{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-21853","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2024-02-14T04:00:11.459Z","datePublished":"2024-11-13T20:56:56.757Z","dateUpdated":"2025-11-03T21:53:35.286Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2024-11-13T20:56:56.757Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"denial of service"},{"lang":"en","description":"Improper finite state machines (FSMs) in the hardware logic","cweId":"CWE-1245","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"4th and 5th Generation Intel(R) Xeon(R) Processors","versions":[{"version":"See references","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user to potentially enable denial of service via local access."}],"references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"cvssV4_0":{"version":"4.0","baseScore":5.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","attackVector":"LOCAL","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-13T21:13:32.702943Z","id":"CVE-2024-21853","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-13T21:13:51.044Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2024/12/msg00024.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:53:35.286Z"}}]}}