First published: Wed Feb 12 2025(Updated: )
Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Driver & Support Assistant | ||
Intel Xeon Processors Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-37020 is classified as high due to the potential for denial of service through local access.
To mitigate CVE-2024-37020, users should update to the latest software provided by Intel for DSA V1.0 and affected Xeon processors.
CVE-2024-37020 affects authenticated users of Intel DSA V1.0 and various Intel Xeon processors.
CVE-2024-37020 may allow an authenticated user to cause a denial of service, leading to unexpected behavior.
The associated products with CVE-2024-37020 include Intel DSA V1.0 and certain Intel Xeon processors.