CVE-2024-45332
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2024-45332. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1Attack Vector Metrics
Impact Metrics
Description
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Available Exploits
Related News
EU Vulnerability Database
Monitored by ENISA for EU cybersecurity
ENISA Analysis
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Affected Products (ENISA)
ENISA Scoring
CVSS Score (4.0)
ENISA References
Data provided by ENISA EU Vulnerability Database. Last updated: May 13, 2025
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: May 13, 2025, Modified: May 14, 2025
Social Media Intelligence
Real-time discussions and threat intelligence from social platforms
🚨 Today’s Patch Tuesday Overview: 66 vulnerabilities, including one zero-day **Microsoft** has addressed **66** vulnerabilities, including **one zero-day** vulnerability, nine critical ones, and **one** **with** **proof of concept** (PoC). **Third-party:** web browsers, Android, Roundcube, Cisco, HPE, Ivanti, and processors. 📢 Navigate to [**Vulnerability Digest from Action1**](https://www.action1.com/patch-tuesday/patch-tuesday-june-2025/?vyr) for a comprehensive summary …