CVE-2024-0762
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
14/05/2024
Last modified:
29/09/2025
Description
Potential buffer overflow <br />
in unsafe UEFI variable handling <br />
<br />
in Phoenix SecureCore™ for select Intel platforms<br />
<br />
<br />
This issue affects:<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;<br />
<br />
<br />
Phoenix <br />
<br />
SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:* | 4.0.1.1 (including) | 4.0.1.998 (excluding) |
| cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-7020u:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-7100:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-7100h:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-7100t:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-7100u:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-7101e:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:intel:core_i3-7101te:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/
- https://news.ycombinator.com/item?id=40747852
- https://phoenixtech.com/phoenix-security-notifications/CVE-2024-0762/
- https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/
- https://news.ycombinator.com/item?id=40747852
- https://www.phoenix.com/security-notifications/cve-2024-0762/



