First published: Thu Mar 14 2024(Updated: )
Uncontrolled resource consumption for some Intel(R) SPS firmware versions may allow a privileged user to potentially enable denial of service via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel SPS Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35191 has a high severity rating due to its potential to enable denial of service through uncontrolled resource consumption.
To mitigate CVE-2023-35191, it is recommended to update to the latest version of Intel SPS firmware that addresses this vulnerability.
The potential impacts of CVE-2023-35191 include system downtime and loss of availability due to denial of service conditions.
CVE-2023-35191 affects users of specific Intel SPS firmware versions, particularly those with privileged network access.
As of the last update, there have been no reported active exploits specifically targeting CVE-2023-35191.