-43703,https://securityvulnerability.io/vulnerability/CVE-2022-43703,Incomplete verification of installation file signature,"This vulnerability occurs when installers for ARM and Intel products utilize an unconstrained search path for file loading and execution. This allows an attacker to manipulate the path to substitute malicious files in place of legitimate ones, potentially leading to unauthorized execution of arbitrary code. It is crucial for users and developers to ensure that their systems validate file paths to prevent exploitation.",Arm Ltd,"Arm Compiler 5 (ac5), Arm Compiler For Embedded 6 (ac6), Fast Models (fm), Arm Compiler For Embedded Fusa (acef), Arm Development Studio (ads), Arm Forge (af), Arm Mobile Studio (ams), Ds-5 Development Studio, Fast Models (fm), Gnu Toolchain (gt), Keil Mdk (kmdk), Mbed Studio (ms)",7.8,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2023-07-27T21:52:29.229Z,0 CVE-2022-43702,https://securityvulnerability.io/vulnerability/CVE-2022-43702,Incomplete verification of installation file signature,"A vulnerability exists in the ARM Installer when the directory containing the installer is not secured with appropriate file permissions. This insufficient restriction allows an attacker to modify or replace the installer, potentially executing malicious code within the system. Proper configurations and regular updates are critical to mitigate the risks associated with this vulnerability.",Arm Ltd,"Arm Compiler 5 (ac5), Arm Compiler For Embedded 6 (ac6), Fast Models (fm), Arm Compiler For Embedded Fusa (acef), Arm Development Studio (ads), Arm Forge (af), Arm Mobile Studio (ams), Ds-5 Development Studio, Fast Models (fm), Gnu Toolchain (gt), Keil Mdk (kmdk), Mbed Studio (ms)",7.8,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2023-07-27T21:47:25.882Z,0 CVE-2022-43701,https://securityvulnerability.io/vulnerability/CVE-2022-43701,Insecure directory permissions on installer files,"This vulnerability affects products from Arm and Intel where insufficient restrictions in the installation directory's file permissions allow attackers to modify files. Consequently, this could lead to the execution of unauthorized and potentially malicious code. It is crucial for users to ensure that file permissions are configured correctly to mitigate such risks and protect their systems from exploitation.",Arm Ltd,"Arm Compiler 5 (ac5), Arm Compiler For Embedded 6 (ac6), Fast Models (fm), Arm Compiler For Embedded Fusa (acef), Arm Development Studio (ads), Arm Forge (af), Arm Mobile Studio (ams), Ds-5 Development Studio, Fast Models (fm), Gnu Toolchain (gt), Keil Mdk (kmdk), Mbed Studio (ms)",7.8,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2023-07-27T21:28:08.461Z,0 CVE-2021-36647,https://securityvulnerability.io/vulnerability/CVE-2021-36647,Broken Cryptographic Algorithm in Mbed TLS by ARM,"The Mbed TLS library, specifically in the function mbedtls_mpi_exp_mod() within lignum.c, is affected by the use of a weak or broken cryptographic algorithm. This flaw enables malicious actors who possess sufficient timing and memory access insights to exploit untrusted systems targeting secure environments, such as SGX or TrustZone secure worlds, to recover sensitive RSA private keys. This vulnerability poses significant risks for systems relying on Mbed TLS for cryptographic operations and highlights the need for updates to mitigate potential exploitation.",Arm,Mbed Tls,4.7,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2023-01-17T00:00:00.000Z,0 CVE-2022-46392,https://securityvulnerability.io/vulnerability/CVE-2022-46392,Information Disclosure Vulnerability in Mbed TLS by ARM,"A vulnerability has been discovered in Mbed TLS versions prior to 2.28.2 and 3.x prior to 3.3.0. This issue allows an attacker who has precise knowledge of memory accesses, such as an untrusted operating system targeting a secure enclave, to potentially recover an RSA private key after monitoring a single private-key operation. This risk arises when the window size configuration (MBEDTLS_MPI_WINDOW_SIZE) used during exponentiation is set to 3 or smaller.",Arm,Mbed Tls,5.3,MEDIUM,0.0010900000343099236,false,,false,false,false,,,false,false,,2022-12-15T00:00:00.000Z,0 CVE-2022-46393,https://securityvulnerability.io/vulnerability/CVE-2022-46393,Heap-Based Buffer Issues in Mbed TLS by Arm,"A vulnerability in Mbed TLS prior to version 2.28.2 and 3.x prior to 3.3.0 allows for a potential heap-based buffer overflow and buffer over-read in DTLS. This occurs when the configuration option MBEDTLS_SSL_DTLS_CONNECTION_ID is active, and the parameters for connection ID length are improperly set, leading to potential exploitation in the application layer.",Arm,Mbed Tls,9.8,CRITICAL,0.003220000071451068,false,,false,false,false,,,false,false,,2022-12-15T00:00:00.000Z,0 CVE-2022-35409,https://securityvulnerability.io/vulnerability/CVE-2022-35409,Heap-based Buffer Over-read in Mbed TLS Affects Multiple Versions,"An issue exists in Mbed TLS versions prior to 2.28.1 and 3.x before 3.2.0, where certain configurations leave DTLS