First published: Wed Aug 14 2024(Updated: )
Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/intel-microcode | <=3.20231114.1~deb11u1<=3.20231114.1~deb12u1 | 3.20240813.1~deb11u1 3.20240813.1~deb12u1 3.20240813.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-24853 is categorized as high due to its potential to enable privilege escalation.
To fix CVE-2024-24853, update the intel-microcode package to version 3.20240813.1~deb11u1 or later.
CVE-2024-24853 affects systems using certain versions of Intel processors with the intel-microcode package on Debian.
If unable to update, limit physical access to the system to mitigate the risk associated with CVE-2024-24853.
As of now, there is no public indication that CVE-2024-24853 is actively exploited in the wild.