First published: Wed Aug 14 2024(Updated: )
Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Ethernet Network Controllers and Adapters | <28.3 | |
Linux Kernel | <28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21810 has a high severity rating due to its potential for privilege escalation.
To fix CVE-2024-21810, update to the latest version of the affected Intel Ethernet Network Controllers and Adapters or Linux kernel, version 28.3 or later.
CVE-2024-21810 affects users of Intel Ethernet Network Controllers and Adapters and Linux kernel versions prior to 28.3.
The exploit vector for CVE-2024-21810 requires local access by an authenticated user.
No, CVE-2024-21810 cannot lead to remote attacks as it requires local authenticated access.