Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-5709

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-21 Nov, 2017 | 14:00
Updated At-17 Sep, 2024 | 03:07
Rejected At-
Credits

Multiple privilege escalations in kernel in Intel Server Platform Services Firmware 4.0 allows unauthorized process to access privileged content via unspecified vector.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:21 Nov, 2017 | 14:00
Updated At:17 Sep, 2024 | 03:07
Rejected At:
▼CVE Numbering Authority (CNA)

Multiple privilege escalations in kernel in Intel Server Platform Services Firmware 4.0 allows unauthorized process to access privileged content via unspecified vector.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Server Platform Services
Versions
Affected
  • 4.0
Problem Types
TypeCWE IDDescription
textN/AElevation of Privilege
Type: text
CWE ID: N/A
Description: Elevation of Privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/101906
vdb-entry
x_refsource_BID
https://security.netapp.com/advisory/ntap-20171120-0001/
x_refsource_CONFIRM
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
x_refsource_CONFIRM
http://www.securitytracker.com/id/1039955
vdb-entry
x_refsource_SECTRACK
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
x_refsource_CONFIRM
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
x_refsource_CONFIRM
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
x_refsource_CONFIRM
https://www.asus.com/News/wzeltG5CjYaIwGJ0
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/101906
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://security.netapp.com/advisory/ntap-20171120-0001/
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1039955
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
Resource:
x_refsource_CONFIRM
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.asus.com/News/wzeltG5CjYaIwGJ0
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/101906
vdb-entry
x_refsource_BID
x_transferred
https://security.netapp.com/advisory/ntap-20171120-0001/
x_refsource_CONFIRM
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1039955
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
x_refsource_CONFIRM
x_transferred
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
x_refsource_CONFIRM
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
x_refsource_CONFIRM
x_transferred
https://www.asus.com/News/wzeltG5CjYaIwGJ0
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/101906
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20171120-0001/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1039955
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.asus.com/News/wzeltG5CjYaIwGJ0
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:21 Nov, 2017 | 14:29
Updated At:20 Apr, 2025 | 01:37

Multiple privilege escalations in kernel in Intel Server Platform Services Firmware 4.0 allows unauthorized process to access privileged content via unspecified vector.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Intel Corporation
intel
>>server_platform_services_firmware>>4.0
cpe:2.3:o:intel:server_platform_services_firmware:4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlsecure@intel.com
Issue Tracking
Patch
Third Party Advisory
http://www.securityfocus.com/bid/101906secure@intel.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039955secure@intel.com
Third Party Advisory
VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdfsecure@intel.com
N/A
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-frsecure@intel.com
Issue Tracking
Vendor Advisory
https://security.netapp.com/advisory/ntap-20171120-0001/secure@intel.com
Issue Tracking
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_ussecure@intel.com
N/A
https://www.asus.com/News/wzeltG5CjYaIwGJ0secure@intel.com
N/A
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlaf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
Third Party Advisory
http://www.securityfocus.com/bid/101906af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039955af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdfaf854a3a-2127-422b-91ae-364da2661108
N/A
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fraf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Vendor Advisory
https://security.netapp.com/advisory/ntap-20171120-0001/af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_usaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.asus.com/News/wzeltG5CjYaIwGJ0af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Source: secure@intel.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/101906
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1039955
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
Source: secure@intel.com
Resource: N/A
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
Source: secure@intel.com
Resource:
Issue Tracking
Vendor Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20171120-0001/
Source: secure@intel.com
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
Source: secure@intel.com
Resource: N/A
Hyperlink: https://www.asus.com/News/wzeltG5CjYaIwGJ0
Source: secure@intel.com
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/101906
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1039955
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Vendor Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20171120-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.asus.com/News/wzeltG5CjYaIwGJ0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

121Records found

CVE-2009-4419
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.03%
||
7 Day CHG~0.00%
Published-24 Dec, 2009 | 17:00
Updated-07 Aug, 2024 | 07:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Intel Q35, GM45, PM45 Express, Q45, and Q43 Express chipsets in the SINIT Authenticated Code Module (ACM), which allows local users to bypass the Trusted Execution Technology protection mechanism and gain privileges by modifying the MCHBAR register to point to an attacker-controlled region, which prevents the SENTER instruction from properly applying VT-d protection while an MLE is being loaded.

Action-Not Available
Vendor-n/aIntel Corporation
Product-gm45_chipsetq43_express_chipsetpm45_express_chipsetq35_chipsetq45_chipsetn/a
CWE ID-CWE-16
Not Available
CVE-2021-0154
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.75%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e5-2650l_v4xeon_e-2286gxeon_e7-4820_v4xeon_e5-1650_v4_firmwarexeon_e5-2603_v4_firmwarexeon_e3-1240_v6_firmwarecore_i9-7900xxeon_d-2733nt_firmwarexeon_d-1548xeon_d-1622_firmwarexeon_e3-1220_v5core_i7-7820x_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_d-1527_firmwarexeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_d-1653nxeon_e3-1578l_v5_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_d-2173it_firmwarexeon_e5-2637_v4xeon_d-1633n_firmwarecore_i9-7920xcore_i9-9960xxeon_d-1513n_firmwarexeon_e3-1230_v6core_i9-7960x_firmwarexeon_e-2374gxeon_d-1749nt_firmwarexeon_e3-1501l_v6xeon_e-2254ml_firmwarexeon_e7-4809_v4_firmwarexeon_e-2378xeon_e7-8867_v4xeon_d-1557_firmwarexeon_e5-2630_v4_firmwarexeon_e-2236xeon_e3-1220_v5_firmwarecore_i7-7820xcore_i7-3970x_firmwarexeon_e5-2699r_v4_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_d-1747nte_firmwarexeon_d-2163it_firmwarecore_i5-7640xcore_i7-7800xxeon_d-1531xeon_d-1726_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarexeon_e7-8891_v4xeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e-2278gexeon_d-1533n_firmwarexeon_e3-1545m_v5_firmwarexeon_e5-2650_v4_firmwarexeon_d-2146nt_firmwarexeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_e7-8894_v4xeon_d-2786nte_firmwarexeon_d-1518_firmwarexeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4xeon_e-2236_firmwarexeon_d-2775te_firmwarexeon_e5-2680_v4_firmwarexeon_e-2244g_firmwarexeon_d-1571_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_e-2126gcore_i7-6900k_firmwarexeon_e7-8893_v4_firmwarexeon_e5-4650_v4_firmwarexeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_e5-4627_v4core_i7-4940mxxeon_e-2276mlxeon_e5-4610_v4_firmwarexeon_e3-1235l_v5xeon_e5-1630_v4xeon_e3-1225_v5_firmwarexeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i9-10940xxeon_d-2796texeon_d-1541_firmwarexeon_e3-1270_v6core_i7-5820k_firmwarecore_i9-10900xxeon_e3-1545m_v5xeon_d-1577_firmwarexeon_d-1531_firmwarexeon_e-2334_firmwarexeon_e3-1515m_v5_firmwarexeon_d-2142itxeon_e-2276me_firmwarexeon_d-1748texeon_e7-8891_v4_firmwarexeon_e5-2699r_v4xeon_d-2187ntxeon_d-2775texeon_e5-2640_v4_firmwarexeon_d-1518core_i7-9800xcore_i7-6800k_firmwarexeon_e-2136_firmwarexeon_d-1726xeon_d-1735tr_firmwarexeon_e5-2648l_v4xeon_e-2276mecore_i7-3820_firmwarexeon_e-2146gcore_i7-6950xxeon_e5-4620_v4xeon_d-2752nte_firmwarexeon_e7-8870_v4xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarexeon_d-1637xeon_e-2356g_firmwarexeon_e5-4660_v4xeon_e-2146g_firmwarexeon_e5-2698_v4core_i7-3970xxeon_e-2286g_firmwarexeon_e3-1515m_v5xeon_d-1539_firmwarecore_i7-3960xcore_i7-6800kxeon_d-1718txeon_e-2126g_firmwarexeon_d-2753nt_firmwarexeon_d-1602xeon_e5-4655_v4core_i7-4820kxeon_d-1533nxeon_d-1529_firmwarexeon_e3-1260l_v5_firmwarexeon_d-2799xeon_e3-1240l_v5xeon_e-2136xeon_e5-4640_v4_firmwarexeon_e-2378_firmwarexeon_d-1712trcore_i9-9940x_firmwarexeon_d-2145ntxeon_e5-2697a_v4xeon_d-1736_firmwarexeon_e-2288g_firmwarexeon_e-2276mxeon_e-2224gxeon_d-2173itxeon_d-2766ntxeon_d-2161ixeon_d-2163itxeon_e5-1620_v4xeon_e5-4669_v4core_i7-3930kxeon_d-2123itxeon_e5-2609_v4_firmwarexeon_e3-1505m_v5xeon_d-1623nxeon_e3-1535m_v6_firmwarecore_i7-4960x_firmwarecore_i7-4820k_firmwarexeon_d-1521xeon_e5-2628l_v4xeon_d-1722nexeon_e5-2650_v4xeon_e7-4820_v4_firmwarexeon_d-2776ntcore_i7-3820xeon_d-2161i_firmwarexeon_e-2144g_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarexeon_e3-1585l_v5xeon_e-2378g_firmwarecore_i7-3940xmxeon_e3-1275_v5xeon_e5-4610_v4xeon_e-2246g_firmwarexeon_e5-2658_v4xeon_e5-1630_v4_firmwarexeon_e-2388gxeon_e3-1558l_v5_firmwarexeon_e5-4620_v4_firmwarexeon_d-2786ntexeon_d-1537_firmwarexeon_e-2226gxeon_d-2796te_firmwarecore_i7-3920xmxeon_e-2226ge_firmwarexeon_d-2143itxeon_e-2226gexeon_e3-1225_v6_firmwarexeon_d-2753ntxeon_e-2278gxeon_d-1540_firmwarexeon_e7-8890_v4_firmwarexeon_e5-2683_v4_firmwarecore_i7-5930k_firmwarexeon_e-2124xeon_e-2186g_firmwarexeon_d-1553n_firmwarexeon_e5-2695_v4core_i9-7980xe_firmwarexeon_d-2177nt_firmwarecore_i7-3940xm_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-2798ntxeon_e5-2667_v4_firmwarexeon_d-1712tr_firmwarexeon_e3-1240l_v5_firmwarexeon_e7-8860_v4_firmwarecore_i7-6950x_firmwarexeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_e3-1260l_v5xeon_d-1739_firmwarexeon_e-2386gxeon_d-1736xeon_d-2738xeon_d-1567_firmwarexeon_e5-2683_v4xeon_e-2134xeon_d-1733nt_firmwarexeon_e-2388g_firmwarexeon_d-1749ntcore_i9-9820x_firmwarexeon_d-2142it_firmwarexeon_e-2336xeon_d-1627xeon_e3-1575m_v5_firmwarexeon_d-2779_firmwarexeon_e3-1225_v5xeon_e-2186mxeon_d-1602_firmwarexeon_e3-1558l_v5xeon_e-2176mxeon_d-2733ntxeon_e-2286mxeon_d-1559_firmwarecore_i7-4930mx_firmwarexeon_d-1623n_firmwarexeon_d-1702xeon_e-2274gxeon_d-1722ne_firmwarexeon_e5-2630l_v4xeon_e7-8893_v4xeon_e7-4830_v4xeon_e5-2699_v4_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-1528_firmwarexeon_d-2795ntxeon_e5-4628l_v4xeon_d-1732te_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_e3-1268l_v5xeon_e-2226g_firmwarexeon_d-1529xeon_e5-1650_v4core_i9-7960xcore_i7-5930kxeon_e-2324g_firmwarexeon_d-1715terxeon_d-1559xeon_e-2278ge_firmwarexeon_e-2174gxeon_e3-1535m_v6xeon_e3-1220_v6xeon_e3-1585_v5_firmwarecore_i9-9820xxeon_e-2276m_firmwarexeon_d-1537xeon_d-1714xeon_e7-4850_v4xeon_d-1567xeon_e3-1220_v6_firmwarexeon_e7-4850_v4_firmwarexeon_e-2286m_firmwarexeon_e3-1501m_v6_firmwarexeon_e3-1245_v5xeon_d-1734nt_firmwarexeon_d-2141ixeon_e-2176gxeon_e-2288gcore_i7-3920xm_firmwarexeon_e-2274g_firmwarexeon_d-2141i_firmwarexeon_e3-1225_v6core_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e3-1280_v6xeon_e7-8880_v4xeon_e-2176g_firmwarexeon_d-2752ntexeon_d-2776nt_firmwarexeon_e-2254mlxeon_e-2124g_firmwarexeon_e5-2667_v4xeon_d-1734ntxeon_e5-2695_v4_firmwarexeon_e-2224_firmwarexeon_e5-4655_v4_firmwarexeon_e5-2608l_v4_firmwarexeon_d-1649nxeon_e7-8890_v4xeon_e5-2609_v4xeon_d-1540xeon_d-1736nt_firmwarexeon_d-2712t_firmwarexeon_d-1513ncore_i7-9800x_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i7-5960x_firmwarexeon_e-2224g_firmwarecore_i9-7940x_firmwarexeon_e5-2643_v4_firmwarexeon_d-1527xeon_e3-1505m_v6xeon_e7-8860_v4core_i9-9940xxeon_d-2712txeon_e5-2690_v4xeon_d-1649n_firmwarecore_i9-9980xe_firmwarexeon_e3-1535m_v5core_i9-9900xxeon_e5-2650l_v4_firmwarecore_i9-7940xxeon_e5-2699a_v4_firmwarecore_i9-7900x_firmwarexeon_e3-1505m_v6_firmwarexeon_e7-8870_v4_firmwarexeon_e-2254mexeon_d-1523nxeon_e3-1505l_v5core_i9-9900x_firmwarexeon_e7-4830_v4_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_d-1520xeon_d-2187nt_firmwarexeon_e3-1280_v6_firmwarecore_i7-7800x_firmwarexeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntxeon_e-2144gxeon_d-1713ntxeon_d-1543nxeon_e3-1270_v6_firmwarexeon_d-2752terxeon_d-1541xeon_d-1543n_firmwarexeon_e-2244gxeon_e7-8867_v4_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1732texeon_d-1622xeon_d-1520_firmwarexeon_e5-2640_v4xeon_e5-4660_v4_firmwarexeon_e5-2680_v4xeon_e5-2697a_v4_firmwarexeon_e3-1235l_v5_firmwarecore_i7-7740xxeon_d-2795nt_firmwarexeon_d-1713nte_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2660_v4_firmwarexeon_e3-1575m_v5xeon_e-2124gcore_i9-9920x_firmwarexeon_e5-2687w_v4core_i7-4930kcore_i9-10980xe_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarecore_i7-5820kcore_i9-7920x_firmwarexeon_e-2356gcore_i7-6900kcore_i9-9980xexeon_d-1557xeon_e5-2623_v4xeon_d-2796ntxeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_e-2336_firmwarexeon_d-1713ntexeon_e3-1585_v5xeon_d-1739xeon_e-2334xeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_d-1577xeon_e3-1501m_v6xeon_d-1735trxeon_d-2766nt_firmwarecore_i7-4930k_firmwarecore_i9-10980xexeon_e3-1505l_v5_firmwarexeon_e-2314xeon_e3-1535m_v5_firmwarexeon_e5-2690_v4_firmwarexeon_d-2166ntxeon_e3-1280_v5_firmwarexeon_e5-2608l_v4xeon_e5-2697_v4xeon_e-2186gxeon_e-2314_firmwarexeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2658_v4_firmwarexeon_d-1718t_firmwarexeon_e5-2648l_v4_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i9-10900x_firmwarecore_i7-4930mxxeon_e5-2630_v4xeon_e7-4809_v4xeon_d-1746ter_firmwarexeon_e5-2620_v4xeon_d-2143it_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1275_v6xeon_e3-1565l_v5_firmwarexeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4xeon_e-2276g_firmwarexeon_e5-2698_v4_firmwarexeon_d-1627_firmwarexeon_d-1702_firmwarexeon_d-1733ntxeon_e-2224xeon_e5-2618l_v4_firmwarexeon_e-2124_firmwarecore_i7-4940mx_firmwarexeon_d-1653n_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarecore_i9-9960x_firmwarexeon_d-1736ntxeon_e-2278gelxeon_d-1553nxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_e3-1245_v6xeon_e-2378gxeon_d-2798nt_firmwarexeon_e-2234_firmwarexeon_d-1747ntexeon_d-2166nt_firmwarexeon_e5-2699a_v4xeon_d-1523n_firmwarexeon_d-2183it_firmwarecore_i7-6850kxeon_e5-2643_v4xeon_e-2324gxeon_e3-1268l_v5_firmwarexeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e7-8894_v4_firmwarexeon_e-2276gxeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_d-1548_firmwarexeon_d-1746terxeon_e5-1620_v4_firmwarexeon_d-1571xeon_e-2186m_firmwarexeon_d-1528xeon_d-2738_firmwarexeon_e-2234xeon_e5-2620_v4_firmwarecore_i7-7740x_firmwarexeon_d-1714_firmwareIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2016-8101
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.26%
||
7 Day CHG~0.00%
Published-10 Oct, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The updater subsystem in Intel SSD Toolbox before 3.3.7 allows local users to gain privileges via unspecified vectors.

