CVE-2024-11864
📋 TL;DR
CVE-2024-11864 is a vulnerability in SCP-Firmware where specially crafted SCMI messages can cause a Usage Fault and crash the System Control Processor (SCP). This affects systems using SCP-Firmware up to version 2.15.0, potentially disrupting platform management functions.
💻 Affected Systems
- SCP-Firmware
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete SCP crash leading to loss of system management functions, potential denial of service for platform control features, and possible system instability.
Likely Case
SCP crash requiring system reboot to restore management functionality, causing temporary service disruption.
If Mitigated
Limited impact with proper network segmentation and SCMI message validation in place.
🎯 Exploit Status
Exploitation requires sending specially crafted SCMI messages to the SCP. This typically requires some level of system access or ability to communicate with the SCP interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: SCP-Firmware version 2.16.0 or later
Vendor Advisory: https://developer.arm.com/Arm%20Security%20Center/SCP-Firmware%20Vulnerability%20CVE-2024-11863-11864
Restart Required: No
Instructions:
1. Download SCP-Firmware version 2.16.0 or later from ARM. 2. Follow vendor-specific firmware update procedures for your platform. 3. Verify the update was successful by checking the firmware version.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to SCP management interfaces to only authorized management systems
SCMI Message Filtering
allImplement filtering or validation of SCMI messages at the system level if supported
🧯 If You Can't Patch
- Implement strict network access controls to SCP interfaces
- Monitor for abnormal SCMI message patterns or SCP crashes
🔍 How to Verify
Check if Vulnerable:
Check SCP-Firmware version. If version is 2.15.0 or earlier, the system is vulnerable.
Check Version:
Platform-specific command to check SCP-Firmware version (varies by vendor)
Verify Fix Applied:
Verify SCP-Firmware version is 2.16.0 or later after patching.
📡 Detection & Monitoring
Log Indicators:
- SCP crash logs
- Usage Fault errors in system logs
- Abnormal SCMI message patterns
Network Indicators:
- Unusual SCMI traffic to SCP interfaces
SIEM Query:
Search for 'SCP crash' OR 'Usage Fault' OR 'SCMI error' in system logs