Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45746: n/a

0
Critical
VulnerabilityCVE-2024-45746cvecve-2024-45746
Published: Wed Oct 09 2024 (10/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Trusted Firmware-M through 2.1.0. User provided (and controlled) mailbox messages contain a pointer to a list of input arguments (in_vec) and output arguments (out_vec). These list pointers are never validated. Each argument list contains a buffer pointer and a buffer length field. After a PSA call, the length of the output arguments behind the unchecked pointer is updated in mailbox_direct_reply, regardless of the call result. This allows an attacker to write anywhere in the secure firmware, which can be used to take over the control flow, leading to remote code execution (RCE).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:17:45 UTC

Technical Analysis

CVE-2024-45746 is a critical memory corruption vulnerability found in Trusted Firmware-M versions through 2.1.0. Trusted Firmware-M is a reference implementation of secure firmware for Arm Cortex-M processors, widely used in embedded and IoT devices to provide a trusted execution environment. The vulnerability stems from the handling of mailbox messages, which are used for communication between non-secure and secure worlds. These mailbox messages include pointers to lists of input (in_vec) and output (out_vec) arguments. However, the firmware does not validate these pointers, allowing an attacker to supply malicious pointers that reference arbitrary memory locations. After a PSA (Platform Security Architecture) call, the firmware updates the length of the output arguments in the mailbox_direct_reply function without verifying the pointer's validity or bounds. This unchecked write operation can overwrite arbitrary memory regions within the secure firmware, enabling an attacker to manipulate control flow and execute arbitrary code remotely. The vulnerability is classified under CWE-120 (Classic Buffer Overflow) and has a CVSS 3.1 base score of 9.8, reflecting its critical nature. Exploitation requires no privileges or user interaction and can be performed remotely over the communication interface that handles mailbox messages. This flaw threatens the confidentiality, integrity, and availability of the secure firmware environment, potentially compromising the entire device security.

Potential Impact

The impact of CVE-2024-45746 is severe for organizations deploying embedded devices and IoT systems that rely on Trusted Firmware-M for secure operations. Successful exploitation allows attackers to gain remote code execution within the secure firmware, effectively bypassing hardware-enforced security boundaries. This can lead to full compromise of device security, including unauthorized access to sensitive data, manipulation of secure operations, and persistent control over the device. Critical infrastructure, industrial control systems, medical devices, automotive systems, and consumer IoT products using affected firmware are at risk. The vulnerability undermines the trust model of the secure execution environment, potentially enabling attackers to deploy malware, disrupt device functionality, or use compromised devices as footholds for lateral movement in larger networks. Given the widespread adoption of Arm Cortex-M processors and Trusted Firmware-M in embedded systems globally, the threat surface is extensive. Organizations may face operational disruptions, data breaches, and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-45746, organizations should: 1) Monitor Trusted Firmware-M vendor channels for official patches or firmware updates addressing this vulnerability and apply them promptly. 2) Implement strict input validation and bounds checking on mailbox message pointers within the firmware to prevent malicious pointer dereferencing. 3) Employ hardware security features such as Memory Protection Units (MPUs) to restrict writable memory regions and prevent arbitrary memory writes. 4) Use secure boot and firmware integrity verification mechanisms to detect unauthorized firmware modifications. 5) Limit exposure of the communication interfaces that handle mailbox messages to trusted entities only, employing network segmentation and access controls. 6) Conduct thorough security testing and code audits focusing on pointer validation and memory safety in secure firmware components. 7) For devices in critical environments, consider additional runtime protections such as Control Flow Integrity (CFI) and anomaly detection to identify exploitation attempts. These measures collectively reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf1b7ef31ef0b56a5e8

Added to database: 2/25/2026, 9:43:13 PM

Last enriched: 2/26/2026, 8:17:45 AM

Last updated: 4/12/2026, 3:35:40 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses