cve/2024/CVE-2024-21927.md
2025-09-29 21:09:30 +02:00

18 lines
827 B
Markdown

### [CVE-2024-21927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21927)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Instinct%E2%84%A2%20%20MI300X&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-241%20%20Improper%20Handling%20of%20Unexpected%20Data%20Type&color=brightgreen)
### Description
Improper input validation in Satellite Management Controller (SMC) may allow an attacker with privileges to use certain special characters in manipulated Redfish® API commands, causing service processes like OpenBMC to crash and reset, potentially resulting in denial of service.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores