CVE-2024-27461
CVE-2024-27461: Intel(R) MAS (GUI) installer has incorrect default permissions leading to potential denial of service. Authenticated users with local access can exploit this vulnerability. The Intel MAS installer vulnerability, tracked as CVE-2024-27461, arises from improperly set default permissions. While its CVSS score is 5.5, indicating a medium severity, the SOCRadar Vulnerability Risk Score (SVRS) is 54. This suggests a moderate level of active threat intelligence associated with this CVE. An attacker could leverage this flaw to disrupt the normal functioning of the software. Immediate patching is advisable to prevent potential local attacks and system instability.
Description
CVE-2024-27461 is a vulnerability in the software installer for Intel(R) MAS (GUI) that could allow an authenticated user to enable denial of service via local access. The vulnerability is due to incorrect default permissions in the software installer.
Key Insights
- The SVRS for CVE-2024-27461 is 42, indicating a moderate risk.
- This vulnerability could allow an authenticated user to cause a denial of service on the affected system.
- The vulnerability is not currently being exploited in the wild.
- CISA has not issued a warning about this vulnerability.
Mitigation Strategies
- Update to the latest version of the software installer for Intel(R) MAS (GUI).
- Restrict access to the software installer to authorized users only.
- Implement a firewall to block unauthorized access to the affected system.
- Monitor the system for any suspicious activity.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.