First published: Tue Nov 14 2023(Updated: )
Use after free in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allowed an authenticated user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Aptio V Uefi Firmware Integrator Tools | =5.27.03.0003 | |
Microsoft Windows | ||
Intel Aptio V Uefi Firmware Integrator Tools | =5.27.06.0017 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2023-26589 is a use after free vulnerability in some Intel(R) Aptio* V UEFI Firmware Integrator Tools.
Vulnerability CVE-2023-26589 allows an authenticated user to potentially enable denial of service via local access.
Vulnerability CVE-2023-26589 affects Intel Aptio V UEFI Firmware Integrator Tools version 5.27.03.0003 and 5.27.06.0017.
No, Microsoft Windows is not affected by vulnerability CVE-2023-26589.
No, Linux Linux kernel is not affected by vulnerability CVE-2023-26589.
The severity of vulnerability CVE-2023-26589 is medium with a CVSS score of 6.5.
To fix vulnerability CVE-2023-26589, it is recommended to update to the latest version of Intel Aptio V UEFI Firmware Integrator Tools.
More information about vulnerability CVE-2023-26589 can be found at the following link: [Intel Security Advisory INTEL-SA-00908](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html).
Vulnerability CVE-2023-26589 belongs to the CWE category 416: Use After Free.