Multiple vulnerabilities in Intel UEFI Firmware



Risk Low
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2023-43758
CVE-2023-34440
CVE-2024-24582
CVE-2024-29214
CVE-2024-28127
CVE-2024-39279
CVE-2024-31157
CVE-2024-28047
CWE-ID CWE-20
CWE-665
Exploitation vector Local
Public exploit N/A
Vulnerable software
UEFI firmware
Hardware solutions / Firmware

Intel Pentium Processor Silver Series
Hardware solutions / Firmware

Intel Celeron Processor J Series
Hardware solutions / Firmware

Intel Celeron Processor N Series
Hardware solutions / Firmware

12th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Pentium Gold Processor Series
Hardware solutions / Firmware

Intel Celeron Processors
Hardware solutions / Firmware

13th Generation Intel Core Processors
Hardware solutions / Firmware

Intel Core Ultra family
Hardware solutions / Firmware

Intel Atom Processor X Series
Hardware solutions / Firmware

Intel Xeon D Processors
Hardware solutions / Firmware

3rd Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware

Intel 4th Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware

Intel Atom Processor C5000
Hardware solutions / Firmware

Intel Atom Processor P5000 Series
Hardware solutions / Firmware

4th Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware

5th Generation Intel Xeon Scalable processors
Hardware solutions / Firmware

2nd Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware

1st Gen Intel Xeon Scalable processor
Hardware solutions / Firmware

Intel Xeon Processor W 3100
Hardware solutions / Firmware

Intel Xeon W processor 2200
Hardware solutions / Firmware

Intel Core X-series Processors
Hardware solutions / Firmware

Intel Xeon Processor W 2100
Hardware solutions / Firmware

Intel Xeon W2400 processor
Hardware solutions / Other hardware appliances

Intel Xeon W3400 Processor
Hardware solutions / Other hardware appliances

Vendor Intel

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU104031

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-43758

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can pass specially crafted input to the application and gain elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

Intel Pentium Processor Silver Series: All versions

Intel Celeron Processor J Series: All versions

Intel Celeron Processor N Series: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU104033

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-34440

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can pass specially crafted input to the application and gain elevated privileges.

Mitigation

Install update from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

Intel Pentium Processor Silver Series: All versions

Intel Celeron Processor J Series: All versions

Intel Celeron Processor N Series: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU104036

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-24582

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in XmlCli feature. A local administrator can pass specially crafted input to the application and gain elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

12th Generation Intel Core Processors: All versions

Intel Pentium Gold Processor Series: All versions

Intel Celeron Processors: All versions

13th Generation Intel Core Processors: All versions

Intel Core Ultra family: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU104037

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-29214

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in CseVariableStorageSmm. A local administrator can pass specially crafted input to the application and gain elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

Intel Pentium Processor Silver Series: All versions

Intel Celeron Processor J Series: All versions

Intel Celeron Processor N Series: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

EUVDB-ID: #VU104038

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-28127

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can pass specially crafted input to the application and gain elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

Intel Atom Processor X Series: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU104039

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39279

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient granularity of access control. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

Intel Xeon D Processors: All versions

3rd Generation Intel Xeon Scalable Processors: All versions

Intel 4th Generation Intel Xeon Scalable Processors: All versions

Intel Atom Processor C5000: All versions

Intel Atom Processor P5000 Series: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper Initialization

EUVDB-ID: #VU104040

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-31157

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper initialization in OutOfBandXML module. A local user can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

4th Generation Intel Xeon Scalable Processors: All versions

5th Generation Intel Xeon Scalable processors: All versions

Intel Xeon W2400 processor: All versions

Intel Xeon W3400 Processor: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Input validation error

EUVDB-ID: #VU104041

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-28047

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

Intel Xeon D Processors: All versions

3rd Generation Intel Xeon Scalable Processors: All versions

4th Generation Intel Xeon Scalable Processors: All versions

5th Generation Intel Xeon Scalable processors: All versions

2nd Generation Intel Xeon Scalable Processors: All versions

1st Gen Intel Xeon Scalable processor: All versions

Intel Xeon Processor W 3100: All versions

Intel Xeon W processor 2200: All versions

Intel Core X-series Processors: All versions

Intel Xeon Processor W 2100: All versions

Intel Atom Processor C5000: All versions

Intel Atom Processor P5000 Series: All versions

Intel Xeon W2400 processor: All versions

Intel Xeon W3400 Processor: All versions

CPE2.3 External links

https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###