Action-Not Available
Vendor-n/aIntel Corporation
Product-solid-state_drive_toolboxn/a
CVE-2016-5647
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.48%
||
7 Day CHG~0.00%
Published-13 Dec, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The igdkmd64 module in the Intel Graphics Driver through 15.33.42.435, 15.36.x through 15.36.30.4385, and 15.40.x through 15.40.4404 on Windows allows local users to cause a denial of service (crash) or gain privileges via a crafted D3DKMTEscape request.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_drivern/a
CVE-2022-0004
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 31.55%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_j3355_firmwareceleron_n2815core_i7-8670t_firmwarepentium_gold_g5500tceleron_j4115core_i5-10610u_firmwarecore_i3-10100core_i9-10910_firmwarecore_i7-8850h_firmwarecore_i5-11400xeon_d-2733nt_firmwarecore_i7-10510yceleron_j4125core_i7-10710u_firmwareceleron_n3010_firmwarecore_i5-11500bcore_i9-11900_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwareceleron_n4120core_i9-10900_firmwarepentium_gold_g4560atom_p5942b_firmwarecore_i5-8500t_firmwarecore_i5-11260hcore_i7-8709g_firmwarepentium_gold_g6605c627pentium_gold_g6405u_firmwarepentium_gold_g5400tcore_i7-10875h_firmwarexeon_d-2163it_firmwarec627apentium_gold_4415u_firmwarecore_i7-8709gpentium_gold_g6505xeon_d-2177ntpentium_gold_g5600_firmwarecore_i9-11900kfcore_i5-10600t_firmwarexeon_d-2786nte_firmwarecore_i3-l13g4core_i7-11700k_firmwarecore_i5-10300h_firmwarepentium_gold_g6400xeon_d-2775te_firmwarecore_i9-10900tpentium_gold_g5400_firmwarecore_i5-8200ycore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarecore_i5-10500t_firmwareatom_x6425repentium_gold_g4620_firmwarepentium_silver_j5040_firmwarecore_i7-8809g_firmwarec246_firmwarecore_i5-8260uxeon_d2700core_i7-12700kfcore_i9-12900_firmwarecore_i5-11400fcore_i5-12600h_firmwarecore_i5-10400txeon_d-2796teceleron_6600hec246c628_firmwarecore_i9-10900xcore_i5-12400fceleron_n3350ecore_i9-11980hk_firmwarecore_i3-8000txeon_d-2142itcore_i5-8305g_firmwareceleron_j4005_firmwarecore_i5-10110y_firmwarecore_i3-8100b_firmwarecore_i5-8650k_firmwarecore_i5-8700bcore_i9-10900te_firmwarec232c624_firmwarecore_i9-11900kcore_i5-10500hcore_i9-11900kb_firmwarecore_i9-12900hkcore_i3-8300t_firmwarecore_i5-12450hcore_i5-10600kfcore_i7-10700_firmwareceleron_n2840_firmwareatom_x6413e_firmwarepentium_gold_g6600_firmwareceleron_j3060c626core_i9-10850hxeon_d-2752nte_firmwarexeon_d-2796nt_firmwarecore_i5-11500he_firmwarecore_i5-8210y_firmwarecore_i3-10100ec236pentium_gold_g5420tcore_i9-12900hxcore_i5-11320h_firmwarecore_i7-10700kf_firmwarecore_i9-12900core_i7-12650h_firmwarepentium_gold_g6400te_firmwareatom_x6413ecore_i5-12500core_i5-11600kfcore_i7-8550u_firmwarec624acore_i5-8365uxeon_d-2799core_i7-12700xeon_d-2145ntc422celeron_j4105_firmwarecore_i7-12700t_firmwarecore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uceleron_n2806_firmwarec621core_i3-11100he_firmwareatom_p5931b_firmwarepentium_gold_g7400xeon_d-2163itceleron_n4020c_firmwarepentium_gold_4417u_firmwarecore_i5-12500h_firmwarecore_i5-11400hcore_i9-11900hceleron_j3160_firmwarecore_i7-8665ue_firmwarecore_i3-12100tcore_i7-10810ucore_i3-10300tcore_i3-8100core_i3-8145uepentium_gold_4425ypentium_gold_g5500_firmwarepentium_gold_g5500t_firmwareceleron_j4025_firmwarecore_i9-11900pentium_gold_g4620core_i5-8265ucore_i7-10700tcore_i7-12700kf_firmwareatom_p5921bcore_i5-8650core_i3-12100f_firmwarepentium_gold_6500ycore_i5-10500ecore_i7-10750hcore_i9-10850kpentium_gold_g6405core_i5-8500bxeon_d-2143itxeon_d-2753ntcore_i5-8250u_firmwareceleron_n2840pentium_gold_g7400texeon_w-1390_firmwarecore_i3-8100hcore_i5-8400b_firmwarecore_i7-8706gceleron_n2810pentium_gold_g6400tcore_i7-11850h_firmwarecore_i7-12850hxceleron_j4115_firmwarecore_i3-8120core_i9-11900fxeon_d-2177nt_firmwareatom_x7-e3950_firmwarecore_i5-8365u_firmwarec242core_i9-10920xcore_i9-11950hceleron_n3450_firmwarexeon_w-1300_firmwarecore_i5-12450hxcore_i9-10885hcore_i5-10310ucore_i3-8130u_firmwareceleron_n4500core_i7-8557uceleron_n2910_firmwarecore_i5-11400_firmwarecore_i7-11850hecore_i3-8350k_firmwareceleron_6305celeron_n5105_firmwarepentium_gold_g6605_firmwarecore_i7-10750h_firmwarexeon_d-2142it_firmwarecore_i7-8557u_firmwarexeon_d-2779_firmwareceleron_j4025core_i9-10980hkxeon_d-2733ntcore_i7-12650hxceleron_n2808_firmwarecore_i7-10700k_firmwarecore_i9-10900t_firmwarepentium_gold_g6505_firmwarecore_i5-11400f_firmwarecore_i3-10305_firmwareceleron_n4100celeron_n3520core_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i7-11700b_firmwarecore_i7-11800h_firmwareceleron_6600he_firmwarexeon_d-2795ntceleron_4305ue_firmwarecore_i7-8500yxeon_d-2779core_i9-11900t_firmwarepentium_silver_n5030_firmwarepentium_silver_j5040celeron_j3060_firmwareceleron_n6211xeon_w-1370pentium_gold_6500y_firmwarecore_i5-8600tcore_i7-8510y_firmwarepentium_gold_g5420_firmwarecore_i5-12600tpentium_gold_g6405t_firmwareceleron_n6210_firmwarecore_i3-10320_firmwarecore_i5-12400xeon_w-1370pcore_i3-10320core_i3-8121uc625_firmwarecore_i5-8420t_firmwarexeon_d-2752ntecore_i3-12300t_firmwarepentium_gold_g5400core_i3-10105fceleron_n3700celeron_n5095_firmwarexeon_w-1390t_firmwareatom_x5-e3940core_i7-10875hceleron_n3060_firmwarecore_i3-8121u_firmwarecore_i3-11100hecore_i5-10400hceleron_n4000c_firmwarepentium_gold_7505core_i7-12700kxeon_d-2712t_firmwarecore_i5-10505_firmwareceleron_n3050_firmwarecore_i5-12600_firmwareceleron_n2810_firmwarepentium_gold_g6500_firmwarepentium_gold_g4600_firmwarepentium_gold_g5620_firmwareceleron_j3455_firmwarecore_i5-10110ycore_i5-12600hcore_i9-11900kf_firmwarecore_i7-8500y_firmwarecore_i7-12700hc627a_firmwareatom_p5962b_firmwarecore_i3-10105tcore_i5-11300hcore_i7-10510u_firmwarecore_i3-8100h_firmwarecore_i3-10105t_firmwarepentium_silver_n6000core_i5-10400h_firmwarecore_i9-12900kf_firmwarecore_i9-10900kfcore_i7-11390h_firmwarecore_i3-10100tpentium_gold_g6600xeon_d-2146ntceleron_n2805_firmwarecore_i5-8300h_firmwarexeon_d-2752terceleron_j4125_firmwarecore_i5-8279u_firmwarecore_i5-11500hecore_i5-8500b_firmwarecore_i5-12500hc622xeon_w-1390tcore_i7-12700k_firmwarecore_i7-11700kfpentium_gold_g5420xeon_d2700_firmwarecore_i7-11700_firmwarecore_i7-8706g__firmwarexeon_d-2795nt_firmwarecore_i7-11375hcore_i7-8559ucore_i9-10850h_firmwarecore_i5-8550_firmwarecore_i5-11500tpentium_gold_g7400_firmwareceleron_n3010core_i9-12900h_firmwarecore_i5-8700b_firmwarecore_i7-8670_firmwarecore_i7-8560ucore_i7-11600h_firmwarecore_i5-11400h_firmwarepentium_gold_g5600core_i3-10325core_i5-8500_firmwarecore_i7-8700core_i5-8400atom_x6200fe_firmwareceleron_n5100core_i3-10105f_firmwareceleron_n3000_firmwarecore_i5-12600xeon_d-2752ter_firmwareceleron_n2805core_i5-12600k_firmwarecore_i5-8650kcore_i3-10110u_firmwarexeon_w-1350core_i9-10980xecore_i7-8750hfceleron_n4505_firmwarecore_i7-11850hceleron_n2808core_i9-11900f_firmwarecore_i5-8310y_firmwarecore_i3-10110ucore_i7-8665u_firmwareceleron_n3060core_i9-10885h_firmwarecore_i7-8086k_firmwarepentium_gold_g7400te_firmwareceleron_n4500_firmwarecore_i3-10100y_firmwareceleron_n6211_firmwarecore_i5-11500_firmwarecore_i7-8569u_firmwareceleron_4305ucore_i5-12600hx_firmwarepentium_gold_6405ucore_i5-8420_firmwarexeon_w-1350pc629a_firmwarexeon_d-2143it_firmwarecore_i9-10900celeron_n5100_firmwarecore_i9-12900hatom_x6212re_firmwareatom_x5-e3930c627_firmwareatom_x6211ex299_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i7-11375h_firmwarecore_i3-10300core_i3-8100t_firmwarepentium_gold_4417ucore_i5-10310u_firmwarecore_i7-8565ucore_i7-8670core_i9-10940x_firmwarecore_i5-8400_firmwarecore_i5-11500h_firmwarecore_i7-8510ycore_i7-10870hcore_i7-10510ucore_i3-10100fpentium_gold_4425y_firmwarepentium_gold_g5500celeron_n2940core_i5-12500tcore_i5-8310ycore_i9-12900tcore_i3-10300_firmwarecore_i5-10500h_firmwareceleron_6305_firmwarexeon_d-2183it_firmwarecore_i5-12600t_firmwareatom_x6200fecore_i5-12400_firmwarec236_firmwarecore_i3-8000t_firmwarecore_i5-8265u_firmwarecore_i3-8000_firmwarecore_i5-10210uceleron_n3000pentium_gold_g4600pentium_gold_g5400t_firmwarecore_i5-10500core_i5-11300h_firmwarecore_i5-8400bpentium_gold_g6405tcore_i7-12800h_firmwarecore_i7-8850hcore_i9-8950hk_firmwareceleron_n2930celeron_n2830core_i5-8400h_firmwarecore_i5-11600_firmwarecore_i5-10400t_firmwarecore_i7-12650hceleron_n4020_firmwarecore_i3-10100_firmwareceleron_4205u_firmwarecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i3-10100ycore_i5-10600tcore_i5-10600kf_firmwareceleron_n3150_firmwarecore_i9-10900e_firmwareceleron_n4505c625celeron_n3520_firmwarexeon_d-2191_firmwarec621apentium_gold_g6505txeon_d-2146nt_firmwarecore_i9-10910core_i9-12900k_firmwarepentium_gold_g6500tcore_i7-10700f_firmwarecore_i3-10100t_firmwarepentium_gold_4415y_firmwarecore_i5-8269u_firmwarecore_i3-10105celeron_n6210celeron_j3455ecore_i3-12300_firmwarecore_i5-11400tceleron_n4020pentium_gold_6405u_firmwarecore_i7-11700kcore_i9-10900kf_firmwarecore_i7-8550ucore_i7-10810u_firmwarexeon_w-1350_firmwarecore_i9-10920x_firmwarecore_i9-10940xceleron_n2920_firmwarec629acore_i3-8300pentium_gold_g6400t_firmwarecore_i7-10700kfceleron_j4105core_i7-12850hx_firmwarecore_i5-8260u_firmwarecore_i5-8400tcore_i9-12900t_firmwarecore_i3-l13g4_firmwarecore_i5-12400t_firmwarecore_i7-12800hx_firmwarexeon_d-2187ntxeon_d-2775teceleron_4305u_firmwareceleron_n4100_firmwarecore_i5-11600kf_firmwarexeon_w-1370p_firmwarepentium_gold_4410y_firmwarepentium_gold_g7400tcore_i9-11900kbpentium_gold_7505_firmwarecore_i5-8257u_firmwarecore_i9-11900h_firmwarecore_i7-8700b_firmwareceleron_j3355eceleron_n2815_firmwareceleron_n4504core_i3-11100b_firmwarecore_i3-10305t_firmwarecore_i7-8706g_firmwarecore_i5-12400tcore_i7-12700tcore_i9-10850k_firmwarecore_i5-8365ue_firmwareceleron_n2910atom_x5-e3930_firmwarecore_i7-11600hcore_i7-10700core_i9-11950h_firmwarexeon_d-2753nt_firmwareceleron_n2940_firmwarexeon_w-1350p_firmwarecore_i5-10500e_firmwarepentium_gold_4410yc420_firmwarecore_i5-11600k_firmwareceleron_j3355core_i3-8145u_firmwarecore_i5-8600k_firmwarecore_i5-10400core_i3-8145uxeon_d-2173itceleron_j3355e_firmwarexeon_d-2161ixeon_d-2766ntcore_i7-8700kcore_i7-10870h_firmwarexeon_d-2123itcore_i7-11700kf_firmwarepentium_gold_g6405_firmwarecore_i5-8420tcore_i3-8109ucore_i5-8365uecore_i7-12650hx_firmwareceleron_j3455core_i9-12900hk_firmwarecore_i7-12700fcore_i3-12100fcore_i3-11100bpentium_silver_n6000_firmwareceleron_n3160xeon_d-2776ntcore_i5-8200y_firmwareceleron_n3160_firmwarec624a_firmwarecore_i7-10700te_firmwarecore_i7-10700eceleron_n2830_firmwarecore_i5-8350uatom_x6425e_firmwarepentium_gold_g7400exeon_d-2161i_firmwarecore_i7-8750h_firmwarecore_i3-10100teceleron_n4000_firmwareceleron_n2807pentium_gold_g5420t_firmwarecore_i5-10210u_firmwarecore_i7-11390hcore_i3-8140u_firmwarexeon_d-2786ntecore_i9-12900hx_firmwarexeon_d-2796te_firmwarexeon_d-2191pentium_silver_a1030_firmwarecore_i3-10100te_firmwarecore_i9-12900fcore_i5-10600k_firmwarepentium_gold_g5600tcore_i9-10900ecore_i5-8259u_firmwarecore_i5-10610uc624core_i3-10110y_firmwarecore_i5-8250ucore_i9-11980hkcore_i5-8600pentium_gold_g7400e_firmwarepentium_silver_n6005atom_p5931bcore_i5-l16g7_firmwarecore_i5-10500tecore_i7-12700f_firmwarecore_i7-12700_firmwarecore_i7-8559u_firmwarecore_i5-10210y_firmwarecore_i5-11500core_i3-8000core_i7-8700k_firmwareceleron_n4000ccore_i7-11700pentium_gold_g6400exeon_d-2798ntcore_i7-12800hxcore_i7-8700bcore_i5-10500tcore_i5-10600core_i5-10500_firmwareatom_x6425re_firmwarecore_i5-10310ycore_i3-12300core_i5-10310y_firmwarexeon_d-2738core_i5-12450hx_firmwarepentium_gold_g6500t_firmwarecore_i5-8259ucore_i5-11500t_firmwarepentium_gold_g6405ucore_i7-10700katom_x7-e3950pentium_gold_g5600t_firmwarecore_i3-12300tpentium_silver_a1030core_i3-8109u_firmwarecore_i5-12450h_firmwarecore_i5-11600t_firmwarecore_i7-8705g_firmwarecore_i7-11370hxeon_w-1300core_i7-8665uecore_i5-12500_firmwarecore_i3-8130ucore_i3-8300tcore_i5-11500hcore_i9-12900kcore_i5-l16g7core_i9-12950hx_firmwarecore_i5-11600tcore_i7-8650ucore_i5-10200hpentium_gold_g5620pentium_silver_n5030core_i7-8705gceleron_n2920c621a_firmwareceleron_n4000core_i5-10400fcore_i5-12600kfpentium_gold_g6400_firmwarecore_i3-12100t_firmwarecore_i9-12950hxcore_i7-8706g_core_i9-12900kfcore_i3-8145ue_firmwarecore_i5-8400t_firmwarepentium_silver_n5000_firmwarecore_i5-8400hceleron_n3150celeron_j4005atom_x5-e3940_firmwarepentium_silver_n5000core_i7-11850he_firmwarexeon_d-2141ipentium_gold_4415uceleron_6305e_firmwarexeon_d-2141i_firmwareatom_x6211e_firmwarecore_i3-10110yc422_firmwarepentium_gold_5405uxeon_d-2776nt_firmwareatom_p5921b_firmwareceleron_n3350core_i5-8305gatom_p5962bxeon_w-1390core_i7-11700t_firmwareceleron_n2820celeron_n2820_firmwarecore_i5-11600core_i7-11700fcore_i7-8750hatom_x6212recore_i7-8665uceleron_n5105core_i3-10305tcore_i3-10100e_firmwarexeon_d-2183itceleron_n2807_firmwarexeon_d-2123it_firmwarecore_i5-12500t_firmwarecore_i5-8300hxeon_w-1370_firmwarexeon_d-2712tceleron_n2806core_i5-8420pentium_silver_n6005_firmwarecore_i3-8140uceleron_n3350_firmwarecore_i3-8350kcore_i5-10600kcore_i7-8086kcore_i9-12900f_firmwarec628core_i7-10850hcore_i3-8120_firmwarecore_i3-12100_firmwarecore_i7-8560u_firmwarecore_i5-12600kf_firmwareatom_x6425ecore_i5-10500te_firmwarecore_i3-8020_firmwarecore_i3-10300t_firmwarex299xeon_d-2187nt_firmwarecore_i5-11500b_firmwarecore_i3-8100bxeon_w-1390p_firmwarecore_i5-8550core_i5-8279ucore_i9-10900f_firmwarecore_i5-12600hxcore_i3-10100f_firmwareatom_p5942bcore_i5-8600kcore_i7-12700h_firmwarecore_i7-8700tc242_firmwarexeon_d-2799_firmwarecore_i7-11700tceleron_n5095celeron_n2930_firmwarec232_firmwarecore_i7-8700t_firmwarecore_i7-10700e_firmwarec621_firmwarecore_i5-8600t_firmwarepentium_gold_g7400t_firmwarecore_i5-8500core_i9-11900tcore_i5-11260h_firmwarecore_i5-8210ycore_i5-10400f_firmwareceleron_n4120_firmwarepentium_silver_j5005_firmwarecore_i7-8565u_firmwarecore_i9-10980xe_firmwareatom_x6427fepentium_gold_5405u_firmwarecore_i5-8257ucore_i7-8569ucore_i5-11400t_firmwarecore_i7-10700t_firmwareceleron_4205upentium_gold_g4560_firmwarexeon_d-2796ntceleron_6305eceleron_n3350e_firmwareatom_x6427fe_firmwarecore_i5-8500tcore_i7-8809gcore_i3-10105_firmwarecore_i5-11320hcore_i7-8650u_firmwareceleron_n3700_firmwarecore_i7-11700bcore_i7-10850h_firmwarexeon_d-2766nt_firmwarecore_i3-10305xeon_d-2166ntcore_i7-8700_firmwarepentium_gold_4415yxeon_w-1390pcore_i3-8300_firmwarecore_i5-10505core_i5-8650_firmwarec629c626_firmwarecore_i3-12100core_i9-10900x_firmwarecore_i7-10710uc622_firmwarec420celeron_j3160core_i5-10300hcore_i5-10210ycore_i5-8350u_firmwarecore_i3-8020celeron_n4504_firmwarepentium_gold_g6500core_i5-12400f_firmwarecore_i7-11700f_firmwarecore_i9-10900fceleron_n4020cceleron_j3455e_firmwareceleron_n3450core_i5-10200h_firmwarecore_i3-8100txeon_d-2798nt_firmwarecore_i9-10980hk_firmwarecore_i5-12600kcore_i7-8670tpentium_gold_g6400texeon_d-2166nt_firmwarecore_i5-10400_firmwarecore_i7-12800hceleron_n3050c629_firmwarepentium_gold_g6400e_firmwarepentium_gold_g6505t_firmwarecore_i7-10700fcore_i9-10900k_firmwarecore_i7-8750hf_firmwareceleron_4305uexeon_d-2738_firmwarepentium_silver_j5005Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT
CVE-2015-2291
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.54% / 84.86%
||
7 Day CHG+0.28%
Published-09 Aug, 2017 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-03-03||Apply updates per vendor instructions.

