VYPR
Low severity2.3NVD Advisory· Published Feb 12, 2025· Updated Apr 15, 2026

CVE-2024-25571

CVE-2024-25571

Description

Improper input validation in some Intel(R) SPS firmware before SPS_E5_06.01.04.059.0 may allow a privileged user to potentially enable denial of service via local access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A low-severity input validation flaw in Intel SPS firmware allows a privileged user to cause denial of service via local access.

CVE-2024-25571 describes an improper input validation vulnerability in some Intel(R) Server Platform Services (SPS) firmware prior to version SPS_E5_06.01.04.059.0. The root cause is insufficient validation of user-supplied input within the firmware, which can be triggered by a privileged user with local system access.

Exploitation of this vulnerability requires an attacker to have local access and elevated privileges on the affected system. The low CVSS score (2.3) reflects the high prerequisites needed for exploitation, as the attacker must already have privileged credentials or physical/logical access to the platform.

If successfully exploited, an attacker could cause a denial of service condition, potentially leading to system instability or temporary unavailability of the platform. Intel's advisory recommends updating the firmware to SPS_E5_06.01.04.059.0 or later to remediate the issue [1]. No workarounds or additional mitigations have been provided by the vendor.

References
  1. INTEL-SA-01120

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.