An exploit is possible where an actor with physical access can manipulate SPI flash without being detected.
References
Link | Resource |
---|---|
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf | Vendor Advisory |
Configurations
History
02 Oct 2025, 14:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:* | |
References | () https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf - Vendor Advisory | |
Summary |
|
|
First Time |
Ami aptio V
Ami |
12 Nov 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
12 Nov 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-12 15:15
Updated : 2025-10-02 14:32
NVD link : CVE-2024-33660
Mitre link : CVE-2024-33660
CVE.ORG link : CVE-2024-33660
JSON object : View
Products Affected
ami
- aptio_v
CWE
CWE-494
Download of Code Without Integrity Check