(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ethernet_diagnostics_driver_iqvw32.sysethernet_diagnostics_driver_iqvw64.syswindowsn/aEthernet Diagnostics Driver for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33091
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.40%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:46
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit audio driver pack before version 1.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_audio_driver_packIntel(R) NUC M15 Laptop Kit audio driver pack
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-33103
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.05%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unintended intermediary in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i3-9100ecore_i3-10100core_i5-11600_firmwarecore_i5-1038ng7core_i5-10400t_firmwarecore_i5-11400core_i9-9900kscore_i7-10510ycore_i7-10710u_firmwarecore_i9-11900_firmwarecore_i3-10100_firmwarecore_i9-10900_firmwarecore_i5-11600kcore_i5-1155g7_firmwarexeon_e-2374gcore_i9-10900tecore_i5-1030g4_firmwarecore_i7-9700k_firmwarecore_i5-9500fcore_i3-10100ycore_i3-9300t_firmwarecore_i5-11260hcore_i5-9500t_firmwarexeon_e-2378core_i3-1115g4ecore_i5-10600tcore_i5-10600kf_firmwarexeon_e-2374g_firmwarecore_i5-9500te_firmwarecore_i7-10875h_firmwarexeon_e-2386g_firmwarecore_i5-9400hcore_i9-10900e_firmwarecore_i9-9900kf_firmwarecore_i3-9320core_i9-11900kfcore_i5-10600t_firmwarecore_i7-11700k_firmwarecore_i5-10300h_firmwarecore_i3-1120g4_firmwarecore_i9-10900tcore_i3-10100t_firmwarecore_i7-10700f_firmwarecore_i5-10500t_firmwarecore_i7-10700tecore_i5-10600_firmwarecore_i9-10900kcore_i3-10105core_i5-9400t_firmwarecore_i5-1140g7_firmwarecore_i5-11400tcore_i7-11700kcore_i5-11400fcore_i9-10900kf_firmwarecore_i5-10400txeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i7-1185g7core_i7-9700kfcore_i9-9880h_firmwarecore_i7-9700xeon_e-2334_firmwarecore_i7-9850hecore_i9-11980hk_firmwarecore_i7-10700kfcore_i7-9850hl_firmwarecore_i9-10900te_firmwarexeon_w-1370p_firmwarecore_i9-11900kcore_i5-10500hcore_i5-11600kf_firmwarecore_i7-1065g7core_i5-10600kfcore_i3-1000g1core_i5-1130g7_firmwarecore_i7-10700_firmwarecore_i5-1035g1_firmwarecore_i3-1005g1core_i7-1068ng7core_i5-1038ng7_firmwarecore_i9-11900h_firmwarecore_i7-1185gre_firmwarexeon_e-2356g_firmwarecore_i5-9400f_firmwarecore_i3-10305t_firmwarecore_i5-11500he_firmwarecore_i5-9400fcore_i3-10100ecore_i5-11320h_firmwarecore_i9-10850k_firmwarecore_i7-10700kf_firmwarecore_i5-9500f_firmwarecore_i7-11600hcore_i7-9700tcore_i7-10700core_i5-1135g7_firmwarecore_i5-11600kfcore_i5-9600t_firmwarecore_i9-11950h_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i3-1115g4_firmwarecore_i5-10500e_firmwarecore_i5-1145grecore_i5-11600k_firmwarecore_i5-1135g7core_i5-9300hfxeon_e-2378_firmwarecore_i3-1115g4core_i5-9600kfcore_i5-10400core_i3-9300core_i3-11100he_firmwarecore_i7-10870h_firmwarecore_i3-1120g4core_i5-1155g7core_i3-9300tcore_i7-9700kcore_i5-11400hcore_i7-11700kf_firmwarecore_i9-11900hcore_i7-9700t_firmwarecore_i7-1185g7ecore_i3-1110g4core_i7-10810ucore_i3-10300tcore_i5-1130g7core_i7-10700te_firmwarecore_i7-10700exeon_e-2378g_firmwarecore_i9-11900core_i5-9600kcore_i3-10100tecore_i7-10700tcore_i9-9900kfxeon_e-2388gcore_i5-10210u_firmwarecore_i7-11390hcore_i7-9700te_firmwarecore_i7-9700kf_firmwarecore_i5-1145g7core_i3-9300_firmwarecore_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kcore_i3-10100te_firmwarexeon_w-1390_firmwarecore_i7-1160g7_firmwarecore_i5-10600k_firmwarecore_i9-10900ecore_i3-9100core_i7-9750hcore_i3-10110y_firmwarecore_i7-11850h_firmwarecore_i9-11980hkcore_i7-9700f_firmwarecore_i9-11900fcore_i5-10500tecore_i5-10210y_firmwarecore_i5-11500core_i9-11950hcore_i7-11700core_i5-10500tcore_i5-10600core_i7-1195g7core_i5-10310ucore_i9-10885hcore_i5-10500_firmwarecore_i5-10310ycore_i5-9500_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_i7-1165g7core_i5-11400_firmwarecore_i7-11850hecore_i3-9100tecore_i5-10310y_firmwarecore_i5-9300hf_firmwarecore_i5-11500t_firmwarecore_i7-10750h_firmwarexeon_e-2388g_firmwarecore_i3-1115gre_firmwarecore_i5-1145g7ecore_i7-10700kxeon_e-2336core_i5-1030g7core_i9-10980hkcore_i5-11600t_firmwarecore_i9-9880hcore_i3-1000g1_firmwarecore_i7-10700k_firmwarecore_i9-10900t_firmwarecore_i3-9350k_firmwarecore_i7-11370hcore_i5-11400f_firmwarecore_i3-10305_firmwarecore_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i5-11500hcore_i7-1185g7_firmwarecore_i5-1035g4core_i5-11600tcore_i7-11800h_firmwarecore_i7-1180g7_firmwarecore_i7-1060g7_firmwarecore_i7-1068ng7_firmwarecore_i5-9600tcore_i9-11900t_firmwarecore_i5-10200hcore_i9-9900kcore_i3-1110g4_firmwarecore_i5-10400fxeon_e-2324g_firmwarecore_i7-1160g7xeon_w-1370core_i5-9600core_i5-1035g7_firmwarecore_i5-9400_firmwarecore_i5-9500core_i9-9900core_i7-9850hlcore_i3-10320_firmwarecore_i7-11850he_firmwarecore_i7-9750hfcore_i7-1180g7xeon_w-1370pcore_i3-10320core_i3-10110ycore_i5-1035g7core_i5-9300h_firmwarecore_i3-10105fxeon_w-1390t_firmwarecore_i3-9350kxeon_w-1390core_i7-11700t_firmwarecore_i7-10875hcore_i3-1115grecore_i5-11600core_i7-11700fcore_i7-1195g7_firmwarecore_i3-11100hecore_i5-10400hcore_i5-9600kf_firmwarecore_i3-10100e_firmwarecore_i3-10305tcore_i5-10505_firmwarecore_i3-9350kf_firmwarexeon_w-1370_firmwarecore_i5-10600kcore_i9-9900t_firmwarecore_i5-9500e_firmwarecore_i5-9600_firmwarecore_i7-9700e_firmwarecore_i7-9700ecore_i9-11900kf_firmwarecore_i7-10850hcore_i3-1005g1_firmwarecore_i5-10500core_i7-9700tecore_i5-9500tecore_i3-9100hl_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i5-1145g7e_firmwarecore_i3-10105tcore_i9-9900k_firmwarecore_i5-11300hcore_i7-10510u_firmwarexeon_w-1390p_firmwarecore_i3-1000g4core_i3-10105t_firmwarecore_i5-10400h_firmwarecore_i3-10100f_firmwarecore_i9-10900f_firmwarecore_i3-9100hlcore_i7-11390h_firmwarecore_i9-10900kfcore_i3-10100tcore_i9-9980hk_firmwarecore_i3-9100f_firmwarecore_i3-9320_firmwarecore_i9-9980hkcore_i5-11500hecore_i7-11700txeon_w-1390tcore_i5-1035g4_firmwarecore_i7-10700e_firmwarecore_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i3-9100te_firmwarecore_i7-9850h_firmwarecore_i5-1030g7_firmwarecore_i7-11700_firmwarecore_i7-11375hcore_i5-9500ecore_i7-1185g7e_firmwarecore_i5-11500tcore_i9-11900tcore_i5-11260h_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i7-11600h_firmwarecore_i7-1060g7core_i5-11400h_firmwarecore_i5-9400core_i7-1185grecore_i5-11400t_firmwarecore_i7-9750h_firmwarecore_i3-10325core_i7-10700t_firmwarexeon_e-2356gcore_i9-9900tcore_i7-9700_firmwarexeon_e-2336_firmwarecore_i5-1145gre_firmwarecore_i3-9350kfcore_i3-10105f_firmwarecore_i3-10105_firmwarecore_i5-11320hxeon_e-2334core_i7-9850hxeon_w-1350core_i3-10110u_firmwarecore_i7-10850h_firmwarexeon_e-2314core_i3-10305core_i5-1035g1core_i7-11850hcore_i7-9850he_firmwarecore_i9-11900f_firmwarexeon_e-2314_firmwarexeon_w-1390pcore_i3-10110ucore_i3-9100_firmwarecore_i5-10505core_i9-10885h_firmwarecore_i3-10100y_firmwarecore_i3-9100e_firmwarecore_i5-11500_firmwarecore_i7-10710uxeon_w-1350pcore_i5-10210ycore_i9-10900core_i3-1000g4_firmwarecore_i5-9400tcore_i7-1065g7_firmwarecore_i5-10300hcore_i7-1165g7_firmwarecore_i5-1145g7_firmwarecore_i9-9900ks_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i3-10300core_i7-11375h_firmwarecore_i3-9100fcore_i7-11700f_firmwarecore_i3-1125g4_firmwarecore_i9-10900fcore_i3-1125g4core_i5-10310u_firmwarecore_i5-1030g4xeon_e-2378gcore_i5-10200h_firmwarecore_i9-10980hk_firmwarecore_i5-11500h_firmwarecore_i7-10870hcore_i5-9500tcore_i3-10100fcore_i7-10510ucore_i5-10400_firmwarecore_i9-9900_firmwarecore_i3-10300_firmwarecore_i5-10500h_firmwarecore_i7-9750hf_firmwarexeon_e-2324gcore_i7-9700fcore_i7-10700fcore_i3-1115g4e_firmwarecore_i5-10210ucore_i5-9600k_firmwarecore_i9-10900k_firmwarecore_i3-9100tcore_i5-11300h_firmwareIntel(R) Processors
CVE-2021-33093
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.40%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:49
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Serial IO driver pack before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_serial_io_driver_packIntel(R) NUC M15 Laptop Kit Serial IO driver pack
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2023-50197
Matching Score-8
Assigner-Zero Day Initiative
ShareView Details
Matching Score-8
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.63%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:14
Updated-14 Aug, 2025 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantDriver & Support Assistantdriver\&support_assistant
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2021-33094
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.40%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:50
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_keyboard_led_service_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-33123
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.01%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e-2286gcore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7xeon_e5-2603_v4_firmwarecore_i9-7900xxeon_d-2733nt_firmwarecore_i7-10710u_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_w-1270p_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_e5-2637_v4core_i9-9960xxeon_w-2123xeon_platinum_8353hcore_i7-9700k_firmwarecore_i5-8500t_firmwarexeon_d-1749nt_firmwarecore_i3-9300t_firmwarexeon_e-2236xeon_platinum_8280_firmwarexeon_e3-1220_v5_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_w-1270exeon_silver_4209t_firmwarecore_i5-7500xeon_e5-2650_v4_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqcore_i7-8709gxeon_d-2786nte_firmwarexeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4core_i5-8200ycore_i5-10500t_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260uxeon_gold_6226r_firmwarexeon_e3-1235l_v5core_i5-7287u_firmwarecore_i9-10900xxeon_gold_6256_firmwarexeon_w-3335xeon_e7-8891_v4_firmwarexeon_w-11555mrecore_i5-10500hcore_i7-6800k_firmwarecore_i5-10600kfxeon_e5-2648l_v4core_i5-1035g1_firmwarexeon_w-2123_firmwarexeon_e-2146gxeon_d-2752nte_firmwarecore_i5-8210y_firmwarecore_i3-10100exeon_silver_4316_firmwarexeon_w-3365_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwarecore_i7-9700txeon_gold_6238core_i5-7600tcore_i7-4820kxeon_e3-1260l_v5_firmwarexeon_w-2195_firmwarexeon_e3-1240l_v5xeon_platinum_8256xeon_w-2275_firmwarexeon_e-2276mxeon_d-2163itcore_i7-3930kxeon_gold_6334_firmwarexeon_e3-1505m_v5xeon_w-2235_firmwarexeon_gold_6328hlxeon_d-1623nxeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarecore_i7-10810ucore_i3-10300txeon_e5-2628l_v4core_i3-8100xeon_e-2378g_firmwarecore_i5-9600kxeon_e5-2658_v4xeon_gold_5218r_firmwarecore_i3-7100xeon_e5-1630_v4_firmwarecore_i7-7600u_firmwarecore_i7-9700kf_firmwarecore_i5-9300hcore_i5-10500exeon_silver_4214y_firmwarecore_i9-10850kcore_i5-8500bcore_i3-7100e_firmwarexeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_platinum_8368q_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_w-2175_firmwarecore_i3-8100hcore_i3-7300t_firmwarexeon_e5-2695_v4core_i7-9700f_firmwarexeon_d-2177nt_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-1712tr_firmwarecore_i3-8130u_firmwarecore_i5-10310ucore_i7-6950x_firmwarexeon_e7-8860_v4_firmwarecore_i7-8557ucore_i3-8350k_firmwarexeon_e5-2683_v4core_i9-9820x_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarexeon_platinum_8376hl_firmwarecore_i9-10980hkxeon_d-2733ntxeon_w-11155mlexeon_d-1559_firmwarecore_i7-10700k_firmwarexeon_gold_5320tcore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarexeon_e5-2630l_v4core_i7-10510y_firmwarexeon_e7-8893_v4core_i7-1060g7_firmwarecore_i7-8500yxeon_w-3323xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarecore_i7-1068ng7_firmwarecore_i5-7400_firmwarexeon_w-2133_firmwarecore_i5-9600xeon_w-3375core_i5-8600tcore_i5-7200u_firmwarexeon_e3-1585_v5_firmwarexeon_gold_6258r_firmwarecore_i3-10320_firmwarexeon_gold_5218bxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_d-1734nt_firmwarexeon_e-2288gxeon_w-1370pcore_i7-7500uxeon_e-2274g_firmwarexeon_gold_5318s_firmwarexeon_e3-1225_v6xeon_e3-1280_v6xeon_gold_5218rxeon_d-2752ntexeon_e-2124g_firmwarexeon_e5-2695_v4_firmwarexeon_w-2235xeon_e5-2608l_v4_firmwarexeon_w-3175xxeon_platinum_8362_firmwarexeon_w-3225core_i3-7101texeon_e5-2609_v4core_i7-7700xeon_d-1540xeon_gold_6246r_firmwarexeon_gold_6246rcore_i5-7300hqxeon_d-1513ncore_i5-10505_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e5-2690_v4core_i9-9900xcore_i9-9900t_firmwarexeon_e5-2699a_v4_firmwarecore_i5-9600_firmwarexeon_e3-1505m_v6_firmwarecore_i7-9700exeon_e-2254mexeon_platinum_8260l_firmwarecore_i7-8500y_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_w-3235_firmwarexeon_platinum_9222xeon_gold_5318ncore_i3-10105tcore_i3-8100h_firmwarecore_i7-10510u_firmwarexeon_platinum_8358_firmwarecore_i7-7700_firmwarecore_i3-1000g4core_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i9-9980hk_firmwarexeon_e-2144gxeon_gold_6314ucore_i5-8300h_firmwarexeon_e3-1270_v6_firmwarexeon_d-2752tercore_i5-8279u_firmwarecore_i5-8500b_firmwarexeon_w-11555mlexeon_w-1390txeon_silver_4216xeon_e5-2640_v4xeon_e5-2697a_v4_firmwarexeon_platinum_8362core_i7-10610uxeon_platinum_8276lxeon_platinum_8351n_firmwarecore_i7-7740xxeon_e5-2637_v4_firmwarecore_i7-7y75xeon_d-1713nte_firmwarexeon_e3-1575m_v5xeon_e-2124gxeon_platinum_9221_firmwarecore_i7-4930kcore_i5-9400core_i5-8500_firmwarexeon_d-1557xeon_e5-2623_v4core_i3-10105f_firmwarexeon_w-3245mxeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_gold_5318sxeon_w-11555mle_firmwarecore_i5-7300hq_firmwarexeon_w-1350core_i5-1035g1xeon_w-3345_firmwarexeon_w-1290xeon_e-2314_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i7-8086k_firmwarexeon_w-2223_firmwarexeon_d-1718t_firmwarexeon_gold_6234core_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarecore_i5-7442eq_firmwarexeon_gold_6252n_firmwarecore_i7-4930mxcore_i9-10900xeon_e3-1230_v6_firmwarexeon_w-1250core_i7-1065g7_firmwarexeon_e3-1565l_v5_firmwarecore_i5-7360uxeon_e3-1275_v6xeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4core_i5-7300uxeon_e5-2698_v4_firmwarexeon_e5-2618l_v4_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarexeon_d-1736ntcore_i3-7100h_firmwarecore_i7-8565uxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_d-1747ntexeon_bronze_3206r_firmwarecore_i7-7700kxeon_w-3323_firmwarecore_i3-10100fcore_i9-9900_firmwarexeon_gold_5217core_i7-6850kcore_i7-9750hf_firmwarexeon_gold_6210ucore_i5-7200uxeon_d-1548_firmwarecore_i7-9700fcore_i5-8265u_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarecore_i5-10210ucore_i3-7300_firmwarecore_i7-7740x_firmwarexeon_w-11155mre_firmwarecore_i5-8400bcore_i3-7100hxeon_gold_5215core_i5-10400t_firmwarecore_i9-9900ksxeon_d-1531_firmwarexeon_d-1527_firmwarecore_i9-7920xxeon_d-1633n_firmwarexeon_platinum_8352vcore_i9-7960x_firmwarexeon_e3-1230_v6xeon_d-1513n_firmwarecore_i9-8950hkxeon_e7-4809_v4_firmwarexeon_platinum_8360ycore_i5-10600tcore_i5-10600kf_firmwarexeon_d-1747nte_firmwarecore_i5-7640xxeon_w-3275mcore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_d-1726_firmwarexeon_gold_6336yxeon_gold_6209ucore_i9-10900e_firmwarexeon_gold_6250lxeon_e-2176m_firmwarexeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_d-2146nt_firmwarexeon_e3-1240_v5_firmwarecore_i7-7660uxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_d-1518_firmwarexeon_platinum_8376h_firmwarecore_i7-7700hqxeon_e-2236_firmwarexeon_e-2244g_firmwarecore_i7-6900k_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_gold_6238l_firmwarecore_m3-7y30core_i5-8269u_firmwarexeon_w-11155mrexeon_gold_6252xeon_w-2135xeon_e3-1505l_v6_firmwarexeon_e3-1285_v6xeon_e5-4627_v4xeon_e-2276mlxeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarecore_i7-5820k_firmwarecore_i3-8300xeon_e3-1545m_v5core_i3-7102e_firmwarexeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_gold_6346_firmwarexeon_e-2276me_firmwarecore_i5-8400txeon_d-2775texeon_w-1370p_firmwarecore_i7-1065g7core_i7-9800xxeon_silver_4208xeon_e-2136_firmwarexeon_w-1270_firmwarexeon_gold_6210u_firmwarexeon_w-1250ecore_i5-8257u_firmwarecore_i5-1038ng7_firmwarecore_i5-9400f_firmwarecore_i7-8706g_firmwarexeon_gold_5215lcore_i5-7287uxeon_e5-4660_v4xeon_e-2146g_firmwarecore_i7-3970xcore_i7-3960xxeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_e-2126g_firmwarecore_i5-9600t_firmwarexeon_d-2753nt_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarexeon_d-1529_firmwarexeon_gold_6240lxeon_w-3265mxeon_gold_6248xeon_e5-4640_v4_firmwarexeon_d-1712trxeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_d-1736_firmwarecore_i3-8145ucore_i3-9300xeon_d-2173itxeon_d-2766ntcore_i7-7567ucore_i7-10870h_firmwarecore_