Arm Development Studio Arm Development Studio

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Arm Development Studio.

By the Year

In 2026 there have been 0 vulnerabilities in Arm Development Studio. Last year, in 2025 Arm Development Studio had 1 security vulnerability published. Right now, Arm Development Studio is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 0 0.00
2023 3 7.80

It may take a day or so for new Arm Development Studio vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Arm Development Studio Security Vulnerabilities

Arm Development Studio DLL Hijacking RCE via Uncontrolled Search Path
CVE-2025-7427 - July 22, 2025

Uncontrolled Search Path Element in Arm Development Studio before 2025 may allow an attacker to perform a DLL hijacking attack. Successful exploitation could lead to local arbitrary code execution in the context of the user running Arm Development Studio.

Unconstrained Search Path Enables File Substitutions in Installer
CVE-2022-43703 7.8 - High - July 27, 2023

An installer that loads or executes files using an unconstrained search path may be vulnerable to substitute files under control of an attacker being loaded or executed instead of the intended files.

DLL preloading

Installer Permission Flaw Enables Code Exec (CVE-2022-43702)
CVE-2022-43702 7.8 - High - July 27, 2023

When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.

Incorrect Default Permissions

CVE-2022-43701: Undesirable file permissions in install dir allow malicious code exec
CVE-2022-43701 7.8 - High - July 27, 2023

When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.

Incorrect Default Permissions

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Arm Development Studio or by Arm? Click the Watch button to subscribe.

Arm
Vendor

subscribe