CVE-2025-24305

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24305
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-24305.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-24305
Downstream
Published
2025-08-12T17:15:33Z
Modified
2025-08-19T14:00:41Z
Summary
[none]
Details

Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.

References

Affected packages