SB2024052236 - Multiple vulnerabilities in Intel Server Products UEFI Firmware
Published: May 22, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2024-22382)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PprRequestLog module. A local administrator can pass specially crafted input to the application and gain elevated privileges.
2) Input validation error (CVE-ID: CVE-2024-23487)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in UserAuthenticationSmm driver. A local administrator can pass specially crafted input to the application and gain elevated privileges.
3) Input validation error (CVE-ID: CVE-2024-24981)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PfrSmiUpdateFw driver. A local administrator can pass specially crafted input to the application and gain elevated privileges.
4) Buffer overflow (CVE-ID: CVE-2024-23980)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in PlatformPfrDxe driver. A local administrator can trigger memory corruption and execute arbitrary code on the target system with elevated privileges.
5) Input validation error (CVE-ID: CVE-2024-22095)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PlatformVariableInitDxe driver. A local administrator can pass specially crafted input to the application and gain elevated privileges.
6) Input validation error (CVE-ID: CVE-2023-22662)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input of EpsdSrMgmtConfig. A local administrator can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.