VYPR
Medium severity5.5NVD Advisory· Published Nov 13, 2024· Updated Apr 15, 2026

CVE-2024-36284

CVE-2024-36284

Description

Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Improper input validation in Intel Neural Compressor before v3.0 allows authenticated users to escalate privilege via adjacent access.

CVE-2024-36284 describes an improper input validation vulnerability in Intel(R) Neural Compressor software versions prior to 3.0. This flaw stems from insufficient validation of user-supplied input, which can be exploited by an authenticated attacker with adjacent network access.

An authenticated user must have local access to the system or be on the same network segment (adjacent) to exploit the vulnerability. No special privileges beyond authentication are required, but the attacker must be able to send crafted input to the affected component.

Successful exploitation could allow the attacker to escalate privileges, potentially gaining higher-level access than intended. This could lead to unauthorized actions or information disclosure within the context of the application.

The issue is resolved in Intel Neural Compressor version 3.0 and later. Users are advised to update to the latest release to mitigate the risk. Intel has published advisory INTEL-SA-01219 [1] with further details.

References
  1. INTEL-SA-01219

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.