Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31376 | An exploit is possible where an actor with physical access can manipulate SPI flash without being detected. |
Thu, 02 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ami
Ami aptio V |
|
| CPEs | cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ami
Ami aptio V |
Tue, 12 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 12 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An exploit is possible where an actor with physical access can manipulate SPI flash without being detected. | |
| Title | Potential Firmware update without integrity check | |
| Weaknesses | CWE-494 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: AMI
Published:
Updated: 2024-11-21T16:22:25.320Z
Reserved: 2024-04-25T13:29:51.809Z
Link: CVE-2024-33660
Updated: 2024-11-12T15:57:23.058Z
Status : Analyzed
Published: 2024-11-12T15:15:08.727
Modified: 2025-10-02T14:32:14.733
Link: CVE-2024-33660
No data.
OpenCVE Enrichment
No data.
EUVD