Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

cortex-a710_firmware

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

4
Related CVEsRelated VendorsRelated AssignersReports
4Vulnerabilities found

CVE-2025-0647
Assigner-Arm Limited
ShareView Details
Assigner-Arm Limited
CVSS Score-7.9||HIGH
EPSS-0.01% / 2.64%
||
7 Day CHG~0.00%
Published-14 Jan, 2026 | 10:58
Updated-26 Jan, 2026 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In certain Arm CPUs, a CPP RCTX instruction executed on one Processing Element (PE) may inhibit TLB invalidation when a TLBI is issued to the PE, either by the same PE or another PE in the shareability domain. In this case, the PE may retain stale TLB entries which should have been invalidated by the TLBI.

Action-Not Available
Vendor-Arm Limited
Product-neoverse-v3cortex-x2neoverse-v2cortex-x4cortex-x2_firmwarecortex-a710_firmwarecortex-a710neoverse-v3ae_firmwarecortex-x3cortex-x925_firmwarec1-ultrac1-premium_firmwarec1-ultra_firmwarecortex-x925neoverse-n2neoverse-v3aec1-premiumcortex-x3_firmwarecortex-x4_firmwareneoverse-v2_firmwareneoverse-n2_firmwareneoverse-v3_firmwareCortex-A710Neoverse-N2Cortex-X925Cortex-X3Cortex-X2C1-PremiumNeoverse-V3C1-UltraNeoverse-V2Cortex-X4Neoverse-V3AE
CWE ID-CWE-226
Sensitive Information in Resource Not Removed Before Reuse
CVE-2024-5660
Assigner-Arm Limited
ShareView Details
Assigner-Arm Limited
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 27.97%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 13:55
Updated-05 Jan, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Hardware Page Aggregation (HPA) and Stage-1 and/or Stage-2 translation on Cortex-A77, Cortex-A78, Cortex-A78C, Cortex-A78AE, Cortex-A710, Cortex-X1, Cortex-X1C, Cortex-X2, Cortex-X3, Cortex-X4, Cortex-X925, Neoverse V1, Neoverse V2, Neoverse V3, Neoverse V3AE, Neoverse N2 may permit bypass of Stage-2 translation and/or GPT protection.

Action-Not Available
Vendor-Arm Limited
Product-cortex-x1_firmwarecortex-x1cortex-x1cneoverse_n2_firmwarecortex-a78ae_firmwarecortex-a710neoverse-v2cortex-a78c_firmwareneoverse_n2cortex-a78aeneoverse-v3aecortex-x3_firmwarecortex-a77cortex-a78_firmwarecortex-x3cortex-x2cortex-x2_firmwarecortex-a77_firmwarecortex-x925_firmwareneoverse-v3ae_firmwarecortex-x4_firmwarecortex-a710_firmwareneoverse-v2_firmwarecortex-a78neoverse-v3cortex-x925neoverse-v3_firmwarecortex-a78ccortex-x4neoverse-v1neoverse-v1_firmwarecortex-x1c_firmwareCortex-X1Neoverse N2Cortex-A77Cortex-X2Cortex-A78Neoverse V3Cortex-X4Cortex-78CCortex-A710Cortex-X3Cortex-X1CCortex-X925Neoverse V2Neoverse V1Cortex-A78AENeoverse V3AE
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-23960
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.18% / 39.42%
||
7 Day CHG~0.00%
Published-12 Mar, 2022 | 23:57
Updated-03 Aug, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.

Action-Not Available
Vendor-n/aDebian GNU/LinuxXen ProjectArm Limited
Product-cortex-a76aecortex-x2_firmwarecortex-a75cortex-a65ae_firmwarecortex-a78ae_firmwarecortex-r8cortex-a77_firmwarecortex-a57neoverse_n2_firmwareneoverse_n2cortex-a65aeneoverse-e1cortex-a710cortex-x2cortex-a78neoverse_n1_firmwarecortex-a72_firmwarecortex-r8_firmwarexencortex-a77cortex-x1cortex-a57_firmwarecortex-a65_firmwarecortex-r7_firmwarecortex-a78_firmwarecortex-a65cortex-a78aeneoverse-e1_firmwareneoverse-v1cortex-a76ae_firmwareneoverse_n1cortex-a710_firmwaredebian_linuxcortex-x1_firmwarecortex-a75_firmwarecortex-a76_firmwarecortex-a73_firmwarecortex-a76cortex-a72cortex-a73neoverse-v1_firmwarecortex-r7n/a
CVE-2022-25368
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.27% / 50.29%
||
7 Day CHG~0.00%
Published-09 Mar, 2022 | 18:17
Updated-03 Aug, 2024 | 04:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Spectre BHB is a variant of Spectre-v2 in which malicious code uses the shared branch history (stored in the CPU BHB) to influence mispredicted branches in the victim's hardware context. Speculation caused by these mispredicted branches can then potentially be used to cause cache allocation, which can then be used to infer information that should be protected.

Action-Not Available
Vendor-amperecomputingn/aArm Limited
Product-cortex-a76aecortex-x2_firmwarecortex-a75cortex-a65ae_firmwarecortex-a78ae_firmwareampere_altra_firmwarecortex-a78c_firmwarecortex-a77_firmwarecortex-a57neoverse_n2_firmwareneoverse_n2cortex-a15cortex-a65aeneoverse-e1cortex-a710cortex-x2cortex-a78neoverse_n1_firmwarecortex-a78ccortex-a15_firmwarecortex-a72_firmwareampere_altra_maxcortex-a77cortex-a57_firmwarecortex-x1cortex-a65_firmwareampere_altra_max_firmwarecortex-a78_firmwareampere_altracortex-a65neoverse-e1_firmwarecortex-a78aeneoverse-v1cortex-a76ae_firmwareneoverse_n1cortex-a710_firmwarecortex-x1_firmwarecortex-a75_firmwarecortex-a76_firmwarecortex-a73_firmwarecortex-a76cortex-a72cortex-a73neoverse-v1_firmwaren/a