Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4095-1 intel-microcode security update
EUVD EUVD EUVD-2024-21986 Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00023}

epss

{'score': 0.00024}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00021}

epss

{'score': 0.00023}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00039}

epss

{'score': 0.00021}


Fri, 21 Mar 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux
Redhat rhel Els
CPEs cpe:/o:redhat:enterprise_linux:9
cpe:/o:redhat:rhel_aus:8.2
cpe:/o:redhat:rhel_aus:8.4
cpe:/o:redhat:rhel_e4s:8.4
cpe:/o:redhat:rhel_e4s:9.0
cpe:/o:redhat:rhel_els:7
cpe:/o:redhat:rhel_eus:8.8
cpe:/o:redhat:rhel_eus:9.2
cpe:/o:redhat:rhel_tus:8.4
Vendors & Products Redhat enterprise Linux
Redhat rhel Els

Thu, 20 Mar 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/o:redhat:rhel_aus:7.7
cpe:/o:redhat:rhel_aus:8.6
cpe:/o:redhat:rhel_e4s:8.6
cpe:/o:redhat:rhel_eus:9.4
cpe:/o:redhat:rhel_tus:8.6
Vendors & Products Redhat
Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus

Fri, 14 Feb 2025 01:45:00 +0000

Type Values Removed Values Added
Title microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware
References
Metrics threat_severity

None

threat_severity

Important


Thu, 13 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 21:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2025-11-03T20:36:50.996Z

Reserved: 2024-03-27T03:00:07.339Z

Link: CVE-2024-24582

cve-icon Vulnrichment

Updated: 2025-11-03T20:36:50.996Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-12T22:15:31.367

Modified: 2025-11-03T21:16:07.060

Link: CVE-2024-24582

cve-icon Redhat

Severity : Important

Publid Date: 2025-02-12T21:19:27Z

Links: CVE-2024-24582 - Bugzilla

cve-icon OpenCVE Enrichment

No data.