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_gold_6252_firmwarexeon_e5-2650_v4xeon_d-2776ntcore_i7-3820xeon_e7-4820_v4_firmwarexeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700ecore_i3-7320xeon_e3-1585l_v5core_i7-3940xmxeon_gold_6348h_firmwarexeon_e-2388gcore_i7-9700te_firmwarexeon_platinum_8268xeon_d-2786ntexeon_e-2226gxeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_silver_4215rxeon_e-2278gcore_i9-10900ecore_i3-9100core_i5-8600core_i5-8250uxeon_platinum_8380xeon_w-3265core_m3-8100y_firmwarecore_i7-3940xm_firmwarecore_i5-10500tecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i7-8700bcore_i5-10500txeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_w-1250texeon_platinum_8352mxeon_gold_6208ucore_i3-9100tecore_i5-9300hf_firmwarexeon_d-1749ntxeon_gold_6242core_i7-10700kxeon_d-1627xeon_e3-1575m_v5_firmwarexeon_e-2186mcore_i3-8109u_firmwarexeon_e3-1558l_v5xeon_gold_6250_firmwarexeon_d-1623n_firmwarecore_i3-9350k_firmwarecore_i5-7442eqxeon_d-1702core_i7-8665uecore_i3-8130uxeon_e7-4830_v4core_i3-7167uxeon_e5-2699_v4_firmwarecore_i3-8300txeon_d-1528_firmwarexeon_gold_6342xeon_e5-4628l_v4xeon_d-1732te_firmwarexeon_e3-1268l_v5core_i9-9900kxeon_silver_4316xeon_gold_6240_firmwarecore_i7-5930kcore_i5-10400fxeon_w-2265_firmwarexeon_e-2278ge_firmwarexeon_gold_6330ncore_i5-9400_firmwarexeon_gold_6226rxeon_bronze_3204xeon_w-1270e_firmwarexeon_e-2276m_firmwarecore_i3-7350k_firmwarexeon_d-1567core_i5-8400t_firmwarexeon_w-3365core_i7-9850hlxeon_w-2135_firmwarexeon_e-2286m_firmwarecore_i5-8400hxeon_e3-1245_v5xeon_w-2175xeon_d-2141i_firmwarexeon_silver_4214r_firmwarexeon_w-3335_firmwarecore_i3-10110yxeon_d-2776nt_firmwarexeon_gold_6334core_i7-7820hkcore_i5-9300h_firmwarexeon_d-1734ntxeon_w-11855mxeon_gold_6240yxeon_e5-4655_v4_firmwarexeon_gold_6238lxeon_w-1390xeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_gold_5318h_firmwarexeon_gold_6354core_i7-8665ucore_i3-10305tcore_i3-9350kf_firmwarecore_i7-5960x_firmwarexeon_w-1370_firmwarecore_i5-7440eq_firmwarexeon_d-1649n_firmwarecore_i3-8140uxeon_gold_5320hcore_i7-8086kcore_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kxeon_gold_5222xeon_e7-8870_v4_firmwarecore_i7-10850hxeon_gold_6256xeon_d-1523ncore_i3-1005g1_firmwarexeon_gold_6338n_firmwarecore_i3-9100hl_firmwarecore_i9-9900x_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i3-8100bcore_i5-8279ucore_i3-10100f_firmwarecore_i5-8600kcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarexeon_d-1541xeon_d-1543n_firmwarexeon_gold_5320t_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1622xeon_gold_5222_firmwarecore_i7-8700t_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_platinum_8352v_firmwarexeon_w-2223xeon_gold_5318n_firmwarexeon_gold_6238tcore_i5-8500xeon_silver_4310t_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i9-10980xe_firmwarexeon_gold_6240r_firmwarecore_i5-8257uxeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarecore_i7-8569uxeon_silver_4310core_i9-9900tcore_i7-10700t_firmwarexeon_d-2796ntxeon_e3-1240_v5xeon_w-2133xeon_platinum_8260lxeon_e-2336_firmwarexeon_platinum_8270xeon_gold_6248r_firmwarecore_i5-8500txeon_e3-1501m_v6core_i7-4930k_firmwarexeon_d-2766nt_firmwarexeon_w-11555mre_firmwarexeon_d-2166ntxeon_gold_6348_firmwarecore_i3-10305core_i7-9850he_firmwarexeon_e5-2608l_v4xeon_w-1390pcore_i3-9100_firmwarexeon_e5-2658_v4_firmwarecore_i7-7560u_firmwarexeon_gold_6262vxeon_platinum_8354h_firmwarecore_i7-10710uxeon_e5-2620_v4xeon_e7-4809_v4core_i5-10300hxeon_platinum_8358pcore_i5-10210yxeon_silver_4210_firmwarexeon_d-1702_firmwarexeon_platinum_8380hl_firmwarexeon_w-1270texeon_e-2224core_i9-9900ks_firmwarexeon_e-2124_firmwarexeon_gold_6238rxeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarexeon_d-2798nt_firmwarecore_i9-10980hk_firmwarexeon_d-2166nt_firmwarexeon_e5-2699a_v4core_i5-10400_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_w-2155core_i3-7102exeon_w-11155mle_firmwarexeon_platinum_8376hlxeon_e7-8894_v4_firmwarexeon_silver_4216_firmwarexeon_d-1746tercore_i9-10900k_firmwarexeon_gold_5215l_firmwarexeon_d-2738_firmwarexeon_w-2225_firmwarexeon_gold_6230xeon_d-1714_firmwarexeon_e5-2650l_v4xeon_e7-4820_v4core_i3-9100ecore_i3-7300xeon_d-1548core_i7-10510yxeon_e3-1220_v5core_i5-7y57_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_d-1653nxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarecore_i9-10900_firmwarexeon_gold_5218txeon_e-2374gxeon_e-2254ml_firmwarexeon_d-1557_firmwarecore_i5-9500t_firmwarexeon_gold_5218ncore_i7-8709g_firmwarexeon_d-2163it_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarexeon_e7-8891_v4xeon_silver_4314_firmwarexeon_d-1533n_firmwarexeon_e-2278gexeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_w-10855mxeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_w-3275_firmwarecore_i5-10600t_firmwarexeon_platinum_8270_firmwarecore_i5-10300h_firmwarexeon_d-2775te_firmwarexeon_w-3235xeon_e5-2680_v4_firmwarecore_i9-10900txeon_d-1571_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarecore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarexeon_e5-4650_v4_firmwarexeon_gold_5220rxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-9700kfxeon_d-2796texeon_d-1541_firmwarexeon_w-1290te_firmwarexeon_gold_6328hl_firmwarexeon_platinum_9221xeon_d-2142itcore_i5-7600k_firmwarexeon_platinum_9222_firmwarecore_i5-8305g_firmwarexeon_e5-2699r_v4core_i3-8100b_firmwarecore_i9-10900te_firmwarexeon_e5-2640_v4_firmwarecore_i3-8300t_firmwarecore_i3-7167u_firmwarexeon_d-1726xeon_platinum_8380_firmwarecore_i7-10700_firmwarexeon_d-1735tr_firmwarexeon_silver_4314core_i3-1005g1core_i7-1068ng7xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarecore_i7-7820eq_firmwarexeon_d-1637core_i5-9400fxeon_d-1539_firmwarexeon_e3-1515m_v5core_i5-9500f_firmwarecore_i7-6800kcore_i7-7560uxeon_platinum_8368_firmwarecore_i7-8550u_firmwarexeon_d-1602xeon_e5-4655_v4core_i5-8365uxeon_platinum_8376hxeon_w-2245xeon_d-2799xeon_gold_6312u_firmwarexeon_d-2145ntcore_i5-9600kfxeon_e5-2697a_v4xeon_e-2288g_firmwarexeon_w-1250te_firmwarexeon_e-2224gcore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uxeon_gold_6254_firmwarexeon_e5-1620_v4xeon_e5-4669_v4xeon_gold_5220_firmwarexeon_e5-2609_v4_firmwarexeon_gold_6338ncore_i5-7600t_firmwarecore_i7-9700t_firmwarecore_i7-8665ue_firmwarecore_i7-4820k_firmwarexeon_gold_6330core_i7-7820hq_firmwarexeon_silver_4208_firmwarexeon_d-1521core_i3-8145uexeon_w-2155_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarecore_i5-8265ucore_i7-10700txeon_e-2246g_firmwarecore_i9-9900kfxeon_e5-4620_v4_firmwarecore_i7-10750hxeon_e-2226ge_firmwarexeon_d-2753ntxeon_e3-1225_v6_firmwarexeon_gold_6338xeon_gold_5315ycore_i5-8400b_firmwarecore_i7-8706gcore_i7-5930k_firmwarecore_i5-7400t_firmwarexeon_silver_4215xeon_gold_6230ncore_i5-8365u_firmwarexeon_platinum_8280l_firmwarexeon_e5-2667_v4_firmwarecore_i9-10885hxeon_gold_6338tcore_i5-9500_firmwarecore_i5-7440eqxeon_d-1739_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_m3-7y32xeon_gold_6242_firmwarexeon_d-1733nt_firmwarecore_i7-10750h_firmwarexeon_e-2134xeon_w-1290texeon_w-3265_firmwarexeon_d-2142it_firmwarexeon_platinum_8360y_firmwarecore_i7-8557u_firmwarecore_m3-7y32_firmwarexeon_w-11865mre_firmwarexeon_platinum_8360hxeon_e-2176mxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_5218_firmwarecore_i9-10900t_firmwarexeon_silver_4210txeon_w-3275m_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-2795ntcore_i5-7267u_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_w-3245m_firmwarecore_i5-9600txeon_e-2226g_firmwarexeon_e5-1650_v4core_i9-7960xxeon_gold_6336y_firmwarexeon_w-1370xeon_d-1715terxeon_d-1559xeon_platinum_9242_firmwarexeon_e-2174gxeon_e3-1220_v6core_i7-7y75_firmwarexeon_d-1537xeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_gold_6230_firmwarexeon_e7-4850_v4_firmwarexeon_e-2176gxeon_gold_6254xeon_e7-8880_v4core_i3-10320xeon_gold_6342_firmwarexeon_e5-2667_v4core_i3-10105fxeon_w-1390t_firmwarexeon_gold_5320xeon_e-2224_firmwarexeon_gold_5320h_firmwarexeon_d-1649nxeon_e7-8890_v4core_i7-10875hxeon_d-1736nt_firmwarecore_i5-10400hxeon_d-2712t_firmwarecore_i5-9600kf_firmwarecore_i7-9800x_firmwarexeon_w-10885mxeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_d-1527core_i9-9940xcore_i9-9980xe_firmwarexeon_gold_6312uxeon_e3-1535m_v5core_i9-7940xxeon_gold_5220r_firmwarexeon_platinum_8380hlxeon_e3-1505l_v5core_i7-9700texeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_w-2125core_i9-9900k_firmwarexeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-10400h_firmwarexeon_silver_4309yxeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntcore_i3-10100txeon_d-1713ntcore_i3-9100f_firmwarecore_i7-7700hq_firmwarecore_i9-9980hkxeon_e-2244gcore_i3-7100txeon_w-2125_firmwarecore_i5-1035g4_firmwarexeon_platinum_8358p_firmwarexeon_e3-1235l_v5_firmwarecore_i7-9850h_firmwarexeon_d-2795nt_firmwarecore_i7-8559ucore_i5-9500exeon_gold_6314u_firmwarecore_i9-9920x_firmwarexeon_platinum_8368qxeon_w-1250e_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarexeon_gold_6209u_firmwarecore_i3-10325core_i9-7920x_firmwarexeon_e-2356gxeon_platinum_8356h_firmwarecore_i7-8700core_i3-7130ucore_i5-8400xeon_platinum_8276l_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_platinum_8380hxeon_gold_6262v_firmwarexeon_e-2334core_i7\+8700core_i5-7440hq_firmwarecore_i7-9850hcore_i3-10110u_firmwarecore_i5-7600core_i9-10980xexeon_e3-1505l_v5_firmwarexeon_w-11865mlexeon_e3-1280_v5_firmwarexeon_e5-2697_v4xeon_e-2186gxeon_gold_6226_firmwarecore_i5-8310y_firmwarexeon_silver_4210core_i9-10885h_firmwarexeon_gold_6250l_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i3-7320_firmwarecore_i7-8569u_firmwarexeon_e5-2630_v4xeon_gold_6240y_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i5-9400txeon_w-3245_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i3-8100t_firmwarecore_i5-7600_firmwarecore_i9-9960x_firmwarecore_i5-10310u_firmwarecore_i5-8400_firmwarexeon_e-2234_firmwarecore_i7-10870hxeon_silver_4215r_firmwarecore_i7-10510uxeon_w-1290pcore_i7-7920hq_firmwarecore_i5-8310ycore_i5-10500h_firmwarexeon_d-1523n_firmwarecore_i3-10300_firmwarexeon_d-2183it_firmwarexeon_w-3245xeon_e-2324gxeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_w-3345xeon_e-2186m_firmwarexeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500xeon_platinum_8351nxeon_gold_6354_firmwarexeon_e5-1650_v4_firmwarecore_i7-8850hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarexeon_e3-1240_v6_firmwarexeon_d-1622_firmwarexeon_w-11865mrecore_i3-10100_firmwarexeon_platinum_8352y_firmwarecore_i9-10900texeon_platinum_8260y_firmwarexeon_platinum_8358core_i5-1030g4_firmwarecore_i5-9500fxeon_e3-1501l_v6core_i3-10100yxeon_e7-8867_v4xeon_e-2378core_i7-7820xcore_i7-3970x_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2699r_v4_firmwarexeon_gold_5317_firmwarecore_i7-7800xcore_i5-9400hxeon_platinum_8253xeon_gold_6252nxeon_e7-8894_v4core_i3-9320xeon_platinum_8280core_i7-10700f_firmwarecore_i3-10100t_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarecore_i3-10105xeon_silver_4309y_firmwarecore_i7-4940mxxeon_gold_6246core_i9-10900kf_firmwarexeon_e5-4610_v4_firmwarexeon_e5-1630_v4core_i7-8550uxeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i9-10940xcore_i7-9700xeon_e3-1270_v6xeon_w-3265m_firmwarexeon_d-1577_firmwarecore_i7-9850hexeon_platinum_8360hlcore_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwarexeon_d-1748texeon_gold_5315y_firmwarecore_i5-7500txeon_silver_4310txeon_d-2187ntxeon_d-1518xeon_gold_5318hcore_i3-1000g1xeon_w-2225xeon_gold_5320_firmwarecore_i7-3820_firmwarexeon_e-2276mexeon_silver_4210t_firmwarecore_i5-7y54xeon_gold_5218t_firmwarecore_i7-6950xxeon_e5-4620_v4core_i5-7400core_i7-8700b_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarecore_i3-10305t_firmwarexeon_w-10855m_firmwarecore_i9-10850k_firmwarecore_i7-7660u_firmwarecore_i5-8365ue_firmwarexeon_e5-2698_v4xeon_platinum_8352score_i7-7920hqxeon_d-1718tcore_i7-10700xeon_d-1533ncore_i3-7020uxeon_w-2195xeon_e-2136core_i5-9300hfcore_i3-8145u_firmwarexeon_w-1270pcore_i5-8600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rxeon_platinum_9282core_i5-10400core_i3-7020u_firmwarexeon_d-2161ixeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarexeon_silver_4215_firmwarexeon_d-2123itcore_i5-8365uecore_i3-8109ucore_i7-4960x_firmwarexeon_bronze_3206rxeon_gold_6346xeon_d-1722nexeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarexeon_gold_5220core_i5-8350uxeon_platinum_8256_firmwarexeon_e3-1275_v5core_i7-8750h_firmwarexeon_e5-4610_v4core_i3-10100texeon_e3-1558l_v5_firmwarecore_i5-10210u_firmwarecore_i3-8140u_firmwarexeon_d-1537_firmwarexeon_d-2796te_firmwarecore_i5-7y57xeon_w-3375_firmwarecore_i3-9300_firmwarecore_i7-3920xmxeon_gold_6330hcore_i5-7260uxeon_d-1540_firmwarecore_i5-10600k_firmwarexeon_e7-8890_v4_firmwarecore_i5-8259u_firmwarexeon_e5-2683_v4_firmwarexeon_e-2124core_i7-9750hcore_i3-10110y_firmwarexeon_e-2186g_firmwarexeon_d-1553n_firmwarecore_i9-7980xe_firmwarexeon_platinum_8368xeon_w-1270te_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarexeon_d-2798ntcore_i5-10600xeon_e3-1240l_v5_firmwarecore_i5-10500_firmwarexeon_w-2245_firmwarexeon_e3-1260l_v5core_i5-10310yxeon_d-1736core_i5-10310y_firmwarexeon_d-2738xeon_d-1567_firmwarecore_i5-8259uxeon_e-2388g_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_e-2336xeon_gold_6246_firmwarexeon_e3-1225_v5xeon_platinum_8260_firmwarexeon_e-2286mcore_i9-9880hcore_i7-8705g_firmwarecore_i7-4930mx_firmwarexeon_gold_6244_firmwarexeon_d-1722ne_firmwarecore_i5-1035g4core_i7-8650ucore_i5-10200hcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220txeon_e-2324g_firmwarecore_i7-7600uxeon_gold_6244xeon_w-3223_firmwarexeon_gold_6242rcore_i5-1035g7_firmwarecore_i3-7100exeon_w-2275xeon_w-3175x_firmwarecore_i7\+8700_firmwarexeon_w-2265core_i5-9500xeon_e3-1535m_v6core_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_d-1714xeon_gold_5218b_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_gold_6248_firmwarecore_i7-9750hfxeon_e3-1501m_v6_firmwarexeon_d-2141icore_i7-3920xm_firmwarecore_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e-2176g_firmwarecore_i5-1035g7xeon_gold_6326xeon_e-2254mlcore_i5-8305gcore_i3-9350kcore_i5-7400txeon_gold_6348core_i7-8750hxeon_w-2145_firmwarecore_i3-10100e_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i5-8300hcore_i9-7940x_firmwarecore_i3-7101te_firmwarexeon_d-2712txeon_e5-2650l_v4_firmwarecore_i5-9500e_firmwarecore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i5-9500texeon_w-1290e_firmwarexeon_d-1520core_i5-7y54_firmwarexeon_d-2187nt_firmwarexeon_w-1390p_firmwarexeon_e3-1280_v6_firmwarecore_i9-10900f_firmwarexeon_w-11955m_firmwarexeon_platinum_8280lcore_m3-8100yxeon_platinum_8356hxeon_gold_6338t_firmwarecore_i5-7267ucore_i3-7100uxeon_d-1543ncore_i5-7260u_firmwarexeon_e7-8867_v4_firmwarexeon_gold_5318y_firmwarecore_i5-7300u_firmwarexeon_d-1732texeon_d-1520_firmwarexeon_platinum_9242xeon_e5-4660_v4_firmwarexeon_e5-2680_v4core_i7-10700e_firmwarecore_i3-9100te_firmwarexeon_e5-2660_v4_firmwarecore_i3-7300tcore_i5-8210yxeon_e5-2687w_v4core_i7-1060g7core_i7-8565u_firmwarexeon_w-11855m_firmwarecore_i7-5820kxeon_platinum_8352m_firmwarecore_i7-9700_firmwarecore_i7-7700tcore_i7-6900kcore_i9-9980xexeon_platinum_9282_firmwarexeon_gold_6250xeon_d-1713ntecore_i3-9350kfxeon_w-1290txeon_d-1739core_i7-8809gxeon_gold_6226core_i3-10105_firmwarecore_i7-8650u_firmwarexeon_d-1577xeon_d-1735trxeon_silver_4214_firmwarexeon_platinum_8268_firmwarecore_i7-10850h_firmwarexeon_e3-1535m_v5_firmwarexeon_e-2314xeon_e5-2690_v4_firmwarecore_i7-8700_firmwarecore_i3-7350kcore_i3-8300_firmwarecore_i5-10505xeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_w-2255core_i9-10900x_firmwarecore_i5-7600kcore_m3-7y30_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_d-1746ter_firmwarexeon_w-11865mle_firmwarecore_i3-1000g4_firmwarexeon_gold_6330_firmwarecore_i5-8350u_firmwarexeon_e-2276g_firmwarexeon_d-1627_firmwarexeon_d-1733ntxeon_gold_5218xeon_w-2145xeon_gold_6338_firmwarecore_i7-4940mx_firmwarecore_i3-9100fxeon_w-1250_firmwarecore_i5-7500t_firmwarexeon_d-1653n_firmwarecore_i9-10900fxeon_w-3225_firmwarexeon_e3-1245_v6xeon_e-2378gcore_i5-10200h_firmwarecore_i3-8100txeon_gold_6238r_firmwarecore_i5-9500txeon_platinum_8352yxeon_w-3223xeon_e5-2643_v4xeon_e3-1268l_v5_firmwarexeon_e-2276gxeon_gold_6222vcore_i7-10700fxeon_e5-1620_v4_firmwarexeon_d-1571core_i5-9600k_firmwarexeon_gold_6238t_firmwarexeon_e5-2620_v4_firmwarexeon_platinum_8353h_firmwarexeon_gold_5217_firmwareIntel(R) Processors
CVE-2006-6385
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 39.91%
||
7 Day CHG~0.00%
Published-08 Dec, 2006 | 01:00
Updated-07 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.

