Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
Metrics
Affected Vendors & Products
References
History
Wed, 14 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Intel
Intel ethernet Complete Driver Pack |
|
CPEs | cpe:2.3:a:intel:ethernet_complete_driver_pack:*:*:*:*:*:*:*:* | |
Vendors & Products |
Intel
Intel ethernet Complete Driver Pack |
|
Metrics |
ssvc
|
Wed, 14 Aug 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-16T04:01:25.878Z
Reserved: 2024-02-14T04:00:11.441Z
Link: CVE-2024-21810

Updated: 2024-08-14T14:25:04.363Z

Status : Awaiting Analysis
Published: 2024-08-14T14:15:17.167
Modified: 2024-08-14T17:49:14.177
Link: CVE-2024-21810

No data.