Armis Logo< Back

CVE-2026-37540:

An integer overflow vulnerability in OpenAMP v2025.10.0's ELF loader allows an attacker to supply a malicious firmware image that causes a wrapped-around memory calculation, potentially leading to full system compromise on 32-bit embedded platforms.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

8.4High
  • Published Date:May 1, 2026
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Threat Predictions

  • EPSS Score:0.0
  • EPSS Percentile:2%

Exploitability

  • Score:2.5
  • Attack Vector:LOCAL
  • Attack Complexity:LOW
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:5.9
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

An integer overflow vulnerability in OpenAMP v2025.10.0's ELF loader allows an attacker to supply a malicious firmware image that causes a wrapped-around memory calculation, potentially leading to full system compromise on 32-bit embedded platforms.

Overview

CVE-2026-37540 is a HIGH severity (CVSS 8.4) integer overflow vulnerability affecting OpenAMP v2025.10.0, an open-source framework widely used to implement asymmetric multiprocessing on embedded systems. The flaw resides in the ELF firmware image parser within `elf_loader.c`, where the product of two 16-bit values sourced directly from the ELF header is computed without validation. On 32-bit embedded targets including STM32MP1, Zynq, and i.MX SoCs, this unchecked multiplication can wrap around to a deceptively small value, causing subsequent memory operations to act on undersized buffers. A local attacker with no privileges or user interaction required can supply a crafted firmware image to exploit this flaw, resulting in complete loss of confidentiality, integrity, and availability on the affected device.

Remediation

  • At the time of publication there is no official patch confirmed from the OpenAMP project. Recommended mitigations include the following actions. Audit and update `elf_loader.c` to validate all ELF header fields before performing arithmetic operations, replacing unchecked multiplications with safe integer arithmetic routines or explicit overflow guards (e.g., using `__builtin_mul_overflow` or equivalent). Restrict the sources from which firmware images are loaded to trusted, cryptographically signed images, preventing attacker-controlled ELF headers from reaching the vulnerable parser. Monitor the official OpenAMP repository at https://github.com/OpenAMP/open-amp for patches or updated releases and apply them promptly. Implement firmware integrity verification at the bootloader level on affected platforms (STM32MP1, Zynq, i.MX) to reduce exposure until an upstream fix is available.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!