The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-5660

CVE-2024-5660: Arm Cortex-A710 Privilege Escalation Flaw

CVE-2024-5660 is a privilege escalation vulnerability in Arm Cortex-A710 Firmware affecting multiple Cortex and Neoverse processors. It allows bypassing Stage-2 translation and GPT protection through HPA misuse.

Published: April 1, 2026

CVE-2024-5660 Overview

CVE-2024-5660 is a critical hardware vulnerability affecting multiple ARM Cortex and Neoverse processor families. The vulnerability exists in the Hardware Page Aggregation (HPA) feature when combined with Stage-1 and/or Stage-2 translation mechanisms. This flaw may permit unauthorized bypass of Stage-2 translation and/or Granule Protection Table (GPT) protection, potentially undermining hypervisor-level isolation and confidential computing protections.

This vulnerability is particularly concerning for cloud infrastructure, virtualization environments, and systems relying on ARM's Realm Management Extension (RME) architecture for confidential computing workloads. The bypass of Stage-2 translation could allow a malicious guest VM to access memory regions belonging to other VMs or the hypervisor itself.

Critical Impact

Attackers may bypass Stage-2 memory translation and GPT protections, potentially compromising hypervisor isolation and confidential computing boundaries across affected ARM processors used in data centers and mobile devices.

Affected Products

  • ARM Cortex-A77, Cortex-A78, Cortex-A78C, Cortex-A78AE, Cortex-A710
  • ARM Cortex-X1, Cortex-X1C, Cortex-X2, Cortex-X3, Cortex-X4, Cortex-X925
  • ARM Neoverse V1, Neoverse V2, Neoverse V3, Neoverse V3AE, Neoverse N2
  • Associated firmware for all listed processor families

Discovery Timeline

  • December 10, 2024 - CVE-2024-5660 published to NVD
  • January 5, 2026 - Last updated in NVD database

Technical Details for CVE-2024-5660

Vulnerability Analysis

This vulnerability (CWE-668: Exposure of Resource to Wrong Sphere) occurs within the Hardware Page Aggregation (HPA) mechanism of affected ARM processors. HPA is a performance optimization feature that allows the memory management unit (MMU) to combine multiple adjacent page table entries into a single larger translation. However, when HPA interacts with Stage-2 translation—the mechanism hypervisors use to enforce memory isolation between virtual machines—a security boundary violation can occur.

In ARM's virtualization architecture, Stage-1 translation is controlled by the guest operating system, while Stage-2 translation is managed by the hypervisor to enforce isolation. GPT protection is part of ARM's Realm Management Extension, designed for confidential computing scenarios. The vulnerability allows these critical isolation mechanisms to be bypassed, potentially exposing protected memory regions.

Root Cause

The root cause lies in how the HPA feature processes translation table entries when both Stage-1 and Stage-2 translations are active. Under specific conditions, the hardware incorrectly aggregates page table entries in a manner that circumvents the Stage-2 translation checks or GPT protection enforcement. This represents a fundamental hardware design flaw in the memory management unit's handling of nested translation scenarios with HPA enabled.

Attack Vector

Exploitation of this vulnerability requires an attacker to have code execution capabilities within a guest virtual machine or a lower-privilege execution context on affected systems. The attacker would need to craft specific memory access patterns or page table configurations that trigger the erroneous HPA aggregation behavior.

The attack mechanism involves:

  1. Creating memory mappings with specific alignment and attributes that trigger HPA optimization
  2. Exploiting the timing or sequence of Stage-1/Stage-2 translation lookups
  3. Accessing memory regions that should be protected by Stage-2 translation or GPT
  4. Reading or modifying data belonging to other security domains (VMs, realms, or hypervisor)

Since no verified code examples are available, organizations should consult the ARM Security Center advisory for technical implementation details regarding detection and mitigation approaches.

Detection Methods for CVE-2024-5660

Indicators of Compromise

  • Unusual memory access patterns from guest VMs targeting hypervisor or other VM memory regions
  • Unexpected page table configurations with specific alignment characteristics designed to trigger HPA
  • Guest VM attempts to access memory addresses outside allocated ranges
  • Anomalous behavior in confidential computing workloads or realm-protected applications

Detection Strategies

  • Monitor hypervisor logs for Stage-2 translation faults or unexpected memory access violations
  • Implement hardware inventory auditing to identify systems running affected ARM processor families
  • Deploy firmware version tracking to identify systems with unpatched processor microcode
  • Enable hypervisor memory access tracing for critical workloads to detect boundary violation attempts

Monitoring Recommendations

  • Audit system firmware versions across ARM-based infrastructure using automated inventory tools
  • Monitor for security updates from ARM, silicon vendors, and hypervisor providers addressing this vulnerability
  • Track cloud provider advisories if running workloads on ARM-based cloud instances (AWS Graviton, Azure Arm, Google Tau T2A)
  • Implement anomaly detection for unexpected inter-VM memory access patterns in virtualized environments

How to Mitigate CVE-2024-5660

Immediate Actions Required

  • Review your infrastructure inventory to identify systems using affected ARM Cortex or Neoverse processors
  • Apply firmware and microcode updates from ARM and relevant silicon partners as they become available
  • Consult hypervisor vendors (KVM, Xen, VMware, Hyper-V) for software mitigations specific to their platforms
  • Consider disabling HPA feature via firmware configuration where operationally feasible until patches are available
  • Prioritize patching systems hosting confidential computing workloads or multi-tenant virtualized environments

Patch Information

ARM has published a security advisory addressing this vulnerability. Organizations should apply firmware updates as they become available from ARM and downstream silicon partners. The ARM Security Center CVE-2024-5660 advisory provides authoritative guidance on available mitigations and firmware update information.

System administrators should work with their hardware vendors (Qualcomm, MediaTek, Samsung, Ampere, etc.) who incorporate these ARM designs into their SoCs, as firmware updates will be distributed through vendor-specific channels.

Workarounds

  • Disable Hardware Page Aggregation (HPA) at the firmware level if supported by your platform
  • Implement additional hypervisor-level memory isolation checks as a defense-in-depth measure
  • Isolate sensitive workloads to systems with unaffected processor generations where possible
  • Apply enhanced monitoring for systems that cannot be immediately patched
bash
# Check if system uses affected ARM processor
cat /proc/cpuinfo | grep -i "CPU part"
# Cross-reference CPU part numbers with affected processor list

# Verify current firmware version on Linux systems
dmidecode -t bios | grep -i version

# Check for ARM processor family on mobile/embedded systems
cat /sys/devices/system/cpu/cpu0/regs/identification/midr_el1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechArm Cortex

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-668
  • Vendor Resources
  • ARM Security Center CVE-2024-5660
  • Latest CVEs
  • CVE-2025-9185: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9184: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9180: Mozilla Firefox Auth Bypass Vulnerability

  • CVE-2025-8030: Mozilla Firefox RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English