CVE-2020-24489
high-risk
Published 2021-06-09
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
Celeron J1750
Celeron J1800
Celeron J1850
Celeron J1900
Celeron J3060
Celeron J3160
Celeron J3355
Celeron J3355E
Celeron J3455
Celeron J3455E
Celeron J4005
Celeron J4025
Celeron J4105
Celeron J4115
Celeron J4125
Celeron J6412
Celeron J6413
References (6)
Third Party Advisory
https://www.debian.org/security/2021/dsa-4934
Third Party Advisory
https://www.debian.org/security/2021/dsa-4934
60
/ 100
high-risk
Severity
27/34 · High
Exploitability
0/34 · Minimal
Exposure
33/34 · Critical