Improper input validation in kernel mode driver for some Intel(R) Server Board S2600ST Family firmware before version 02.01.0017 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01121.html | Vendor Advisory |
Configurations
History
12 Sep 2024, 18:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01121.html - Vendor Advisory | |
First Time |
Intel
Intel server Board S2600st Firmware |
|
CPE | cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
Summary |
|
14 Aug 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-14 14:15
Updated : 2024-09-12 18:52
NVD link : CVE-2024-28947
Mitre link : CVE-2024-28947
CVE.ORG link : CVE-2024-28947
JSON object : View
Products Affected
intel
- server_board_s2600st_firmware
CWE