Uncontrolled search path for the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
History

Thu, 14 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Intel
Intel server Board S2600st Firmware
CPEs cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*
Vendors & Products Intel
Intel server Board S2600st Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
Description Uncontrolled search path for the Intel(R) Server Board S2600ST Family BIOS and Firmware Update software all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published: 2024-11-13T21:11:37.417Z

Updated: 2024-11-14T19:48:57.126Z

Reserved: 2024-05-31T03:00:04.186Z

Link: CVE-2024-34167

cve-icon Vulnrichment

Updated: 2024-11-14T19:48:22.764Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-13T21:15:21.013

Modified: 2024-11-15T14:00:09.720

Link: CVE-2024-34167

cve-icon Redhat

No data.