First published: Wed Aug 14 2024(Updated: )
Improper access control in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel 800 Series Ethernet Driver | <28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24986 has a critical severity rating due to its potential to allow privilege escalation.
To fix CVE-2024-24986, upgrade the Intel Ethernet 800 Series Controllers Driver to version 28.3 or later.
CVE-2024-24986 affects users of Intel Ethernet Network Controllers and Adapters using an outdated driver version before 28.3.
CVE-2024-24986 requires local access for exploitation, as it involves improper access control in a kernel mode driver.
CVE-2024-24986 is a vulnerability in the Intel Ethernet kernel driver that could allow an authenticated user to escalate privileges.