Vulnerability Description
Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2024/05/15/1
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.
- http://www.openwall.com/lists/oss-security/2024/05/15/1
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.
FAQ
What is CVE-2024-21823?
CVE-2024-21823 is a vulnerability with a CVSS score of 7.5 (HIGH). Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalatio...
How severe is CVE-2024-21823?
CVE-2024-21823 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21823?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.