Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34462 | Improper access control for some Intel(R) EMA software before version 1.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. |
Tue, 02 Sep 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intel endpoint Management Assistant
|
|
| CPEs | cpe:2.3:a:intel:endpoint_management_assistant:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Intel endpoint Management Assistant
|
Thu, 14 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intel
Intel ema Software |
|
| CPEs | cpe:2.3:a:intel:ema_software:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Intel
Intel ema Software |
|
| Metrics |
ssvc
|
Wed, 13 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper access control for some Intel(R) EMA software before version 1.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-11-14T19:37:18.350Z
Reserved: 2024-06-25T03:00:08.211Z
Link: CVE-2024-32483
Updated: 2024-11-14T15:18:37.420Z
Status : Analyzed
Published: 2024-11-13T21:15:18.270
Modified: 2025-09-02T15:32:30.753
Link: CVE-2024-32483
No data.
OpenCVE Enrichment
No data.
EUVD