Action-Not Available
Vendor-n/aIntel Corporation
Product-pro_10gbe_adapterspro_1000_pcie_adapterspro_10_100_adapterspro_1000_adaptersn/a
CVE-2021-33090
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.40%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:57
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissionsin the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC10i3FN, NUC10i5FN, NUC10i7FN before version 1.78.2.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc10i5fnnuc10i3fnnuc_hdmi_firmware_update_toolnuc10i7fnIntel(R) NUC HDMI Firmware Update Tool for NUC10i3FN, NUC10i5FN, NUC10i7FN
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33088
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.40%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:36
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack before version 5.4.1.4449 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_integrated_sensor_hub_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2019-11094
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.72%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in system firmware for Intel (R) NUC Kit may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_dn2820fykhnuc_kit_d54250wybnuc_kit_nuc7cjyhnuc_kit_nuc5i7ryhnuc_kit_nuc6i7kyknuc_kit_de3815tybenuc_kit_nuc8i7hnknuc_kit_nuc5cpyhnuc_kit_nuc7i7bnhnuc_kit_d33217gkenuc_kit_nuc6caysnuc_kit_nuc5pgyhnuc_kit_nuc5i5myhenuc_kit_d53427rkenuc_kit_nuc7i3dnhenuc_kit_nuc6i5syhnuc_kit_nuc7i5dnkenuc_kit_firmwarenuc_kit_nuc5i3myhenuc_kit_nuc7i7dnkeIntel (R) NUC
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11085
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.97%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i915_firmwarei915Intel(R) i915 Graphics for Linux
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11170
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.41%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-287
Improper Authentication
CVE-2000-0516
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 36.74%
||
7 Day CHG~0.00%
Published-13 Oct, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When configured to store configuration information in an LDAP directory, Shiva Access Manager 5.0.0 stores the root DN (Distinguished Name) name and password in cleartext in a file that is world readable, which allows local users to compromise the LDAP server.

Action-Not Available
Vendor-n/aIntel Corporation
Product-shiva_access_managern/a
CVE-2018-3649
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 37.59%
||
7 Day CHG~0.00%
Published-10 May, 2018 | 22:00
Updated-16 Sep, 2024 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL injection vulnerability in the installation executables (Autorun.exe and Setup.exe) for Intel's wireless drivers and related software in Intel Dual Band Wireless-AC, Tri-Band Wireless-AC and Wireless-AC family of products allows a local attacker to cause escalation of privilege via remote code execution.

Action-Not Available
Vendor-Intel Corporation
Product-wireless-ac_9560wireless-n_7265dual_band_wireless-n_7260dual_band_wireless-ac_7265dual_band_wireless-ac_8265dual_band_wireless-ac_7260wireless-ac_9462tri-band_wireless-ac_18260dual_band_wireless-n_7265wireless-ac_9461dual_band_wireless-ac_3160tri-band_wireless-ac_17265wireless-n_7260dual_band_wireless-ac_3165dual_band_wireless-ac_8260wireless-ac_9260dual_band_wireless-ac_3168tri-band_wireless-ac_18265Dual Band Wireless-AC, Tri-Band Wireless-AC and Wireless-AC family of products
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2018-3687
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.71%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 21:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unquoted service paths in Intel Quartus II Programmer and Tools in versions 11.0 - 15.0 allow a local attacker to potentially execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-quartus_ii_programmer_and_toolsIntel Quartus II Programmer and Tools
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2018-3670
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.04% / 12.41%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 15:00
Updated-17 Sep, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a buffer overflow.

Action-Not Available
Vendor-Intel Corporation
Product-intel_smart_sound_technologySmart Sound Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-3667
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.64%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 21:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Installation tool IPDT (Intel Processor Diagnostic Tool) 4.1.0.24 sets permissions of installed files incorrectly, allowing for execution of arbitrary code and potential privilege escalation.

Action-Not Available
Vendor-Intel Corporation
Product-processor_diagnostic_toolIntel Processor Diagnostic Tool
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2021-0190
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.22%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncaught exception in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2650l_v4xeon_e5-1607_v4_firmwarexeon_e5-2689_v4xeon_e5-1650_v4_firmwarexeon_e5-2630l_v4xeon_e5-2699_v4_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2660_v4_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_e5-2603_v4_firmwarexeon_e5-2697a_v4xeon_e5-4628l_v4xeon_e5-2687w_v4xeon_e5-2637_v4core_i9-10980xe_firmwarexeon_e5-1650_v4xeon_e5-1620_v4xeon_e5-4669_v4xeon_e5-2689_v4_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2609_v4_firmwarexeon_e5-4610a_v4xeon_e5-2623_v4xeon_e5-2699r_v4_firmwarexeon_e5-2679_v4xeon_e5-4640_v4xeon_e5-2628l_v4xeon_e5-2650_v4xeon_e5-2650_v4_firmwarexeon_e5-4660_v4_firmwarexeon_e5-2630l_v4_firmwarexeon_e5-2687w_v4_firmwarecore_i9-10980xexeon_e5-2690_v4_firmwarexeon_e5-2608l_v4xeon_e5-4650_v4xeon_e5-2697_v4xeon_e5-2660_v4xeon_e5-4610_v4xeon_e5-2680_v4_firmwarexeon_e5-2658_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e5-2658_v4xeon_e5-2679_v4_firmwarexeon_e5-1630_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_e5-4650_v4_firmwarexeon_e5-2667_v4xeon_e5-1680_v4_firmwarexeon_e5-2695_v4_firmwarexeon_e5-4620_v4_firmwarecore_i9-10900x_firmwarexeon_e5-4655_v4_firmwarexeon_e5-2608l_v4_firmwarexeon_e5-4627_v4xeon_e5-2630_v4xeon_e5-1603_v4_firmwarexeon_e5-1630_v4xeon_e5-4610_v4_firmwarexeon_e5-2620_v4core_i9-10920x_firmwarexeon_e5-2609_v4core_i9-10940xxeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4xeon_e5-2698_v4_firmwarexeon_e5-2683_v4_firmwarexeon_e5-2618l_v4_firmwarecore_i9-10900xxeon_e5-1607_v4xeon_e5-2643_v4_firmwarexeon_e5-2695_v4xeon_e5-2623_v4_firmwarexeon_e5-2690_v4xeon_e5-2650l_v4_firmwarexeon_e5-2699r_v4core_i9-10940x_firmwarecore_i9-10920xxeon_e5-2699a_v4_firmwarexeon_e5-2640_v4_firmwarexeon_e5-2667_v4_firmwarexeon_e5-2699a_v4xeon_e5-2618l_v4xeon_e5-4667_v4_firmwarexeon_e5-1660_v4_firmwarexeon_e5-2648l_v4xeon_e5-4620_v4xeon_e5-4610a_v4_firmwarexeon_e5-2643_v4xeon_e5-2683_v4xeon_e5-2699_v4xeon_e5-2628l_v4_firmwarexeon_e5-2603_v4xeon_e5-4660_v4xeon_e5-2697_v4_firmwarexeon_e5-2698_v4xeon_e5-1620_v4_firmwarexeon_e5-1603_v4xeon_e5-2620_v4_firmwarexeon_e5-2640_v4xeon_e5-2680_v4xeon_e5-4655_v4xeon_e5-2697a_v4_firmwareIntel(R) Processors
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2021-0060
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.6||MEDIUM
EPSS-0.24% / 46.33%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient compartmentalization in HECI subsystem for the Intel(R) SPS before versions SPS_E5_04.01.04.516.0, SPS_E5_04.04.04.033.0, SPS_E5_04.04.03.281.0, SPS_E5_03.01.03.116.0, SPS_E3_05.01.04.309.0, SPS_02.04.00.101.0, SPS_SoC-A_05.00.03.114.0, SPS_SoC-X_04.00.04.326.0, SPS_SoC-X_03.00.03.117.0, IGN_E5_91.00.00.167.0, SPS_PHI_03.01.03.078.0 may allow an authenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-atom_c3950xeon_d_2000_series_firmwarepentium_gold_g5500tcore_i5-11500hcore_i5-11600tcore_i5-11400xeon_d-1548pentium_gold_g5620xeon_d-1529core_i5-11600kceleron_6000_series_firmwareatom_c3558rxeon_w-1300_series_firmwarecore_i7-1160g7xeon_w-1370c240_series_firmwareatom_c3808core_i5-11260hxeon_d-1559core_i3-1115g4epentium_gold_g6605c627xeon_d-1531pentium_gold_g5400tc627ac625xeon_d-1537c621axeon_d-1567pentium_gold_g6505tpentium_gold_g6505atom_c3758xeon_d-2177ntcore_i9-11900kfxeon_d-2141ipentium_gold_4415ucore_i7-1180g7pentium_gold_g6400xeon_w-1370patom_c3308pentium_gold_g6500tatom_c3000_series_firmwarepentium_gold_5405upentium_gold_series_firmwarepentium_gold_g5400hci_storage_node_biosatom_p5962bcore_i5-11400txeon_w-1390hci_compute_node_bioscore_i7-11700kcore_i5-11400fcloud_backupcore_i3-1115grecore_i5-11600core_i7-11700fcore_i7-1185g7xeon_d-1540core_i3-11100heceleron_6600hepentium_gold_7505xeon_d-1513nc246xeon_d-2183itc629axeon_d-1527xeon_d-2142itxeon_d-2187ntc628xeon_d-1518core_i9-11900kxeon_d-1523npentium_gold_g7400tatom_c3958atom_c3338rxeon_d-1520core_i5-11300hc620a_series_firmwarec626atom_p5942bxeon_d-2146ntatom_c3858pentium_gold_g6600xeon_d-1543npentium_gold_g5420txeon_d-1541core_i5-11500hec622atom_c3538core_i7-11600hcore_i7-11700txeon_w-1390tcore_i5-11600kfpentium_gold_4410ycore_i5-1140g7core_i7-11700kfatom_c3508xeon_d-1533ncore_i5-1145grepentium_gold_g5420core_i5-1135g7core_i7-11375hcore_i3-1115g4xeon_d-2145ntatom_c3850atom_c3955core_i5-11500tcore_i9-11900tsolidfire_biosxeon_d-2173itxeon_d-2161ic621xeon_d-2163itpentium_gold_g5600pentium_gold_g7400core_i3-1120g4core_i5-1155g7core_i7-1185grexeon_d-2123itcore_i5-11400hatom_c610_series_firmwareatom_c3558xeon_d-1557core_i9-11900hceleron_6305eatom_c3436l11th_generation_core_series_firmwarecore_i3-1110g4core_i7-1185g7ecore_i5-11320hxeon_d-1521xeon_d-1577atom_c3708core_i5-1130g7xeon_w-1350pentium_gold_4425ypentium_gold_g7400exeon_d-2166ntcore_i7-11850hcore_i9-11900pentium_gold_4415yxeon_w-1390pxeon_d-1539atom_p5921bxeon_d-1500_series_firmwarec629atom_c3336pentium_gold_6500ycore_i7-11390hcore_i5-1145g7pentium_gold_6405uxeon_w-1350ppentium_gold_g6405xeon_d-2143itatom_c612pentium_gold_g7400tepentium_gold_g5600tpentium_gold_g6500pentium_gold_g6400tc624core_i7-11800hcore_i9-11980hkatom_p5931bcore_i9-11900fpentium_gold_4417ucore_i3-1125g4c620_series_firmwarexeon_d-1553nc242core_i5-11500core_i9-11950hpentium_gold_g6400eatom_c3750core_i7-11700atom_c3830pentium_gold_g6400tecm246core_i7-1195g7pentium_gold_g5500core_i7-1165g7core_i7-11850heceleron_6305atom_c3338core_i5-1145g7exeon_d-1571xeon_d-1528atom_c3758ratom_p5000_series_firmwarecore_i7-11370hpentium_gold_g6405tIntel(R) SPS
CVE-2021-0114
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 20.11%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 18:36
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1558l_v5xeon_e3-1235lxeon_e3_1240l_v5xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7core_i5-1035g7core_i5-6585ratom_c3758rcore_i7_9700fxeon_d-1527xeon_e5-2697_v4xeon_platinum_8170xeon_e-2314xeon_w-2125core_i9-10940xcore_i7_8500yxeon_e3_1246_v3xeon_platinum_8164core_i7-9700core_i7-3960xxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_e3-1265l_v2xeon_gold_6238rcore_i7-8670core_i5-1035g4xeon_w-2255core_i5-10400hxeon_d-1518core_i7_10510ycore_i7-6822eqcore_i7-9700tecore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i9-7920xcore_i7-7600uxeon_e3_1501l_v6xeon_e5-2608l_v4xeon_e-2224xeon_e5-2683_v4xeon_gold_5218core_i3-7100ecore_i5-11600txeon_d-1567xeon_e3-1505l_v6xeon_e-2278gecore_i3-6098pxeon_w-2245xeon_e3_1245xeon_d-1587xeon_e3_1275_v2xeon_e5-2699_v3core_i5-10400core_i5-8700bxeon_e3-1285core_i5-10500tecore_i7-7820hkcore_i7-6900kxeon_e5-2689_v4core_i9-9940xcore_i5-11600xeon_gold_6240core_i7-6970hqcore_i3-6120tcore_i5-8600xeon_e3_1268l_v5core_i7-3930kcore_i5-1030ng7core_i7-1060g7core_i9-10900xeon_platinum_8274xeon_d-1539xeon_e3_1285_v3xeon_e3-1535m_v5xeon_gold_5220rcore_i9-10900kxeon_e-2386gxeon_d-2146ntxeon_e3-1268l_v5core_i5-8600kxeon_e3110xeon_platinum_8160fcore_i9-10900fxeon_e3-1220core_i7-8750hcore_i7-6850kxeon_platinum_8160mxeon_d-2166ntxeon_e3-1270_v6core_i7-3920xmxeon_e-2286mxeon_e3-1505m_v5xeon_silver_4216xeon_gold_6230xeon_w-2195atom_c3336xeon_e5-2628l_v4xeon_e-2276gcore_i5_8400txeon_d-2183itxeon_e3-1535mcore_i3-7100core_i7-8809gcore_i3-8145uexeon_e5-4667_v3xeon_platinum_8160hxeon_e3-1280_v2xeon_e3-1220_v2core_i5-7267uxeon_e3_1260l_v5xeon_silver_4208core_i3-8121uxeon_e3_1225_v6xeon_e3-1585_v5xeon_w-2104core_i5-10500ecore_i5-9400tcore_i7-6560ucore_i9_9900ksxeon_gold_5220sxeon_w-2123core_i5-8300hxeon_platinum_9282xeon_e5-2683_v3core_i5-10600kfxeon_silver_4108xeon_gold_6130txeon_e3-1280_v3xeon_silver_4210core_i5-11600kfcore_i7-9800xcore_i7-11700kfcore_i7-10870hxeon_e3-1565lxeon_e3_1220_v6core_i7_8086kxeon_e3_1235core_i3-6167uxeon_e-2274gcore_i5-11500tcore_i5-9500xeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1290core_i5_9400xeon_e5-2698_v4xeon_platinum_8160tcore_i7-7740xxeon_d-1528core_i7-6500ucore_i3-7110ucore_i7xeon_e-1105cxeon_e5-2660_v4xeon_e3_1275l_v3core_i7-3940xmcore_i5_9500tcore_i7-4940mxxeon_platinum_8268core_i5-6300ucore_i7-4930kcore_i7-8565uxeon_e5-2687w_v4xeon_e5-1603_v3xeon_e3_1245_v6core_i5-7300hqcore_i7-7560uxeon_e3-1271_v3xeon_gold_5117fxeon_e3_1505m_v5core_i9-11900fcore_i5-8259ucore_i7-4820kxeon_d-1529xeon_e3-1265l_v3xeon_e3_1505l_v5xeon_e3_1230core_i7-11600hxeon_e3_1285l_v3xeon_e-2336core_i3-9130ucore_i5-6350hqxeon_e3_1125cxeon_gold_6132core_i5-7600txeon_e5-2618l_v4xeon_gold_6137xeon_e-2224gxeon_w-2135xeon_e3-1505mxeon_e3_1270_v5core_i5-11320hxeon_e-2226gecore_i5_9600txeon_gold_6142core_i5-9300hxeon_e3_1220_v5core_i7-10610ucore_i5-9400hcore_i7-8500yxeon_e3_1280_v2atom_c3436lxeon_e3-1286_v3core_i3-7367uxeon_w-1390pxeon_e3-1230_v3xeon_d-1632core_i7-7820hqxeon_e5-2620_v3xeon_e3_1290_v2xeon_e5-2648l_v3core_i3-6100exeon_gold_6142mxeon_e3-1280core_i7_8700xeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1221_v3xeon_e3-1240_v5core_i7_9700kfxeon_e3-1230l_v3xeon_e3_1225_v2xeon_e5-2650_v3xeon_gold_6222core_i7-6567ucore_i3-7101ecore_i9-7900xxeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223core_i7-7510ucore_i7-8510ycore_i5-8265ucore_i5-6300hqxeon_e-2254mecore_i7-4930mxatom_c3558core_i7-5930kcore_i7-7y75xeon_e3_1245_v2core_i7-6700atom_c3308xeon_e3-1220_v3core_i5-7y57xeon_e5-4627_v3core_i3-8350kxeon_e3_1240_v3xeon_gold_6148core_i5-7500txeon_e3-1505m_v6xeon_gold_6144core_i3-9100xeon_e3-1120atom_c3758atom_c3558ratom_c3830xeon_e3120xeon_gold_5220txeon_e3_1125c