Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31155: Escalation of Privilege in Intel(R) Processors

0
High
VulnerabilityCVE-2024-31155cvecve-2024-31155
Published: Wed Feb 12 2025 (02/12/2025, 21:19:16 UTC)
Source: CVE Database V5
Product: Intel(R) Processors

Description

Improper buffer restrictions in the UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:32:50 UTC

Technical Analysis

CVE-2024-31155 is a vulnerability identified in the UEFI firmware of certain Intel processors, stemming from improper buffer restrictions. UEFI (Unified Extensible Firmware Interface) is critical low-level firmware that initializes hardware and boots the operating system. The flaw allows a user with existing high privileges on the local machine to escalate their privileges further, potentially gaining unauthorized control over the system at a higher privilege level. The vulnerability does not require user interaction but does require the attacker to have privileged local access initially, which limits remote exploitation but still poses a significant risk in environments where multiple users share systems or where attackers have gained initial footholds. The CVSS 4.0 vector indicates a local attack vector (AV:L), high attack complexity (AC:H), privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). This suggests that exploitation could lead to complete system compromise, including unauthorized data access, modification, or disruption of system operations. No public exploits are known at this time, but the vulnerability's presence in firmware means that patching requires coordinated updates from Intel and OEMs, which can be complex and slow to deploy. The affected versions are not explicitly listed here but are referenced in Intel advisories. Given the critical role of UEFI firmware, this vulnerability is particularly serious as it operates below the OS level, making detection and mitigation more challenging.

Potential Impact

The impact of CVE-2024-31155 is significant for organizations worldwide that rely on Intel processors with vulnerable UEFI firmware. Successful exploitation allows a privileged local attacker to escalate their privileges, potentially gaining full control over the system firmware and operating system. This can lead to unauthorized access to sensitive data, persistent malware infections at the firmware level, and disruption or manipulation of system operations. Because UEFI operates before the OS, traditional security controls may be bypassed, making remediation and detection difficult. Enterprises with multi-user environments, data centers, cloud providers, and government agencies are particularly at risk due to the potential for insider threats or attackers who have gained initial privileged access. The vulnerability could also be leveraged in targeted attacks against high-value assets, including critical infrastructure and intellectual property. Although no known exploits exist currently, the high CVSS score and firmware-level impact necessitate urgent attention to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2024-31155 effectively, organizations should: 1) Monitor and restrict privileged local access to systems, enforcing strict access controls and auditing to detect suspicious privilege escalations. 2) Coordinate with Intel and hardware vendors to obtain and deploy firmware updates as soon as they are released, as patching UEFI firmware is the definitive fix. 3) Implement robust endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of privilege escalation attempts. 4) Use hardware-based security features such as Intel Boot Guard and Trusted Platform Module (TPM) to help protect firmware integrity. 5) Educate system administrators and users about the risks of privilege misuse and enforce the principle of least privilege. 6) Maintain comprehensive backups and incident response plans to recover from potential firmware-level compromises. 7) In environments where patching is delayed, consider isolating vulnerable systems or limiting their network exposure to reduce risk. These steps go beyond generic advice by focusing on firmware-specific protections and operational controls tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2024-05-29T03:00:05.412Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0a43c85912abc71d620e7

Added to database: 2/26/2026, 7:51:24 PM

Last enriched: 2/26/2026, 9:32:50 PM

Last updated: 2/26/2026, 11:05:17 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses