CVE-2024-25571
Description
Improper input validation in some Intel(R) SPS firmware before SPS_E5_06.01.04.059.0 may allow a privileged user to potentially enable denial of service via local access.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A low-severity input validation flaw in Intel SPS firmware allows a privileged user to cause denial of service via local access.
CVE-2024-25571 describes an improper input validation vulnerability in some Intel(R) Server Platform Services (SPS) firmware prior to version SPS_E5_06.01.04.059.0. The root cause is insufficient validation of user-supplied input within the firmware, which can be triggered by a privileged user with local system access.
Exploitation of this vulnerability requires an attacker to have local access and elevated privileges on the affected system. The low CVSS score (2.3) reflects the high prerequisites needed for exploitation, as the attacker must already have privileged credentials or physical/logical access to the platform.
If successfully exploited, an attacker could cause a denial of service condition, potentially leading to system instability or temporary unavailability of the platform. Intel's advisory recommends updating the firmware to SPS_E5_06.01.04.059.0 or later to remediate the issue [1]. No workarounds or additional mitigations have been provided by the vendor.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.