First published: Wed Feb 12 2025(Updated: )
CVE-2024-39279 Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access. CVE-2024-28047 Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS | =1.8.0>=1.5.1<=1.5.2 | |
F5 F5OS | =1.8.0>=1.6.0<=1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-28047 is rated as high due to the potential for privilege escalation and impact on system integrity.
To fix CVE-2024-28047, you should update the UEFI firmware to the latest version provided by your hardware vendor.
CVE-2024-28047 affects F5 F5OS-A and F5 F5OS-C versions specified in the advisory details.
CVE-2024-28047 requires local access to the system, reducing the likelihood of a remote exploitation.
Mitigation strategies for CVE-2024-28047 include restricting physical access to the affected systems and applying firmware updates promptly.