First published: Wed Jun 09 2021(Updated: )
Improper input validation in the Intel(R) SPS versions before SPS_E5_04.04.04.023.0, SPS_E5_04.04.03.228.0 or SPS_SoC-A_05.00.03.098.0 may allow a privileged user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Server Platform Services | <sps_e5_04.04.04.023.0 | |
Intel C621 | ||
Intel C622 | ||
Intel C624 | ||
Intel C624a | ||
Intel C625 | ||
Intel C626 | ||
Intel C627 | ||
Intel C627a | ||
Intel C628 | ||
Intel C629 | ||
Intel C629a | ||
Intel Server Platform Services | <sps_e5_04.04.03.228.0 | |
Intel Server Platform Services | <sps_soc-a_05.00.03.098.0 | |
Intel Atom P5921b | ||
Intel Atom P5931b | ||
Intel Atom P5942b | ||
Intel Atom P5962b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-0051 is a vulnerability in Intel(R) SPS versions before SPS_E5_04.04.04.023.0, SPS_E5_04.04.03.228.0, or SPS_SoC-A_05.00.03.098.0 that may allow a privileged user to potentially enable denial of service via local access.
CVE-2021-0051 has a severity rating of 4.4 (medium severity).
CVE-2021-0051 affects Intel Server Platform Services versions before SPS_E5_04.04.04.023.0 and SPS_E5_04.04.03.228.0, as well as SPS_SoC-A version 05.00.03.098.0.
A privileged user can potentially enable denial of service by exploiting CVE-2021-0051 via local access.
You can find more information about CVE-2021-0051 at the following references: [1] https://security.netapp.com/advisory/ntap-20210716-0001/ [2] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00500.html