Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for select Intel platforms
This issue affects:
Phoenix
SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;
Phoenix
SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;
Phoenix
SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;
Phoenix
SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;
Phoenix
SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;
Phoenix
SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;
Phoenix
SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;
Phoenix
SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;
Phoenix
SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Phoenix
Phoenix securecore Technology |
|
CPEs | cpe:2.3:a:phoenix:securecore_technology:4.0.1.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.2.1.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.3.1.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.4.0.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.5.0.1:*:*:*:*:*:*:* cpe:2.3:a:phoenix:securecore_technology:4.5.1.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Phoenix
Phoenix securecore Technology |
|
Metrics |
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Potential buffer overflow in unsafe UEFI variable handling in Phoenix SecureCore™ for select Intel platforms This issue affects: Phoenix SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998; Phoenix SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562; Phoenix SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323; Phoenix SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287; Phoenix SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236; Phoenix SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184; Phoenix SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269; Phoenix SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218; Phoenix SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15. | Potential buffer overflow in unsafe UEFI variable handling in Phoenix SecureCore™ for select Intel platforms This issue affects: Phoenix SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998; Phoenix SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562; Phoenix SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323; Phoenix SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287; Phoenix SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236; Phoenix SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184; Phoenix SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269; Phoenix SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218; Phoenix SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15. |

Status: PUBLISHED
Assigner: Phoenix
Published:
Updated: 2025-02-13T17:27:19.711Z
Reserved: 2024-01-19T20:40:59.164Z
Link: CVE-2024-0762

Updated: 2024-08-01T18:18:17.893Z

Status : Awaiting Analysis
Published: 2024-05-14T16:15:53.287
Modified: 2025-02-13T18:16:15.227
Link: CVE-2024-0762

No data.