Improper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| intel | server_platform_services | sps_e3_04.00.00.000.0 - sps_e3_04.01.04.109.0 | - |
| intel | server_platform_services | sps_e3_04.08.00.000.0 - sps_e3_04.08.04.070.0 | - |
| intel | server_platform_services |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5
Affected Products
10
References
intel / server_platform_services
| sps_e5_04.00.00.000.0 - sps_e5_04.01.04.380.0 |
| - |
| intel | server_platform_services | sps_soc-a_04.00.00.000.0 - sps_soc-a_04.00.04.211.0 | - |
| intel | server_platform_services | sps_soc-x_04.00.00.000.0 - sps_soc-x_04.00.04.128.0 | - |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact