Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26013 | Improper input validation in kernel mode driver for some Intel(R) Server Board S2600ST Family firmware before version 02.01.0017 may allow a privileged user to potentially enable escalation of privilege via local access. |
Thu, 12 Sep 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo |
Wed, 14 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intel
Intel server Board S2600st Firmware |
|
| CPEs | cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Intel
Intel server Board S2600st Firmware |
|
| Metrics |
ssvc
|
Wed, 14 Aug 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation in kernel mode driver for some Intel(R) Server Board S2600ST Family firmware before version 02.01.0017 may allow a privileged user to potentially enable escalation of privilege via local access. | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-22T03:55:15.276Z
Reserved: 2024-03-15T03:00:05.755Z
Link: CVE-2024-28947
Updated: 2024-08-14T14:09:44.466Z
Status : Analyzed
Published: 2024-08-14T14:15:26.017
Modified: 2024-09-12T18:52:38.433
Link: CVE-2024-28947
No data.
OpenCVE Enrichment
No data.
EUVD