{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5660","assignerOrgId":"56a131ea-b967-4a0d-a41e-5f3549952846","state":"PUBLISHED","assignerShortName":"Arm","dateReserved":"2024-06-05T16:55:44.691Z","datePublished":"2024-12-10T13:55:44.488Z","dateUpdated":"2024-12-16T13:10:13.630Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Cortex-A77","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Neoverse V1","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-A78AE","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-78C","vendor":"Arm","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"affected","product":"Cortex-X1C","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-A78","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-X1","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Neoverse N2","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-A710","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-X2","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Neoverse V2","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-X3","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Neoverse V3AE","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Neoverse V3","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-X4","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","product":"Cortex-X925","vendor":"Arm","versions":[{"status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2024-12-10T13:54:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Use of Hardware Page Aggregation (HPA) and Stage-1 and/or Stage-2 translation on <span style=\"background-color: rgba(29, 28, 29, 0.04);\">Cortex-A77, Cortex-A78, Cortex-A78C, Cortex-A78AE, Cortex-A710, Cortex-X1, Cortex-X1C, Cortex-X2, Cortex-X3, Cortex-X4, Cortex-X925, Neoverse V1, Neoverse V2, Neoverse V3, Neoverse V3AE, Neoverse N2</span> may permit bypass of Stage-2 translation and/or GPT protection.<br>"}],"value":"Use of Hardware Page Aggregation (HPA) and Stage-1 and/or Stage-2 translation on Cortex-A77, Cortex-A78, Cortex-A78C, Cortex-A78AE, Cortex-A710, Cortex-X1, Cortex-X1C, Cortex-X2, Cortex-X3, Cortex-X4, Cortex-X925, Neoverse V1, Neoverse V2, Neoverse V3, Neoverse V3AE, Neoverse N2 may permit bypass of Stage-2 translation and/or GPT protection."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-668","description":"CWE-668 Exposure of Resource to Wrong Sphere","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"56a131ea-b967-4a0d-a41e-5f3549952846","shortName":"Arm","dateUpdated":"2024-12-16T13:10:13.630Z"},"references":[{"url":"https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-5660"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-12-10T21:25:35.684368Z","id":"CVE-2024-5660","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-10T21:26:26.859Z"}}]}}