CVE-2024-0762
CVE-2024-0762 is a potential buffer overflow vulnerability in Phoenix SecureCore™ UEFI firmware affecting select Intel platforms. This flaw arises from unsafe handling of UEFI variables, potentially allowing attackers to execute arbitrary code. The vulnerability impacts various Intel platforms including Kaby Lake, Coffee Lake, Ice Lake, Comet Lake, Tiger Lake, Jasper Lake, Alder Lake, Raptor Lake and Meteor Lake. While the CVSS score is 7.5 (High), SOCRadar's Vulnerability Risk Score (SVRS) is 36, indicating a moderate level of concern based on threat actor activity and exploit availability. Although not critical based on the SVRS threshold of 80, organizations using affected Phoenix SecureCore™ versions on their Intel platforms should apply the recommended firmware updates to mitigate the risk. Failure to patch can lead to system instability or potentially, remote code execution, making timely updates crucial.
Description
CVE-2024-0762 is a potential buffer overflow vulnerability in unsafe UEFI variable handling in Phoenix SecureCore™ for select Intel platforms. This vulnerability could allow an attacker to execute arbitrary code with system privileges.
Key Insights
- The SVRS of 44 indicates a moderate risk, but the vulnerability is actively exploited in the wild, making it a critical threat.
- The vulnerability affects multiple versions of Phoenix SecureCore™ for various Intel platforms, including Kaby Lake, Coffee Lake, Ice Lake, Comet Lake, Tiger Lake, Jasper Lake, Alder Lake, Raptor Lake, and Meteor Lake.
- The vulnerability could allow attackers to gain complete control of affected systems, including installing malware, stealing sensitive data, or disrupting operations.
Mitigation Strategies
- Update to the latest version of Phoenix SecureCore™ for the affected platform.
- Implement strong security measures, such as firewalls, intrusion detection systems, and anti-malware software.
- Regularly monitor systems for suspicious activity and apply security patches promptly.
- Restrict access to sensitive data and systems to authorized personnel only.
Additional Information
- The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
- Active exploits have been published, making it essential to take immediate action to mitigate the risk.
- If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.