Improper input validation in some Intel(R) CIP software before version 2.4.10852 may allow a privileged user to potentially enable escalation of privilege via local access.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Feb 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Intel computing Improvement Program
|
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:* | |
Vendors & Products |
Intel computing Improvement Program
|
Thu, 14 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Intel
Intel cip Software |
|
CPEs | cpe:2.3:a:intel:cip_software:*:*:*:*:*:*:*:* | |
Vendors & Products |
Intel
Intel cip Software |
|
Metrics |
ssvc
|
Wed, 13 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper input validation in some Intel(R) CIP software before version 2.4.10852 may allow a privileged user to potentially enable escalation of privilege via local access. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-11-14T19:39:43.978Z
Reserved: 2024-06-15T03:00:08.604Z
Link: CVE-2024-36482

Updated: 2024-11-14T16:02:14.424Z

Status : Analyzed
Published: 2024-11-13T21:15:24.287
Modified: 2025-02-04T18:27:28.993
Link: CVE-2024-36482

No data.