_v2xeon_platinum_8276latom_c3750xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_platinum_9222core_i5-9500exeon_gold_6129xeon_gold_6230tcore_i7-7660ucore_i7-8706gxeon_e3-1220l_v2xeon_gold_6126txeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_w-1370core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i5-6310ucore_i7-8700core_i5-10400fxeon_e3-1501lcore_i3-6300tcore_i3-7100tcore_i7-7700txeon_e3_1240_v2core_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3core_i5-10210uxeon_e3_1240xeon_w-2295core_i7-6770hqcore_i5-8257ucore_i5-10610ucore_i7-8700kxeon_e3-1268l_v3core_i7_8550ucore_i5-7442eqxeon_gold_5215xeon_e5-2667_v3xeon_d-2143itxeon_e5-2699_v4xeon_e3-1285_v6core_i5-10505core_i5-1030g7xeon_e3-1278l_v4xeon_e3-1225_v6xeon_e3-1220l_v3xeon_e3_1280_v5xeon_silver_4109txeon_e3-1240l_v5xeon_e5-2690_v3xeon_silver_4215rxeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_e3_1245_v3core_i5-8420txeon_e3_1225xeon_silver_4210tcore_i5_9500fxeon_e3-1290_v2xeon_e3-1286l_v3xeon_e3_1241_v3xeon_e5-2680_v3xeon_gold_6212ucore_i9-7980xexeon_silver_4114core_i3-8100hcore_i7-6870hqxeon_e3-1230_v2xeon_e3_1285l_v4core_i9-11950hxeon_bronze_3104core_i5-10300hxeon_e3_1230_v6xeon_gold_6238lxeon_e5-2637_v3core_i9-10920x_x-seriesxeon_e3_1285_v6core_i7_1065g7core_i5-7300uxeon_e3_1286_v3core_i5-8500txeon_e3_1220xeon_w-3265mcore_i5-7500xeon_d-1627xeon_e3_1290core_i5-6400xeon_d-1602core_i5-7200ucore_i9-11900kxeon_gold_6150core_i9-10850kxeon_e5-2690_v4xeon_e3_1265l_v4xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i5-8400txeon_w-1270pcore_i7-10700core_i7_9700kcore_i9-10920xcore_i5-8420core_i7-6660uxeon_e3-1260l_v5core_i5-11400txeon_w-1250ecore_i5-11300hcore_i9-11900kfcore_i3-7100hxeon_e3-1235_v2core_i7-10875hxeon_e-2276mlxeon_e3_1270_v2xeon_e3_1270_v3xeon_e3-1275l_v3core_i7_1060g7core_i5-6287uxeon_e5-4650_v3core_i5-9400core_i3-8100txeon_platinum_8260core_i3-7120txeon_e3-1245_v2core_i7-6820hqxeon_silver_4110core_i7-8650uxeon_bronze_3204core_i5-1145grexeon_gold_5119tcore_i7-6920hqxeon_gold_6246ratom_c3338rxeon_e3_12201core_i3-6100uxeon_gold_5217core_i5-1038ng7xeon_e3_1230_v2xeon_w-3245xeon_e3_1281_v3core_i5-8500bcore_i7-1185g7core_i7-1195g7core_i7_8700kxeon_e5-2618l_v3xeon_d-1523ncore_i5-8269uxeon_e3-1270_v3core_i3-6157ucore_i9_9900kfxeon_e3_1275xeon_e5-2608l_v3core_i5_8400core_i7-10700texeon_e-2288gxeon_d-1653nxeon_silver_4114tcore_i7-6700kxeon_gold_6240ycore_i3-8000xeon_e5-4669_v4core_i7-8560uxeon_gold_6208ucore_i9core_i3-8000txeon_w-1290exeon_e5-1650_v3core_i3-7350kxeon_e3_1226_v3core_i7-11700bxeon_e3-1105c_v2core_i5-8250ucore_i7-9700tcore_i7-7820eqatom_c3850xeon_gold_6252nxeon_e3_1235l_v5xeon_e3-1240_v3xeon_gold_6244xeon_e5-2695_v3core_i3-9350kfxeon_w-1370pcore_i5-6200uxeon_e3-1225_v2xeon_e5-1660_v3xeon_d-1520core_i5-1130g7core_i7-6785rxeon_e3_1220_v3xeon_platinum_8256xeon_e5-2623_v3xeon_platinum_8158xeon_e3_1275_v3xeon_e3_1505l_v6core_i9-9900xxeon_e5-2418l_v3xeon_e-2284gcore_i5-10500hxeon_e3-1275_v6core_i3-8020xeon_d-1531core_i3-9300tcore_i7-6510uxeon_e-2278gxeon_platinum_8260yxeon_e3-1505l_v5core_i9-9980xexeon_gold_6128xeon_d-2142itxeon_platinum_8180mcore_i3-7130uxeon_gold_6130fxeon_w-11955mxeon_e-2374gcore_i7-6800kcore_i5-10600xeon_platinum_8276core_i5-6500texeon_e3-1235l_v5core_i7\+8700core_i5_10210yxeon_e5-4628l_v4core_i3-9350kxeon_w-1350xeon_e3-1285l_v3xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_e3-1575mxeon_e3-1230xeon_d-1524ncore_i5-6685rcore_i5-1145g7ecore_i5-11500hexeon_e3-1275_v2core_i5-8200ycore_i9-10900x_x-seriesatom_c3808xeon_w-2275xeon_d-1543ncore_i5-7440hqcore_i5-6360uxeon_e-2144gxeon_d-1521core_i7-5960xxeon_w-1350pxeon_gold_6230rcore_i7-8569uatom_c3950core_i5-10500tcore_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rcore_i3-8100bcore_i5-9600tcore_i3-9320core_i5-11400core_i5-6440eqxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8170mcore_i9-10900texeon_platinum_8180core_i3-6100tecore_i3-8130uxeon_e5-2650l_v3xeon_e3-1585lxeon_platinum_8153xeon_e3-1230_v5xeon_w-3245mxeon_e5-4610_v4xeon_e-2378gcore_i3-6300xeon_e3_1270xeon_e3_1230l_v3core_i7-1160g7xeon_e5-1680_v3core_i7-9700kfxeon_gold_5115core_i7-7640xxeon_e3_1220l_v3xeon_gold_6136core_i5-8400hxeon_e5-4610_v3core_i5-7y54core_i7_8700txeon_e5-4650_v4xeon_gold_6138core_i9_9900xeon_e5-1660_v4core_i5-10200hxeon_e-2226gxeon_e3-1226_v3xeon_e3-1268lcore_i3-8145ucore_i7-11700xeon_e3core_i7-6700tecore_i3-7020uxeon_e3-1501l_v6xeon_gold_6262vcore_i3-8109uxeon_platinum_8168core_i9-11900txeon_e5-2640_v3xeon_e3_1240_v5core_i5-10110yxeon_e5-1620_v4core_i3-7300xeon_e-2378core_i7-11850hcore_i9-11900core_i9_9900kxeon_e5-2630l_v3xeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122core_i3-9100hlcore_i5-6600kxeon_d-2191core_i5-8400bxeon_gold_6248rxeon_e3_1240l_v3core_i5-8550core_i7-11850hexeon_w-1290txeon_e-2184gcore_i3-9100tecore_i7-9700fcore_i9-10980hkxeon_e3-1265l_v4xeon_gold_6262core_i5-7500uxeon_platinum_8156xeon_e3-1225xeon_e3_1275_v5xeon_e-2136core_i7-10510ucore_i7-9700kcore_i5_9600core_i5-6402pcore_i3-8100xeon_w-2265core_i9-11900hxeon_e3-1545mxeon_e5-2667_v4xeon_e3-1285l_v4xeon_w-10855mxeon_gold_6126fxeon_e5-1680_v4core_i7-7700core_i3-7102exeon_e5-2658_v3xeon_e5-4660_v4xeon_e3-1501m_v6xeon_gold_6250lcore_i5-8365uxeon_gold_6210uxeon_d-2187ntcore_i5-9600kfcore_i9-10910core_i5-7600core_i9-7940xcore_i9-9960xcore_i7-10700fcore_i5-1145g7core_i7-10750hxeon_e3_1280_v3xeon_platinum_8253xeon_e5-2630l_v4xeon_e5-4667_v4atom_c3958core_i5_9400txeon_e5-2685_v3core_i3-8300xeon_w-1390xeon_e-2186gcore_i5-7400txeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622xeon_e3-1105ccore_i5-7260ucore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pcore_i7-7800xcore_i7_1060ng7core_i5-10210ycore_i5-1140g7xeon_e5-2623_v4xeon_e3-1505lxeon_w-3275mcore_i5-9500fcore_i7-3820core_i5-10600tcore_i7-9850hexeon_e-2356gcore_i7-10700exeon_e3_1260lcore_i5-9600xeon_e3-1285_v3core_i7-4960xcore_i3-9100fcore_i5-11500bxeon_e3-1260lxeon_e3-1281_v3xeon_bronze_3106xeon_w-2102core_i5_8600tcore_i7-9750hfxeon_e3-1240l_v3atom_c3708core_i7-10700kcore_i9-10940x_x-seriesxeon_e3-1280_v6xeon_e3-1225_v3core_i7-11700kxeon_silver_4214rcore_i7-5820kxeon_e5-2697_v3core_i3-8120xeon_e5-4627_v4xeon_e-2124core_i5-7287ucore_i7-10710ucore_i7-10700kfxeon_d-1541xeon_d-2141ixeon_e3-1275_v3xeon_e3-1558lxeon_w-1250texeon_e3_1245_v5xeon_platinum_8176mxeon_e-2276mexeon_gold_5222xeon_e3-1125cxeon_e3-1245core_i3-6100hxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e3_1275_v6xeon_e5-2428l_v3core_i3-8140ucore_i7-6700hqxeon_e-2388gxeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fatom_c3338core_i9-9820xxeon_e3-1258l_v4xeon_w-2155core_i7-7500ucore_i7-8550ucore_i3-9100txeon_d-1623nxeon_w-2145core_i7-6650ucore_i7_8650ucore_i5-6210uxeon_e3-1240core_i3-7167ucore_i3-6100tcore_i7-7567uxeon_silver_4214core_i5-11260hxeon_d-2161iatom_c3858xeon_silver_4210rxeon_e3-1585l_v5core_i5-8210yxeon_e5-2670_v3xeon_gold_5218bcore_i3-7300tcore_i7-6850xeon_e3_1220_v2xeon_e3_1270_v6xeon_e3_1271_v3xeon_e5-2648l_v4xeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5core_i5-11500core_i5-1135g7xeon_e3-1225_v5xeon_w-1290tecore_i5-8500xeon_gold_5120txeon_w-3175xxeon_e3_1258l_v4core_i9_9900txeon_gold_6134xeon_gold_6162core_i5_8600xeon_e5-2628l_v3core_i3-6110ucore_i3-7007uxeon_w-3235core_i7-9750hcore_i7_1068ng7core_i5-6440hqxeon_e3-1235xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133xeon_d-1557core_i7_8560uxeon_gold_6140mxeon_w-2223xeon_e-2276mcore_i7-8665uxeon_e3_1225_v3core_i3-8300tcore_i7-6600ucore_i7-11700fcore_i7-6950xxeon_platinum_8165xeon_e3_1225_v5xeon_e-2236core_i7-10850hcore_i3-6006uxeon_e5-1603_v4core_i3-6120core_i5-8400xeon_gold_6246xeon_e3_1265l_v2core_i7-8086kxeon_e3_1278l_v4xeon_e5-2603_v3core_i5_8600kxeon_e-2134xeon_e5-4655_v3xeon_d-2163itxeon_e3-1515mcore_i9-11900kbxeon_w-1390txeon_w-1270atom_c3538core_i7_8559uxeon_platinum_8284core_i7-10510yxeon_e5-4655_v4xeon_gold_5215lxeon_e5-2658_v4core_i5-6442eqcore_i9-7960xcore_i5-9600kcore_i7-7820xcore_i5_10110yxeon_e3-1125c_v2core_i7-7700hqxeon_w-1270texeon_e3-1245_v3core_i5-1155g7xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5atom_c3508xeon_gold_6258rxeon_d-1571xeon_gold_6240lxeon_e5-1620_v3xeon_gold_6250core_i5-8350uxeon_d-2173itcore_i7-11700txeon_e3-1240_v2xeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_e5-2637_v4xeon_e3-1241_v3xeon_e5-2687w_v3xeon_e5-2680_v4core_i5_9600kxeon_e3_1268l_v3xeon_gold_5218txeon_e5-2697a_v4core_i9-10900exeon_e3_1501m_v6xeon_gold_6140xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_e3-1578lcore_i7-8670txeon_e3-1578l_v5xeon_e3-1270_v5xeon_e-2334xeon_gold_6126xeon_e3-1240lcore_i9-10885hcore_i5_10310yxeon_e3-1246_v3xeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4xeon_e3-1265lcore_i5_9400fcore_i3-9300xeon_e3_12201_v2xeon_e-2244gxeon_e3_1280xeon_e-2176gxeon_e-2324gxeon_gold_6142fcore_i3-6320tcore_i7-8709gcore_i3-7120xeon_e3_1265l_v3core_i5_8500txeon_gold_6130xeon_e5-2650l_v4atom_c3000core_i9-9920xxeon_e-2104gcore_i5-6500tcore_i5-6260ucore_i7-8557ucore_i5-9500txeon_e3_1285_v4core_i7-8700txeon_platinum_9242core_i5-7400xeon_platinum_8280lxeon_e3-1501mcore_i5-11400fcore_i7_9700tcore_i5-6600core_i3-7320core_i7-1180g7core_i7-6700tcore_i7_9700xeon_e3-1585xeon_e3-1230_v6core_i5-1035g1xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_e3-1276_v3xeon_gold_5120xeon_e-2124gcore_i7-1165g7core_i5-11600kxeon_e3-1231_v3core_i7-11390hcore_i5-1030g4xeon_e3_1276_v3core_i3-9100exeon_gold_5220xeon_e-2234core_i5-10500xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269ycore_i3-6320core_i5-9400fcore_i7-9850hxeon_gold_6154core_i3-7320tcore_i5-7440eqxeon_e3-1120lxeon_w-1250xeon_e3_1105c_v2xeon_e5-2640_v4core_i5-8279uatom_c3558rccore_i5-6400tcore_i5-9300hfcore_i3-7100ucore_i3-7101texeon_e3_1230_v3core_i5-11400hxeon_w-3275core_i5-7600kxeon_d-1553nxeon_e-2126gatom_c3955xeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633nxeon_e3-1275core_i7-9850hlcore_i5core_i5-7360ucore_i7_8565ucore_i5-6500core_i3-7340xeon_gold_6248core_i9-11980hkcore_i5-10600kxeon_e3-1220_v6xeon_platinum_8280core_i9-10900kfxeon_e-2186mcore_i7-9700exeon_e-2176mcore_i5_9500xeon_e3-1285_v4core_i7-6820hkxeon_e3_1280_v6xeon_gold_6152core_i7-1060ng7xeon_e5-2658a_v3core_i5-10310yxeon_w-1290pxeon_e-2286gxeon_e3_1240_v6xeon_gold_6222vcore_i3-6102exeon_platinum_8176xeon_gold_6242core_i5-8260ucore_i5-6600tcore_i7-10810uxeon_e3-1575m_v5xeon_e5-2650_v4xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_silver_4215xeon_w-2235core_i7-8850hcore_i5-11500hcore_i5-7210uxeon_e5-2695_v4xeon_gold_5118xeon_e3_1231_v3core_i7-6820eqxeon_gold_6134mcore_i9-10900xcore_i5-8650xeon_gold_6238txeon_e3_1286l_v3xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xecore_i7-3970xcore_i5-8365uexeon_w-1290xeon_platinum_8176fcore_i7-8750hfxeon_gold_6240rxeon_w-10885mcore_i9-10900tcore_i3-6100core_i5-8310ycore_i5-7640xxeon_e3_1230_v5core_i5-9500texeon_gold_6226xeon_gold_6256core_i5_8500core_i5-8650kxeon_gold_6252xeon_e5-4640_v3core_i5-6267ucore_i5-8600tcore_i5-8305gxeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_e-2146gcore_i5_9600kfxeon_d-2177ntxeon_e3-1270xeon_w-2175Intel(R) Processors
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2021-0153
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 37.89%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2650l_v4xeon_e5-1607_v4_firmwarexeon_e5-2689_v4xeon_e5-1650_v4_firmwarexeon_e5-2630l_v4xeon_e5-2699_v4_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2660_v4_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_e5-2603_v4_firmwarexeon_e5-2697a_v4xeon_e5-4628l_v4xeon_e5-2687w_v4xeon_e5-2637_v4core_i9-10980xe_firmwarexeon_e5-1650_v4xeon_e5-1620_v4xeon_e5-4669_v4xeon_e5-2689_v4_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2609_v4_firmwarexeon_e5-4610a_v4xeon_e5-2623_v4xeon_e5-2699r_v4_firmwarexeon_e5-2679_v4xeon_e5-4640_v4xeon_e5-2628l_v4xeon_e5-2650_v4xeon_e5-2650_v4_firmwarexeon_e5-4660_v4_firmwarexeon_e5-2630l_v4_firmwarexeon_e5-2687w_v4_firmwarecore_i9-10980xexeon_e5-2690_v4_firmwarexeon_e5-2608l_v4xeon_e5-4650_v4xeon_e5-2697_v4xeon_e5-2660_v4xeon_e5-4610_v4xeon_e5-2680_v4_firmwarexeon_e5-2658_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e5-2658_v4xeon_e5-2679_v4_firmwarexeon_e5-1630_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_e5-4650_v4_firmwarexeon_e5-2667_v4xeon_e5-1680_v4_firmwarexeon_e5-2695_v4_firmwarexeon_e5-4620_v4_firmwarecore_i9-10900x_firmwarexeon_e5-4655_v4_firmwarexeon_e5-2608l_v4_firmwarexeon_e5-4627_v4xeon_e5-2630_v4xeon_e5-1603_v4_firmwarexeon_e5-1630_v4xeon_e5-4610_v4_firmwarexeon_e5-2620_v4core_i9-10920x_firmwarexeon_e5-2609_v4core_i9-10940xxeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4xeon_e5-2698_v4_firmwarexeon_e5-2683_v4_firmwarexeon_e5-2618l_v4_firmwarecore_i9-10900xxeon_e5-1607_v4xeon_e5-2643_v4_firmwarexeon_e5-2695_v4xeon_e5-2623_v4_firmwarexeon_e5-2690_v4xeon_e5-2650l_v4_firmwarexeon_e5-2699r_v4core_i9-10940x_firmwarecore_i9-10920xxeon_e5-2699a_v4_firmwarexeon_e5-2640_v4_firmwarexeon_e5-2667_v4_firmwarexeon_e5-2699a_v4xeon_e5-2618l_v4xeon_e5-4667_v4_firmwarexeon_e5-1660_v4_firmwarexeon_e5-2648l_v4xeon_e5-4620_v4xeon_e5-4610a_v4_firmwarexeon_e5-2643_v4xeon_e5-2683_v4xeon_e5-2699_v4xeon_e5-2628l_v4_firmwarexeon_e5-2603_v4xeon_e5-4660_v4xeon_e5-2697_v4_firmwarexeon_e5-2698_v4xeon_e5-1620_v4_firmwarexeon_e5-1603_v4xeon_e5-2620_v4_firmwarexeon_e5-2640_v4xeon_e5-2680_v4xeon_e5-4655_v4xeon_e5-2697a_v4_firmwareIntel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-11162
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.95%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:11
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in hardware abstraction in SEMA driver for Intel(R) Computing Improvement Program before version 2.4.0.04733 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-computing_improvement_programIntel(R) Computing Improvement Program Advisory
CVE-2021-0144
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.18%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 13:23
