Improper input validation in UEFI firmware in some Intel(R) Server Board M10JNP2SB Family may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
19 Nov 2024, 19:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
First Time |
Intel m10jnp2sb Firmware
Intel Intel m10jnp2sb |
|
CPE | cpe:2.3:o:intel:m10jnp2sb_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:m10jnp2sb:-:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html - Vendor Advisory |
15 Nov 2024, 14:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Nov 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-13 21:15
Updated : 2024-11-19 19:45
NVD link : CVE-2024-41167
Mitre link : CVE-2024-41167
CVE.ORG link : CVE-2024-41167
JSON object : View
Products Affected
intel
- m10jnp2sb
- m10jnp2sb_firmware
CWE