Multiple vulnerabilities in Intel UEFI Firmware



Risk Low
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2024-31155
CVE-2024-21859
CWE-ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
UEFI firmware
Hardware solutions / Firmware

4th Generation Intel Xeon Scalable Processors
Hardware solutions / Firmware

5th Generation Intel Xeon Scalable processors
Hardware solutions / Firmware

Intel Xeon W2400 processor
Hardware solutions / Other hardware appliances

Intel Xeon W3400 Processor
Hardware solutions / Other hardware appliances

Vendor Intel

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU104008

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-31155

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the UEFI firmware. A local administrator can trigger memory corruption and execute arbitrary code on the target system with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

4th Generation Intel Xeon Scalable Processors: All versions

5th Generation Intel Xeon Scalable processors: All versions

Intel Xeon W2400 processor: All versions

Intel Xeon W3400 Processor: All versions

CPE2.3 External links

http://intel.com/content/www/us/en/security-center/advisory/intel-sa-01198.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU104009

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-21859

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary error in the UEFI firmware. A local administrator can trigger memory corruption and gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UEFI firmware: All versions

4th Generation Intel Xeon Scalable Processors: All versions

5th Generation Intel Xeon Scalable processors: All versions

Intel Xeon W2400 processor: All versions

Intel Xeon W3400 Processor: All versions

CPE2.3 External links

http://intel.com/content/www/us/en/security-center/advisory/intel-sa-01198.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###