Vulnerabilities > Renesas > ARM Trusted Firmware

DATE CVE VULNERABILITY TITLE RISK
2024-07-08 CVE-2024-6563 Classic Buffer Overflow vulnerability in Renesas Arm-Trusted-Firmware
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code.
local
low complexity
renesas CWE-120
6.7
2024-07-08 CVE-2024-6564 Classic Buffer Overflow vulnerability in Renesas Arm-Trusted-Firmware
Buffer overflow in "rcar_dev_init" due to using due to using untrusted data (rcar_image_number) as a loop counter before verifying it against RCAR_MAX_BL3X_IMAGE.
local
low complexity
renesas CWE-120
6.7
2024-02-19 CVE-2024-1633 Integer Overflow or Wraparound vulnerability in Renesas Arm-Trusted-Firmware Rcargen32.5
During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table “bl2_mem_params_descs”. For each image, the bl2 reads the image length and destination from the image’s certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not 
high complexity
renesas CWE-190
2.0