Intel RAID Web Console Improper Access Control Enabling Authenticated DoS
CVE-2024-36261 Published on September 16, 2024

Improper access control in Intel(R) RAID Web Console software all versions may allow an authenticated user to potentially enable denial of service via adjacent access.

NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
LOW

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2024-36261 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2024-36261

Want to know whenever a new CVE is published for Intel Raid Web Console? stack.watch will email you.

 

Exploit Probability

EPSS
0.12%
Percentile
31.14%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.