First published: Wed Nov 13 2024(Updated: )
Improper Input Validation in some Intel(R) VROC software before version 8.6.0.2003 may allow an authenticated user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel VROC | <8.6.0.2003 | |
<8.6.0.2003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32485 has a medium severity level due to its potential to allow denial of service under specific conditions.
To fix CVE-2024-32485, upgrade Intel VROC software to version 8.6.0.2003 or later.
CVE-2024-32485 affects authenticated users of Intel VROC software before version 8.6.0.2003.
CVE-2024-32485 is classified as an improper input validation vulnerability.
CVE-2024-32485 cannot be exploited remotely as it requires local access and authenticated user privileges.