CVE-2025-24834

Protection mechanism failure for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an information disclosure. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable data exposure. This result may potentially occur via adjacent access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*

History

26 Nov 2025, 15:15

Type Values Removed Values Added
First Time Intel
Intel computing Improvement Program
References () https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html - () https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01328.html - Vendor Advisory
CPE cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*

11 Nov 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-11 17:15

Updated : 2025-11-26 15:15


NVD link : CVE-2025-24834

Mitre link : CVE-2025-24834

CVE.ORG link : CVE-2025-24834


JSON object : View

Products Affected

intel

  • computing_improvement_program
CWE
CWE-693

Protection Mechanism Failure