Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html | Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html - Vendor Advisory |
10 Oct 2024, 21:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:* | |
First Time |
Intel
Intel thunderbolt Dch Driver |
|
Summary |
|
14 Feb 2024, 15:02
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-14 14:15
Updated : 2024-11-21 07:48
NVD link : CVE-2023-24589
Mitre link : CVE-2023-24589
CVE.ORG link : CVE-2023-24589
JSON object : View
Products Affected
intel
- thunderbolt_dch_driver
CWE