CVE-2024-4760

Public Exploit
Voltage glitch during startup of the EEFC NVM controller can bypass the security bit

Description

A voltage glitch during the startup of EEFC NVM controllers on Microchip SAM E70/S70/V70/V71, SAM G55, SAM 4C/4S/4N/4E, and SAM 3S/3N/3U microcontrollers allows access to the memory bus via the debug interface even if the security bit is set.

Remediation

Workaround:

  • Please contact Microchip to obtain the appropriate patch for your devices, which are available as binary code updates.

Category

6.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.06%
Vendor Advisory microchip.com
Affected: Microchip SAME70
Affected: Microchip SAMS70
Affected: Microchip SAMV70
Affected: Microchip SAMV71
Affected: Microchip SAMG55
Affected: Microchip SAM4C
Affected: Microchip SAM4S
Affected: Microchip SAM4N
Affected: Microchip SAM4E
Affected: Microchip SAM3S
Affected: Microchip SAM3N
Affected: Microchip SAM3U
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-4760?
CVE-2024-4760 has been scored as a medium severity vulnerability.
How to fix CVE-2024-4760?
As a workaround for remediating CVE-2024-4760: Please contact Microchip to obtain the appropriate patch for your devices, which are available as binary code updates.
Is CVE-2024-4760 being actively exploited in the wild?
It is possible that CVE-2024-4760 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-4760?
CVE-2024-4760 affects Microchip SAME70, Microchip SAMS70, Microchip SAMV70, Microchip SAMV71, Microchip SAMG55, Microchip SAM4C, Microchip SAM4S, Microchip SAM4N, Microchip SAM4E, Microchip SAM3S, Microchip SAM3N, Microchip SAM3U.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.