servers vulnerable to an unauthenticated attack. An attacker can send an invalid ClientHello message that may cause a heap-based buffer over-read of up to 255 bytes. This vulnerability potentially leads to server crashes or information leaks based on the nature of the error responses. The specific configurations that are at risk include those with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled and MBEDTLS_SSL_IN_CONTENT_LEN set below a threshold, which may vary from 258 bytes (with mbedtls_ssl_cookie_check) to as high as 571 bytes (with custom cookie check functions).",Arm,Mbed Tls,9.1,CRITICAL,0.002520000096410513,false,,false,false,false,,,false,false,,2022-07-15T00:00:00.000Z,0 CVE-2021-27433,https://securityvulnerability.io/vulnerability/CVE-2021-27433,ARM mbed-ualloc memory library Integer Overflow or Wraparound,"ARM mbed-ualloc memory library version 1.3.0 is vulnerable to integer wrap-around in function mbed_krbs, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.",Arm,Mbed-ualloc Memory Library,7.3,HIGH,0.1267700046300888,false,,false,false,false,,,false,false,,2022-05-03T20:26:51.000Z,0 CVE-2021-27435,https://securityvulnerability.io/vulnerability/CVE-2021-27435,ARM mbed Integer Overflow or Wraparound,"ARM mbed product Version 6.3.0 is vulnerable to integer wrap-around in malloc_wrapper function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.",Arm,Mbed,7.3,HIGH,0.1207600012421608,false,,false,false,false,,,false,false,,2022-05-03T20:22:45.000Z,0 CVE-2021-43666,https://securityvulnerability.io/vulnerability/CVE-2021-43666,Denial of Service Vulnerability in mbed TLS by ARM,"A Denial of Service vulnerability in mbed TLS arises from the mbedtls_pkcs12_derivation function when inputs with a password length of zero are processed. This flaw can potentially make the system unresponsive, highlighting the need for robust input validation to prevent exploitation. The issue particularly affects mbed TLS versions up to 3.0.0, posing a risk to applications relying on this library for secure communications.",Arm,Mbed Tls,7.5,HIGH,0.0010600000387057662,false,,false,false,false,,,false,false,,2022-03-24T00:00:00.000Z,0 CVE-2021-45451,https://securityvulnerability.io/vulnerability/CVE-2021-45451,Policy Bypass and Oracle-Based Decryption in Mbed TLS by ARM,"In Mbed TLS versions prior to 3.1.0, a flaw exists in the psa_aead_generate_nonce function that allows an untrusted application to bypass security policies or exploit oracle-based decryption opportunities when the output buffer is located in memory regions accessible to the application. This weakness can potentially lead to unauthorized access to sensitive data, emphasizing the importance of upgrading to the latest version to mitigate risks.",Arm,Mbed Tls,7.5,HIGH,0.001550000044517219,false,,false,false,false,,,false,false,,2021-12-21T00:00:00.000Z,0 CVE-2021-45450,https://securityvulnerability.io/vulnerability/CVE-2021-45450,Policy Bypass and Oracle-based Decryption in Mbed TLS,"Mbed TLS versions prior to 2.28.0 and 3.x before 3.1.0 have a vulnerability where the functions psa_cipher_generate_iv and psa_cipher_encrypt can be exploited to bypass security policies. This flaw may allow an untrusted application to access sensitive memory locations, leading to potential oracle-based decryption of encrypted data. It exposes the risk of unauthorized access to protected information, highlighting the importance of upgrading to the latest stable version to mitigate these security threats.",Arm,Mbed Tls,7.5,HIGH,0.0021699999924749136,false,,false,false,false,,,false,false,,2021-12-21T00:00:00.000Z,0 CVE-2021-44732,https://securityvulnerability.io/vulnerability/CVE-2021-44732,Double Free Vulnerability in Mbed TLS Affects Multiple Versions,"A double free vulnerability exists in Mbed TLS versions before 3.0.1. This issue may be triggered under certain out-of-memory conditions, particularly exemplified by failures during SSL session management. If exploited, this vulnerability can lead to unexpected behavior or application crashes, thus potentially allowing unauthorized access or denial of service in applications relying on Mbed TLS. Users are advised to update to the latest versions to mitigate this risk.",Arm,Mbed Tls,9.8,CRITICAL,0.005090000107884407,false,,false,false,false,,,false,false,,2021-12-20T00:00:00.000Z,0 CVE-2020-36477,https://securityvulnerability.io/vulnerability/CVE-2020-36477,Certificate Verification Issue in Mbed TLS by ARM,"A security issue in Mbed TLS prior to version 2.24.0 compromises the verification of X.509 certificates. The vulnerability occurs when comparing expected names to actual certificate names while handling the subjectAltName extension. If the subjecAltName extension is utilized, the verification process incorrectly allows an attacker to impersonate a domain by manipulating the 4-byte or 16-byte representation tied to an IPv4 or IPv6 address. The attacker must control the relevant IP address to exploit this flaw.",Arm,Mbed Tls,5.9,MEDIUM,0.001180000021122396,false,,false,false,false,,,false,false,,2021-08-23T00:00:00.000Z,0