CVE-2023-34320

Published: Dic 08, 2023 Last Modified: Nov 04, 2025
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,5
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412
where software, under certain circumstances, could deadlock a core
due to the execution of either a load to device or non-cacheable memory,
and either a store exclusive or register read of the Physical
Address Register (PAR_EL1) in close proximity.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0011
Percentile
0,3th
Updated

EPSS Score Trend (Last 90 Days)

667

Improper Locking

Draft
Common Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Resource Consumption (Cpu)
Applicable Platforms
All platforms may be affected
View CWE Details
Operating System

Cortex-A77 Firmware by Arm

cpe:2.3:o:arm:cortex-a77_firmware:r1p0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Xen by Xen

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Cortex-A77 Firmware by Arm

cpe:2.3:o:arm:cortex-a77_firmware:r0p0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://xenbits.xenproject.org/xsa/advisory-436.html
http://xenbits.xen.org/xsa/advisory-436.html
https://xenbits.xenproject.org/xsa/advisory-436.html