Risk | Low |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2023-43758 CVE-2023-34440 CVE-2024-24582 CVE-2024-29214 CVE-2024-28127 CVE-2024-39279 CVE-2024-31157 CVE-2024-28047 |
CWE-ID | CWE-20 CWE-665 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
UEFI firmware Hardware solutions / Firmware Intel Pentium Processor Silver Series Hardware solutions / Firmware Intel Celeron Processor J Series Hardware solutions / Firmware Intel Celeron Processor N Series Hardware solutions / Firmware 12th Generation Intel Core Processors Hardware solutions / Firmware Intel Pentium Gold Processor Series Hardware solutions / Firmware Intel Celeron Processors Hardware solutions / Firmware 13th Generation Intel Core Processors Hardware solutions / Firmware Intel Core Ultra family Hardware solutions / Firmware Intel Atom Processor X Series Hardware solutions / Firmware Intel Xeon D Processors Hardware solutions / Firmware 3rd Generation Intel Xeon Scalable Processors Hardware solutions / Firmware Intel 4th Generation Intel Xeon Scalable Processors Hardware solutions / Firmware Intel Atom Processor C5000 Hardware solutions / Firmware Intel Atom Processor P5000 Series Hardware solutions / Firmware 4th Generation Intel Xeon Scalable Processors Hardware solutions / Firmware 5th Generation Intel Xeon Scalable processors Hardware solutions / Firmware 2nd Generation Intel Xeon Scalable Processors Hardware solutions / Firmware 1st Gen Intel Xeon Scalable processor Hardware solutions / Firmware Intel Xeon Processor W 3100 Hardware solutions / Firmware Intel Xeon W processor 2200 Hardware solutions / Firmware Intel Core X-series Processors Hardware solutions / Firmware Intel Xeon Processor W 2100 Hardware solutions / Firmware Intel Xeon W2400 processor Hardware solutions / Other hardware appliances Intel Xeon W3400 Processor Hardware solutions / Other hardware appliances |
Vendor | Intel |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU104031
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-43758
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can pass specially crafted input to the application and gain elevated privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
Intel Pentium Processor Silver Series: All versions
Intel Celeron Processor J Series: All versions
Intel Celeron Processor N Series: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104033
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-34440
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can pass specially crafted input to the application and gain elevated privileges.
MitigationInstall update from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
Intel Pentium Processor Silver Series: All versions
Intel Celeron Processor J Series: All versions
Intel Celeron Processor N Series: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104036
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-24582
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in XmlCli feature. A local administrator can pass specially crafted input to the application and gain elevated privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
12th Generation Intel Core Processors: All versions
Intel Pentium Gold Processor Series: All versions
Intel Celeron Processors: All versions
13th Generation Intel Core Processors: All versions
Intel Core Ultra family: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104037
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-29214
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in CseVariableStorageSmm. A local administrator can pass specially crafted input to the application and gain elevated privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
Intel Pentium Processor Silver Series: All versions
Intel Celeron Processor J Series: All versions
Intel Celeron Processor N Series: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104038
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-28127
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can pass specially crafted input to the application and gain elevated privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
Intel Atom Processor X Series: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104039
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39279
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient granularity of access control. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
Intel Xeon D Processors: All versions
3rd Generation Intel Xeon Scalable Processors: All versions
Intel 4th Generation Intel Xeon Scalable Processors: All versions
Intel Atom Processor C5000: All versions
Intel Atom Processor P5000 Series: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104040
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-31157
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper initialization in OutOfBandXML module. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
4th Generation Intel Xeon Scalable Processors: All versions
5th Generation Intel Xeon Scalable processors: All versions
Intel Xeon W2400 processor: All versions
Intel Xeon W3400 Processor: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104041
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-28047
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUEFI firmware: All versions
Intel Xeon D Processors: All versions
3rd Generation Intel Xeon Scalable Processors: All versions
4th Generation Intel Xeon Scalable Processors: All versions
5th Generation Intel Xeon Scalable processors: All versions
2nd Generation Intel Xeon Scalable Processors: All versions
1st Gen Intel Xeon Scalable processor: All versions
Intel Xeon Processor W 3100: All versions
Intel Xeon W processor 2200: All versions
Intel Core X-series Processors: All versions
Intel Xeon Processor W 2100: All versions
Intel Atom Processor C5000: All versions
Intel Atom Processor P5000 Series: All versions
Intel Xeon W2400 processor: All versions
Intel Xeon W3400 Processor: All versions
CPE2.3https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.