First published: Wed Feb 12 2025(Updated: )
Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel UEFI Firmware | ||
debian/intel-microcode | <=3.20240813.1~deb11u1<=3.20241112.1~deb11u1<=3.20241112.1~deb12u1<=3.20231114.1~deb12u1<=3.20241112.1 | 3.20250211.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39279 is classified as a medium-severity vulnerability due to its potential to enable denial of service.
To mitigate CVE-2024-39279, users should update their Intel UEFI firmware to the latest version provided by Intel.
CVE-2024-39279 affects systems that utilize specific Intel UEFI firmware in their processors.
An authenticated user may exploit CVE-2024-39279 to potentially enable denial of service through local access.
CVE-2024-39279 involves insufficient granularity of access control in UEFI firmware, allowing unauthorized actions by authenticated users.