CVE-2024-23918DEPRECATED: Improper Sanitization of Custom Special Characters in Intel-microcode

Severity
8.8HIGHNVD
OSV8.5
EPSS
0.1%
top 78.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 13
Latest updateDec 11

Description

Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Packages1 packages

debiandebian/intel-microcode< intel-microcode 3.20241112.1~deb12u1 (bookworm)

🔴Vulnerability Details

3
OSV
intel-microcode vulnerabilities2024-12-11
OSV
CVE-2024-23918: Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to p2024-11-13
GHSA
GHSA-39h6-pqr3-34cv: Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to p2024-11-13

📋Vendor Advisories

2
Ubuntu
Intel Microcode vulnerabilities2024-12-11
Debian
CVE-2024-23918: intel-microcode - Improper conditions check in some Intel(R) Xeon(R) processor memory controller c...2024