First published: Wed Jun 09 2021(Updated: )
Insufficient control flow management in subsystem in Intel(R) SPS versions before SPS_E3_05.01.04.300.0, SPS_SoC-A_05.00.03.091.0, SPS_E5_04.04.04.023.0, or SPS_E5_04.04.03.263.0 may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Server Platform Services | <sps_soc-a_05.00.03.091.0 | |
Intel Server Platform Services | =sps_e3_05.01.04.300.0 | |
Intel Server Platform Services | =sps_e5_04.04.03.263.0 | |
Intel Server Platform Services | =sps_e5_04.04.04.023.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-24509.
The severity of CVE-2020-24509 is medium with a severity value of 6.7.
Intel(R) SPS versions before SPS_E3_05.01.04.300.0, SPS_SoC-A_05.00.03.091.0, SPS_E5_04.04.04.023.0, or SPS_E5_04.04.03.263.0 are affected by CVE-2020-24509.
CVE-2020-24509 may allow a privileged user to potentially enable escalation of privilege via local access.
To fix CVE-2020-24509, update your Intel(R) SPS software to versions SPS_E3_05.01.04.300.0, SPS_SoC-A_05.00.03.091.0, SPS_E5_04.04.04.023.0, or SPS_E5_04.04.03.263.0.