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1558l_v5xeon_e3-1235lxeon_e3_1240l_v5xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7core_i5-1035g7core_i5-6585ratom_c3758rcore_i7_9700fxeon_d-1527xeon_e5-2697_v4xeon_platinum_8170xeon_e-2314xeon_w-2125core_i9-10940xcore_i7_8500yxeon_e3_1246_v3xeon_platinum_8164core_i7-9700core_i7-3960xxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_e3-1265l_v2xeon_gold_6238rcore_i7-8670core_i5-1035g4xeon_w-2255core_i5-10400hxeon_d-1518core_i7_10510ycore_i7-6822eqcore_i7-9700tecore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i9-7920xcore_i7-7600uxeon_e3_1501l_v6xeon_e5-2608l_v4xeon_e-2224xeon_e5-2683_v4xeon_gold_5218core_i3-7100ecore_i5-11600txeon_d-1567xeon_e3-1505l_v6xeon_e-2278gecore_i3-6098pxeon_w-2245xeon_e3_1245xeon_d-1587xeon_e3_1275_v2xeon_e5-2699_v3core_i5-10400core_i5-8700bxeon_e3-1285core_i5-10500tecore_i7-7820hkcore_i7-6900kxeon_e5-2689_v4core_i9-9940xcore_i5-11600xeon_gold_6240core_i7-6970hqcore_i3-6120tcore_i5-8600xeon_e3_1268l_v5core_i7-3930kcore_i5-1030ng7core_i7-1060g7core_i9-10900xeon_platinum_8274xeon_d-1539xeon_e3_1285_v3xeon_e3-1535m_v5xeon_gold_5220rcore_i9-10900kxeon_e-2386gxeon_d-2146ntxeon_e3-1268l_v5core_i5-8600kxeon_e3110xeon_platinum_8160fcore_i9-10900fxeon_e3-1220core_i7-8750hcore_i7-6850kxeon_platinum_8160mxeon_d-2166ntxeon_e3-1270_v6core_i7-3920xmxeon_e-2286mxeon_e3-1505m_v5xeon_silver_4216xeon_gold_6230xeon_w-2195atom_c3336xeon_e5-2628l_v4xeon_e-2276gcore_i5_8400txeon_d-2183itxeon_e3-1535mcore_i3-7100core_i7-8809gcore_i3-8145uexeon_e5-4667_v3xeon_platinum_8160hxeon_e3-1280_v2xeon_e3-1220_v2core_i5-7267uxeon_e3_1260l_v5xeon_silver_4208core_i3-8121uxeon_e3_1225_v6xeon_e3-1585_v5xeon_w-2104core_i5-10500ecore_i5-9400tcore_i7-6560ucore_i9_9900ksxeon_gold_5220sxeon_w-2123core_i5-8300hxeon_platinum_9282xeon_e5-2683_v3core_i5-10600kfxeon_silver_4108xeon_gold_6130txeon_e3-1280_v3xeon_silver_4210core_i5-11600kfcore_i7-9800xcore_i7-11700kfcore_i7-10870hxeon_e3-1565lxeon_e3_1220_v6core_i7_8086kxeon_e3_1235core_i3-6167uxeon_e-2274gcore_i5-11500tcore_i5-9500xeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1290core_i5_9400xeon_e5-2698_v4xeon_platinum_8160tcore_i7-7740xxeon_d-1528core_i7-6500ucore_i3-7110ucore_i7xeon_e-1105cxeon_e5-2660_v4xeon_e3_1275l_v3core_i7-3940xmcore_i5_9500tcore_i7-4940mxxeon_platinum_8268core_i5-6300ucore_i7-4930kcore_i7-8565uxeon_e5-2687w_v4xeon_e5-1603_v3xeon_e3_1245_v6core_i5-7300hqcore_i7-7560uxeon_e3-1271_v3xeon_gold_5117fxeon_e3_1505m_v5core_i9-11900fcore_i5-8259ucore_i7-4820kxeon_d-1529xeon_e3-1265l_v3xeon_e3_1505l_v5xeon_e3_1230core_i7-11600hxeon_e3_1285l_v3xeon_e-2336core_i3-9130ucore_i5-6350hqxeon_e3_1125cxeon_gold_6132core_i5-7600txeon_e5-2618l_v4xeon_gold_6137xeon_e-2224gxeon_w-2135xeon_e3-1505mxeon_e3_1270_v5core_i5-11320hxeon_e-2226gecore_i5_9600txeon_gold_6142core_i5-9300hxeon_e3_1220_v5core_i7-10610ucore_i5-9400hcore_i7-8500yxeon_e3_1280_v2atom_c3436lxeon_e3-1286_v3core_i3-7367uxeon_w-1390pxeon_e3-1230_v3xeon_d-1632core_i7-7820hqxeon_e5-2620_v3xeon_e3_1290_v2xeon_e5-2648l_v3core_i3-6100exeon_gold_6142mxeon_e3-1280core_i7_8700xeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1221_v3xeon_e3-1240_v5core_i7_9700kfxeon_e3-1230l_v3xeon_e3_1225_v2xeon_e5-2650_v3xeon_gold_6222core_i7-6567ucore_i3-7101ecore_i9-7900xxeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223core_i7-7510ucore_i7-8510ycore_i5-8265ucore_i5-6300hqxeon_e-2254mecore_i7-4930mxatom_c3558core_i7-5930kcore_i7-7y75xeon_e3_1245_v2core_i7-6700atom_c3308xeon_e3-1220_v3core_i5-7y57xeon_e5-4627_v3core_i3-8350kxeon_e3_1240_v3xeon_gold_6148core_i5-7500txeon_e3-1505m_v6xeon_gold_6144core_i3-9100xeon_e3-1120atom_c3758atom_c3558ratom_c3830xeon_e3120xeon_gold_5220txeon_e3_1125c_v2xeon_platinum_8276latom_c3750xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_platinum_9222core_i5-9500exeon_gold_6129xeon_gold_6230tcore_i7-7660ucore_i7-8706gxeon_e3-1220l_v2xeon_gold_6126txeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_w-1370core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i5-6310ucore_i7-8700core_i5-10400fxeon_e3-1501lcore_i3-6300tcore_i3-7100tcore_i7-7700txeon_e3_1240_v2core_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3core_i5-10210uxeon_e3_1240xeon_w-2295core_i7-6770hqcore_i5-8257ucore_i5-10610ucore_i7-8700kxeon_e3-1268l_v3core_i7_8550ucore_i5-7442eqxeon_gold_5215xeon_e5-2667_v3xeon_d-2143itxeon_e5-2699_v4xeon_e3-1285_v6core_i5-10505core_i5-1030g7xeon_e3-1278l_v4xeon_e3-1225_v6xeon_e3-1220l_v3xeon_e3_1280_v5xeon_silver_4109txeon_e3-1240l_v5xeon_e5-2690_v3xeon_silver_4215rxeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_e3_1245_v3core_i5-8420txeon_e3_1225xeon_silver_4210tcore_i5_9500fxeon_e3-1290_v2xeon_e3-1286l_v3xeon_e3_1241_v3xeon_e5-2680_v3xeon_gold_6212ucore_i9-7980xexeon_silver_4114core_i3-8100hcore_i7-6870hqxeon_e3-1230_v2xeon_e3_1285l_v4core_i9-11950hxeon_bronze_3104core_i5-10300hxeon_e3_1230_v6xeon_gold_6238lxeon_e5-2637_v3core_i9-10920x_x-seriesxeon_e3_1285_v6core_i7_1065g7core_i5-7300uxeon_e3_1286_v3core_i5-8500txeon_e3_1220xeon_w-3265mcore_i5-7500xeon_d-1627xeon_e3_1290core_i5-6400xeon_d-1602core_i5-7200ucore_i9-11900kxeon_gold_6150core_i9-10850kxeon_e5-2690_v4xeon_e3_1265l_v4xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i5-8400txeon_w-1270pcore_i7-10700core_i7_9700kcore_i9-10920xcore_i5-8420core_i7-6660uxeon_e3-1260l_v5core_i5-11400txeon_w-1250ecore_i5-11300hcore_i9-11900kfcore_i3-7100hxeon_e3-1235_v2core_i7-10875hxeon_e-2276mlxeon_e3_1270_v2xeon_e3_1270_v3xeon_e3-1275l_v3core_i7_1060g7core_i5-6287uxeon_e5-4650_v3core_i5-9400core_i3-8100txeon_platinum_8260core_i3-7120txeon_e3-1245_v2core_i7-6820hqxeon_silver_4110core_i7-8650uxeon_bronze_3204core_i5-1145grexeon_gold_5119tcore_i7-6920hqxeon_gold_6246ratom_c3338rxeon_e3_12201core_i3-6100uxeon_gold_5217core_i5-1038ng7xeon_e3_1230_v2xeon_w-3245xeon_e3_1281_v3core_i5-8500bcore_i7-1185g7core_i7-1195g7core_i7_8700kxeon_e5-2618l_v3xeon_d-1523ncore_i5-8269uxeon_e3-1270_v3core_i3-6157ucore_i9_9900kfxeon_e3_1275xeon_e5-2608l_v3core_i5_8400core_i7-10700texeon_e-2288gxeon_d-1653nxeon_silver_4114tcore_i7-6700kxeon_gold_6240ycore_i3-8000xeon_e5-4669_v4core_i7-8560uxeon_gold_6208ucore_i9core_i3-8000txeon_w-1290exeon_e5-1650_v3core_i3-7350kxeon_e3_1226_v3core_i7-11700bxeon_e3-1105c_v2core_i5-8250ucore_i7-9700tcore_i7-7820eqatom_c3850xeon_gold_6252nxeon_e3_1235l_v5xeon_e3-1240_v3xeon_gold_6244xeon_e5-2695_v3core_i3-9350kfxeon_w-1370pcore_i5-6200uxeon_e3-1225_v2xeon_e5-1660_v3xeon_d-1520core_i5-1130g7core_i7-6785rxeon_e3_1220_v3xeon_platinum_8256xeon_e5-2623_v3xeon_platinum_8158xeon_e3_1275_v3xeon_e3_1505l_v6core_i9-9900xxeon_e5-2418l_v3xeon_e-2284gcore_i5-10500hxeon_e3-1275_v6core_i3-8020xeon_d-1531core_i3-9300tcore_i7-6510uxeon_e-2278gxeon_platinum_8260yxeon_e3-1505l_v5core_i9-9980xexeon_gold_6128xeon_d-2142itxeon_platinum_8180mcore_i3-7130uxeon_gold_6130fxeon_w-11955mxeon_e-2374gcore_i7-6800kcore_i5-10600xeon_platinum_8276core_i5-6500texeon_e3-1235l_v5core_i7\+8700core_i5_10210yxeon_e5-4628l_v4core_i3-9350kxeon_w-1350xeon_e3-1285l_v3xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_e3-1575mxeon_e3-1230xeon_d-1524ncore_i5-6685rcore_i5-1145g7ecore_i5-11500hexeon_e3-1275_v2core_i5-8200ycore_i9-10900x_x-seriesatom_c3808xeon_w-2275xeon_d-1543ncore_i5-7440hqcore_i5-6360uxeon_e-2144gxeon_d-1521core_i7-5960xxeon_w-1350pxeon_gold_6230rcore_i7-8569uatom_c3950core_i5-10500tcore_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rcore_i3-8100bcore_i5-9600tcore_i3-9320core_i5-11400core_i5-6440eqxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8170mcore_i9-10900texeon_platinum_8180core_i3-6100tecore_i3-8130uxeon_e5-2650l_v3xeon_e3-1585lxeon_platinum_8153xeon_e3-1230_v5xeon_w-3245mxeon_e5-4610_v4xeon_e-2378gcore_i3-6300xeon_e3_1270xeon_e3_1230l_v3core_i7-1160g7xeon_e5-1680_v3core_i7-9700kfxeon_gold_5115core_i7-7640xxeon_e3_1220l_v3xeon_gold_6136core_i5-8400hxeon_e5-4610_v3core_i5-7y54core_i7_8700txeon_e5-4650_v4xeon_gold_6138core_i9_9900xeon_e5-1660_v4core_i5-10200hxeon_e-2226gxeon_e3-1226_v3xeon_e3-1268lcore_i3-8145ucore_i7-11700xeon_e3core_i7-6700tecore_i3-7020uxeon_e3-1501l_v6xeon_gold_6262vcore_i3-8109uxeon_platinum_8168core_i9-11900txeon_e5-2640_v3xeon_e3_1240_v5core_i5-10110yxeon_e5-1620_v4core_i3-7300xeon_e-2378core_i7-11850hcore_i9-11900core_i9_9900kxeon_e5-2630l_v3xeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122core_i3-9100hlcore_i5-6600kxeon_d-2191core_i5-8400bxeon_gold_6248rxeon_e3_1240l_v3core_i5-8550core_i7-11850hexeon_w-1290txeon_e-2184gcore_i3-9100tecore_i7-9700fcore_i9-10980hkxeon_e3-1265l_v4xeon_gold_6262core_i5-7500uxeon_platinum_8156xeon_e3-1225xeon_e3_1275_v5xeon_e-2136core_i7-10510ucore_i7-9700kcore_i5_9600core_i5-6402pcore_i3-8100xeon_w-2265core_i9-11900hxeon_e3-1545mxeon_e5-2667_v4xeon_e3-1285l_v4xeon_w-10855mxeon_gold_6126fxeon_e5-1680_v4core_i7-7700core_i3-7102exeon_e5-2658_v3xeon_e5-4660_v4xeon_e3-1501m_v6xeon_gold_6250lcore_i5-8365uxeon_gold_6210uxeon_d-2187ntcore_i5-9600kfcore_i9-10910core_i5-7600core_i9-7940xcore_i9-9960xcore_i7-10700fcore_i5-1145g7core_i7-10750hxeon_e3_1280_v3xeon_platinum_8253xeon_e5-2630l_v4xeon_e5-4667_v4atom_c3958core_i5_9400txeon_e5-2685_v3core_i3-8300xeon_w-1390xeon_e-2186gcore_i5-7400txeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622xeon_e3-1105ccore_i5-7260ucore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pcore_i7-7800xcore_i7_1060ng7core_i5-10210ycore_i5-1140g7xeon_e5-2623_v4xeon_e3-1505lxeon_w-3275mcore_i5-9500fcore_i7-3820core_i5-10600tcore_i7-9850hexeon_e-2356gcore_i7-10700exeon_e3_1260lcore_i5-9600xeon_e3-1285_v3core_i7-4960xcore_i3-9100fcore_i5-11500bxeon_e3-1260lxeon_e3-1281_v3xeon_bronze_3106xeon_w-2102core_i5_8600tcore_i7-9750hfxeon_e3-1240l_v3atom_c3708core_i7-10700kcore_i9-10940x_x-seriesxeon_e3-1280_v6xeon_e3-1225_v3core_i7-11700kxeon_silver_4214rcore_i7-5820kxeon_e5-2697_v3core_i3-8120xeon_e5-4627_v4xeon_e-2124core_i5-7287ucore_i7-10710ucore_i7-10700kfxeon_d-1541xeon_d-2141ixeon_e3-1275_v3xeon_e3-1558lxeon_w-1250texeon_e3_1245_v5xeon_platinum_8176mxeon_e-2276mexeon_gold_5222xeon_e3-1125cxeon_e3-1245core_i3-6100hxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e3_1275_v6xeon_e5-2428l_v3core_i3-8140ucore_i7-6700hqxeon_e-2388gxeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fatom_c3338core_i9-9820xxeon_e3-1258l_v4xeon_w-2155core_i7-7500ucore_i7-8550ucore_i3-9100txeon_d-1623nxeon_w-2145core_i7-6650ucore_i7_8650ucore_i5-6210uxeon_e3-1240core_i3-7167ucore_i3-6100tcore_i7-7567uxeon_silver_4214core_i5-11260hxeon_d-2161iatom_c3858xeon_silver_4210rxeon_e3-1585l_v5core_i5-8210yxeon_e5-2670_v3xeon_gold_5218bcore_i3-7300tcore_i7-6850xeon_e3_1220_v2xeon_e3_1270_v6xeon_e3_1271_v3xeon_e5-2648l_v4xeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5core_i5-11500core_i5-1135g7xeon_e3-1225_v5xeon_w-1290tecore_i5-8500xeon_gold_5120txeon_w-3175xxeon_e3_1258l_v4core_i9_9900txeon_gold_6134xeon_gold_6162core_i5_8600xeon_e5-2628l_v3core_i3-6110ucore_i3-7007uxeon_w-3235core_i7-9750hcore_i7_1068ng7core_i5-6440hqxeon_e3-1235xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133xeon_d-1557core_i7_8560uxeon_gold_6140mxeon_w-2223xeon_e-2276mcore_i7-8665uxeon_e3_1225_v3core_i3-8300tcore_i7-6600ucore_i7-11700fcore_i7-6950xxeon_platinum_8165xeon_e3_1225_v5xeon_e-2236core_i7-10850hcore_i3-6006uxeon_e5-1603_v4core_i3-6120core_i5-8400xeon_gold_6246xeon_e3_1265l_v2core_i7-8086kxeon_e3_1278l_v4xeon_e5-2603_v3core_i5_8600kxeon_e-2134xeon_e5-4655_v3xeon_d-2163itxeon_e3-1515mcore_i9-11900kbxeon_w-1390txeon_w-1270atom_c3538core_i7_8559uxeon_platinum_8284core_i7-10510yxeon_e5-4655_v4xeon_gold_5215lxeon_e5-2658_v4core_i5-6442eqcore_i9-7960xcore_i5-9600kcore_i7-7820xcore_i5_10110yxeon_e3-1125c_v2core_i7-7700hqxeon_w-1270texeon_e3-1245_v3core_i5-1155g7xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5atom_c3508xeon_gold_6258rxeon_d-1571xeon_gold_6240lxeon_e5-1620_v3xeon_gold_6250core_i5-8350uxeon_d-2173itcore_i7-11700txeon_e3-1240_v2xeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_e5-2637_v4xeon_e3-1241_v3xeon_e5-2687w_v3xeon_e5-2680_v4core_i5_9600kxeon_e3_1268l_v3xeon_gold_5218txeon_e5-2697a_v4core_i9-10900exeon_e3_1501m_v6xeon_gold_6140xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_e3-1578lcore_i7-8670txeon_e3-1578l_v5xeon_e3-1270_v5xeon_e-2334xeon_gold_6126xeon_e3-1240lcore_i9-10885hcore_i5_10310yxeon_e3-1246_v3xeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4xeon_e3-1265lcore_i5_9400fcore_i3-9300xeon_e3_12201_v2xeon_e-2244gxeon_e3_1280xeon_e-2176gxeon_e-2324gxeon_gold_6142fcore_i3-6320tcore_i7-8709gcore_i3-7120xeon_e3_1265l_v3core_i5_8500txeon_gold_6130xeon_e5-2650l_v4atom_c3000core_i9-9920xxeon_e-2104gcore_i5-6500tcore_i5-6260ucore_i7-8557ucore_i5-9500txeon_e3_1285_v4core_i7-8700txeon_platinum_9242core_i5-7400xeon_platinum_8280lxeon_e3-1501mcore_i5-11400fcore_i7_9700tcore_i5-6600core_i3-7320core_i7-1180g7core_i7-6700tcore_i7_9700xeon_e3-1585xeon_e3-1230_v6core_i5-1035g1xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_e3-1276_v3xeon_gold_5120xeon_e-2124gcore_i7-1165g7core_i5-11600kxeon_e3-1231_v3core_i7-11390hcore_i5-1030g4xeon_e3_1276_v3core_i3-9100exeon_gold_5220xeon_e-2234core_i5-10500xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269ycore_i3-6320core_i5-9400fcore_i7-9850hxeon_gold_6154core_i3-7320tcore_i5-7440eqxeon_e3-1120lxeon_w-1250xeon_e3_1105c_v2xeon_e5-2640_v4core_i5-8279uatom_c3558rccore_i5-6400tcore_i5-9300hfcore_i3-7100ucore_i3-7101texeon_e3_1230_v3core_i5-11400hxeon_w-3275core_i5-7600kxeon_d-1553nxeon_e-2126gatom_c3955xeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633nxeon_e3-1275core_i7-9850hlcore_i5core_i5-7360ucore_i7_8565ucore_i5-6500core_i3-7340xeon_gold_6248core_i9-11980hkcore_i5-10600kxeon_e3-1220_v6xeon_platinum_8280core_i9-10900kfxeon_e-2186mcore_i7-9700exeon_e-2176mcore_i5_9500xeon_e3-1285_v4core_i7-6820hkxeon_e3_1280_v6xeon_gold_6152core_i7-1060ng7xeon_e5-2658a_v3core_i5-10310yxeon_w-1290pxeon_e-2286gxeon_e3_1240_v6xeon_gold_6222vcore_i3-6102exeon_platinum_8176xeon_gold_6242core_i5-8260ucore_i5-6600tcore_i7-10810uxeon_e3-1575m_v5xeon_e5-2650_v4xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_silver_4215xeon_w-2235core_i7-8850hcore_i5-11500hcore_i5-7210uxeon_e5-2695_v4xeon_gold_5118xeon_e3_1231_v3core_i7-6820eqxeon_gold_6134mcore_i9-10900xcore_i5-8650xeon_gold_6238txeon_e3_1286l_v3xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xecore_i7-3970xcore_i5-8365uexeon_w-1290xeon_platinum_8176fcore_i7-8750hfxeon_gold_6240rxeon_w-10885mcore_i9-10900tcore_i3-6100core_i5-8310ycore_i5-7640xxeon_e3_1230_v5core_i5-9500texeon_gold_6226xeon_gold_6256core_i5_8500core_i5-8650kxeon_gold_6252xeon_e5-4640_v3core_i5-6267ucore_i5-8600tcore_i5-8305gxeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_e-2146gcore_i5_9600kfxeon_d-2177ntxeon_e3-1270xeon_w-2175Intel BSSA DFTrs
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2021-0188
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.16%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Return of pointer value outside of expected range in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e3-1235l_v5_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240l_v5xeon_e3-1575m_v5xeon_e3-1240_v6_firmwarexeon_e3-1220_v5xeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarexeon_e3-1268l_v5xeon_e3-1230_v6xeon_e3-1285_v6_firmwarexeon_e3-1501l_v6xeon_e3-1505m_v5xeon_e3-1220_v5_firmwarexeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_e3-1535m_v6xeon_e3-1535m_v6_firmwarexeon_e3-1585_v5_firmwarexeon_e3-1220_v6xeon_e3-1240_v6xeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e3-1501m_v6xeon_e3-1220_v6_firmwarexeon_e3-1545m_v5_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1585l_v5xeon_e3-1535m_v5_firmwarexeon_e3-1505l_v5_firmwarexeon_e3-1245_v5xeon_e3-1501m_v6_firmwarexeon_e3-1275_v5xeon_e3-1280_v5_firmwarexeon_e3-1505l_v6xeon_e3-1225_v6xeon_e3-1280_v6xeon_e3-1558l_v5_firmwarexeon_e3-1280_v5xeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_e3-1235l_v5xeon_e3-1225_v5_firmwarexeon_e3-1245_v6_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1565l_v5_firmwarexeon_e3-1275_v6xeon_e3-1225_v6_firmwarexeon_e3-1270_v6xeon_e3-1275_v6_firmwarexeon_e3-1545m_v5xeon_e3-1515m_v5_firmwarexeon_e3-1505m_v6xeon_e3-1230_v5_firmwarexeon_e3-1270_v5_firmwarexeon_e3-1535m_v5xeon_e3-1578l_v5xeon_e3-1245_v6xeon_e3-1505m_v6_firmwarexeon_e3-1505l_v5xeon_e3-1240l_v5_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1260l_v5xeon_e3-1280_v6_firmwarexeon_e3-1268l_v5_firmwarexeon_e3-1575m_v5_firmwarexeon_e3-1225_v5xeon_e3-1270_v5xeon_e3-1515m_v5xeon_e3-1558l_v5xeon_e3-1270_v6_firmwarexeon_e3-1245_v5_firmwareIntel(R) Processors
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0091
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.28% / 50.71%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-core_i7-6870hqxeon_e-2286gatom_c3950core_i3-9100ecore_i3-10100xeon_silver_4109tcore_i3-7300core_i5-1038ng7core_i5-11400core_i9-7900xcore_i7-10510yxeon_d-1548xeon_bronze_3106xeon_platinum_8260yxeon_d-1633nxeon_d-1653nxeon_platinum_8153xeon_e-2246gcore_i5-6350hqcore_i9-9960xcore_i3-6300txeon_e-2374gxeon_gold_5218txeon_w-2123core_i5-11260hxeon_e-2236xeon_gold_5218nxeon_w-1270exeon_d-1531core_i5-6500tcore_i5-7500core_i5-6260uxeon_e-2278gecore_i5-7440hqxeon_platinum_8156core_i7-8709gatom_c3758xeon_d-2177ntxeon_gold_6142fxeon_silver_4214ycore_i9-11900kfxeon_w-10855mxeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_w-3235core_i9-10900txeon_e-2126gcore_i5-8200ycore_i7-10700tecore_i9-10900kxeon_gold_5220rcore_i5-8260ucore_i5-11400fxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-1185g7core_i7-9700kfcore_i9-10900xxeon_platinum_9221xeon_d-2142itcore_m7-6y75xeon_w-3335core_i9-11900kcore_i5-10500hxeon_w-11555mrecore_i5-10600kfxeon_e-2146gcore_i3-1005g1core_i7-1068ng7xeon_silver_4112xeon_gold_6140xeon_d-1637core_i5-9400fcore_i3-10100ecore_i7-6800kcore_i7-7560uatom_c3538core_i7-9700txeon_gold_5120xeon_gold_6238core_i5-11600kfcore_i5-7600tcore_i7-4820kxeon_d-1602core_i5-8365uatom_c3508xeon_w-2245core_i5-9600kfxeon_d-2145ntxeon_platinum_8256xeon_gold_6130fxeon_e-2276mxeon_e-2224gcore_i5-8269uxeon_d-2163itcore_i3-1120g4core_i7-3930kcore_i5-11400hcore_i9-11900hxeon_d-1623ncore_i7-1185g7ecore_i7-10810ucore_i3-10300txeon_d-1521core_i3-8100core_i3-8145uecore_i5-1130g7core_i9-11900core_i5-6585rcore_i5-9600kxeon_gold_6144core_i5-8265ucore_i7-10700tcore_i9-9900kfcore_i3-7100core_m5-6y54core_i5-6300hqxeon_gold_5118core_i5-1145g7core_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kxeon_silver_4114tcore_i5-8500bxeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_gold_6212ucore_i5-6600core_i3-8100hcore_i7-8706gcore_i3-6300core_i9-11900fxeon_silver_4215xeon_gold_6230ncore_i9-10920xcore_i9-11950hatom_c3750xeon_gold_6138pcore_i7-1195g7core_i5-10310ucore_i9-10885hcore_i7-8557ucore_i5-7440eqcore_i3-6320xeon_e-2386gcore_i7-1165g7core_m3-7y32core_i7-11850hexeon_e-2134xeon_w-1290tecore_i5-1145g7ecore_i5-6440eqcore_i5-1030g7core_i9-10980hkxeon_e-2176mxeon_w-11155mlexeon_gold_6130xeon_silver_4210txeon_e-2274gxeon_gold_6136core_i5-6287ucore_i7-8500yxeon_w-3323core_i5-9600tatom_c3558rcore_i9-7960xxeon_w-1370atom_c3808core_i5-9600xeon_d-1559xeon_gold_6134xeon_w-3375xeon_e-2174gcore_i5-8600txeon_d-1537xeon_gold_5218bxeon_gold_6128core_i7-1180g7xeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_gold_6146xeon_w-1370pxeon_gold_6254core_i3-10320xeon_gold_5218rcore_i3-10105fxeon_w-2235core_i3-6098pcore_i5-6400xeon_d-1649nxeon_w-3175xcore_i7-10875hxeon_w-3225core_i3-7101tecore_i7-7700xeon_d-1540core_i3-11100hecore_i5-10400hxeon_gold_6246rcore_i5-7300hqxeon_d-1513nxeon_w-10885mxeon_gold_6126xeon_d-1527core_i9-9940xcore_i9-9900xcore_i5-6600kcore_i9-7940xcore_i7-9700exeon_e-2254mecore_i7-9700tecore_i7-6700txeon_gold_6248rxeon_silver_4214xeon_w-2125xeon_platinum_9222core_i3-10105tcore_i5-11300hcore_i5-6500texeon_gold_5220sxeon_platinum_8260core_i5-6500core_i3-1000g4core_i3-9100hlcore_i9-10900kfcore_i3-10100tatom_c3858xeon_d-2146ntxeon_e-2144gcore_i9-9980hkxeon_w-11555mlecore_i5-11500hexeon_e-2244gcore_i3-7100tcore_i3-6102exeon_w-1390txeon_silver_4216core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqxeon_platinum_8180xeon_platinum_8276lxeon_gold_6138tcore_i7-7740xcore_i7-11375hcore_i7-7y75core_i7-8559ucore_i5-9500eatom_c3850core_i5-11500txeon_e-2124gcore_i7-4930kcore_i5-9400core_i7-4960xcore_i7-5960xcore_i7-6600uxeon_gold_6138core_i7-1185grecore_i3-10325xeon_gold_6138fxeon_e-2356gcore_i7-8700xeon_d-1557core_i3-7130ucore_i5-8400atom_c3436lxeon_w-3245mxeon_e-2334core_i7\+8700core_i7-9850hatom_c3708xeon_w-1350core_i5-7600core_i9-10980xecore_i7-6500ucore_i5-1035g1xeon_w-11865mlecore_i7-11850hxeon_w-1290xeon_e-2186gxeon_silver_4210core_i3-10110uxeon_gold_6234atom_c3336core_i7-4930mxxeon_w-1350pcore_i9-10900xeon_w-1250core_i5-9400tcore_i5-7360ucore_i5-7300ucore_i7-11800hcore_i3-10300core_i5-6600tcore_i7-8565uxeon_gold_6154xeon_silver_4110core_i7-7700katom_c3830xeon_platinum_8176core_i7-10870hcore_i3-10100fcore_i7-10510uxeon_bronze_3104xeon_w-1290pcore_i5-8310yxeon_gold_5217core_i5-6440hqcore_i7-6850kxeon_gold_5120txeon_e-2324gxeon_w-3245core_i7-6660ucore_i9-7980xecore_i3-6100exeon_gold_6210ucore_i5-7200uxeon_gold_5115core_i7-9700fxeon_w-3345core_i5-10210ucore_i7-6820hqxeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500core_i5-8400bcore_i3-7100hcore_i7-8850hxeon_gold_5215core_i3-6100ucore_i9-9900kscore_i9-7920xxeon_w-11865mrecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i5-6360ucore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_e-2378core_i7-7820xcore_i3-1115g4ecore_i5-10600tcore_i5-7640xcore_i7-7800xxeon_w-3275mxeon_gold_6250lcore_i5-9400hxeon_gold_6209ucore_i9-9920xxeon_platinum_8253xeon_gold_6252ncore_i7-7660ucore_i3-9320xeon_platinum_8158core_i7-7700hqatom_c3308xeon_platinum_8280core_i5-6402pcore_m3-7y30xeon_w-11155mrexeon_gold_6252xeon_w-2135core_i3-10105core_i5-11400tcore_i7-11700kcore_i7-4940mxcore_i7-8550uxeon_e-2276mlxeon_gold_6246xeon_silver_4214rcore_i9-10940xcore_i7-9700core_i7-6700hqcore_i3-8300core_i7-9850hexeon_gold_6230rcore_i7-10700kfcore_i5-8400tcore_i5-7500txeon_d-2187ntxeon_silver_4116tcore_i7-1065g7xeon_d-1518core_i7-9800xxeon_silver_4208core_i5-6267ucore_i3-1000g1xeon_gold_6126txeon_w-2225xeon_silver_4116xeon_e-2276mecore_i5-7y54xeon_w-1250ecore_i5-7400core_i7-6950xfas\/aff_biosxeon_platinum_8160fxeon_platinum_8164core_i7-6567uxeon_platinum_8176fxeon_gold_5215lcore_i5-7287uxeon_platinum_8168core_i7-3970xcore_i7-3960xcore_i7-11600hcore_i7-7920hqcore_i7-10700core_i5-1145grecore_i3-7020uxeon_d-1533nxeon_gold_6240lxeon_w-3265mxeon_gold_6248core_i5-1135g7xeon_w-2195xeon_e-2136core_i5-9300hfxeon_w-1270pcore_i3-1115g4xeon_gold_6258rxeon_platinum_9282core_i3-8145ucore_i3-9300core_i5-10400xeon_d-2173itxeon_d-2161icore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_d-2123itxeon_platinum_8160tcore_i3-8109ucore_i5-8365uexeon_gold_6142core_i3-1110g4xeon_bronze_3206rxeon_gold_6148core_i7-3820xeon_w-3275xeon_gold_6240core_i3-7320core_i7-10700ecore_i5-8350ucore_i7-3940xmxeon_gold_5220xeon_gold_6126fcore_i3-10100tecore_m5-6y57xeon_e-2388gcore_i7-11390hxeon_platinum_8268xeon_e-2226gcore_i5-7y57core_i7-6700texeon_gold_6240rcore_i7-3920xmcore_i5-7260uxeon_e-2278gxeon_silver_4215rcore_i9-10900ecore_i3-9100core_i7-9750hxeon_e-2124core_i5-8250ucore_i5-8600core_i9-11980hkxeon_w-3265core_i5-10500tecore_i5-11500core_i3-6100tecore_i7-11700xeon_platinum_8160xeon_gold_5119tcore_i7-8700bcore_i5-10500txeon_gold_6148fcore_i5-10600core_i5-10310yxeon_w-1250texeon_gold_6208ucore_i3-9100teatom_c3338core_i5-8259uxeon_gold_6242core_i7-10700kxeon_e-2336xeon_d-1627xeon_e-2186mxeon_e-2286mcore_i9-9880hcore_i7-6650ucore_i7-11370hcore_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i5-1035g4core_i5-11600tcore_i7-8650ucore_i5-10200hcore_i9-9900kcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220tcore_i7-5930kcore_i5-10400fcore_i7-1160g7core_i7-7600uxeon_gold_6244xeon_gold_6242rcore_i3-7100exeon_w-2275xeon_w-2265core_i5-9500xeon_gold_6226rcore_i3-7101ecore_i9-9900xeon_bronze_3204core_i9-9820xxeon_d-1567xeon_w-3365core_i7-9850hlcore_i5-8400hcore_i5-6300ucore_m3-6y30core_i7-9750hfxeon_d-2141ixeon_w-2175xeon_silver_4108core_i3-10110ycore_i5-1035g7core_i7-7820hkxeon_e-2254mlxeon_w-11855mcore_i5-8305gcore_i3-6100xeon_gold_6240ycore_i3-9350kxeon_gold_6238lxeon_w-1390cloud_backupcore_i3-1115grecore_i5-11600core_i5-7400tcore_i7-11700fcore_i3-6100tcore_i7-8750hcore_i7-8665ucore_i3-10305txeon_d-2183itcore_i5-8300hcore_i3-8140ucore_i3-8350kcore_i5-10600kcore_i7-8086kxeon_gold_5222core_i7-10850hxeon_d-1523nxeon_gold_6256core_i5-9500teatom_c3958xeon_gold_6130tatom_c3338rxeon_d-1520core_i3-8100bcore_i3-6167ucore_i5-8279uxeon_platinum_8280lcore_m3-8100ycore_i5-7267ucore_i5-8600kcore_i3-7100uxeon_d-1543ncore_i5-6442eqcore_i7-8700txeon_silver_4114xeon_d-1541core_i7-11700txeon_d-1622xeon_platinum_9242core_i7-6700kcore_i7-6970hqxeon_w-2223core_i7-6822eqcore_i3-7300txeon_gold_6238tatom_c3955core_i5-8500core_i9-11900tcore_i5-8210ycore_i7-6785rcore_i7-6560ucore_i7-1060g7core_i5-8257ucore_i7-8569ucore_i7-5820kcore_i9-9900tcore_i7-6900kcore_i7-7700tcore_i9-9980xeatom_c3558core_i5-6685rxeon_w-2133xeon_gold_6250core_i3-9350kfxeon_platinum_8260lxeon_platinum_8270xeon_w-1290tcore_i5-8500tcore_i7-8809gxeon_gold_6226core_i5-11320hxeon_d-1577xeon_gold_6132xeon_e-2314core_i5-6400tcore_i3-10305xeon_d-2166ntcore_i3-7350kxeon_w-1390pcore_i5-10505xeon_d-1539core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i5-7600kcore_i7-6820hkxeon_w-2255xeon_gold_6262vcore_i3-6006ucore_i7-10710ucore_i5-10210ycore_i5-10300hxeon_w-1270texeon_e-2224xeon_gold_5218xeon_w-2145xeon_gold_6238rcore_i3-9100fxeon_platinum_8170core_i9-10900fcore_i3-1125g4xeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_e-2378gcore_i3-8100tcore_i5-9500txeon_w-3223xeon_w-2155xeon_gold_6152core_i3-7102exeon_gold_6150xeon_e-2276gcore_i5-6200uxeon_gold_6222vcore_i7-10700fxeon_d-1571xeon_gold_5122atom_c3758rxeon_gold_6230Intel(R) Processors
CVE-2019-0088
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.87%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 20:00
Updated-17 Sep, 2024 | 02:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient path checking in Intel(R) System Support Utility for Windows before 2.5.0.15 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-system_support_utilityIntel(R) System Support Utility for Windows
CVE-2023-42099
Matching Score-8
Assigner-Zero Day Initiative
ShareView Details
Matching Score-8
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.63%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:13
Updated-12 Aug, 2025 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantDriver & Support Assistantdriver\&support_assistant
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-0105
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.92%
||
7 Day CHG~0.00%
Published-18 Feb, 2019 | 17:00
Updated-16 Sep, 2024 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managern/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0159
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.75%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_5215xeon_platinum_8260yxeon_platinum_8352vxeon_platinum_8352y_firmwarexeon_platinum_8260y_firmwarexeon_gold_5218txeon_platinum_8358xeon_platinum_8353hxeon_platinum_8360yxeon_platinum_8280_firmwarexeon_gold_5218nxeon_gold_5317_firmwarexeon_silver_4209t_firmwarexeon_gold_6336yxeon_gold_6250lxeon_gold_6209uxeon_silver_4314_firmwarexeon_platinum_8253xeon_gold_6252nxeon_silver_4214yxeon_platinum_8270_firmwarexeon_gold_6230txeon_platinum_8376h_firmwarexeon_silver_4210rxeon_platinum_8280xeon_gold_6238l_firmwarexeon_gold_5220t_firmwarexeon_gold_6252xeon_gold_5220rxeon_silver_4309y_firmwarexeon_gold_6246xeon_gold_6226r_firmwarexeon_silver_4214rxeon_silver_4210r_firmwarexeon_gold_6328hl_firmwarexeon_gold_6256_firmwarexeon_platinum_9221xeon_gold_6230rxeon_gold_6346_firmwarexeon_platinum_8360hlxeon_platinum_9222_firmwarexeon_gold_5315y_firmwarexeon_silver_4310txeon_silver_4208xeon_gold_5318hxeon_gold_6210u_firmwarexeon_platinum_8380_firmwarexeon_gold_5320_firmwarexeon_silver_4314xeon_silver_4210t_firmwarexeon_gold_5218t_firmwarexeon_gold_5215lxeon_silver_4316_firmwarexeon_platinum_8352sxeon_gold_5217_firmwarexeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_gold_6238xeon_platinum_8368_firmwarexeon_platinum_8376hxeon_gold_6240lxeon_gold_6248xeon_gold_6258rxeon_gold_6312u_firmwarexeon_gold_6240l_firmwarexeon_platinum_8256xeon_platinum_9282xeon_silver_4215_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarexeon_gold_6334_firmwarexeon_gold_6338nxeon_gold_6328hlxeon_gold_6252_firmwarexeon_gold_6230n_firmwarexeon_gold_6330xeon_bronze_3206rxeon_gold_6346xeon_silver_4208_firmwarexeon_gold_6240xeon_gold_5220xeon_platinum_8256_firmwarexeon_gold_5218r_firmwarexeon_gold_6348h_firmwarexeon_platinum_8268xeon_silver_4214y_firmwarexeon_gold_6240rxeon_gold_6238_firmwarexeon_gold_6330hxeon_silver_4209txeon_gold_6338xeon_gold_5315yxeon_platinum_8368q_firmwarexeon_silver_4215rxeon_gold_6212uxeon_platinum_8380xeon_silver_4215xeon_platinum_8368xeon_gold_6230nxeon_platinum_8280l_firmwarexeon_gold_6338txeon_platinum_8352mxeon_gold_6208uxeon_gold_6242_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_gold_6242xeon_platinum_8360y_firmwarexeon_gold_6246_firmwarexeon_platinum_8260_firmwarexeon_platinum_8376hl_firmwarexeon_platinum_8360hxeon_gold_6230t_firmwarexeon_gold_6250_firmwarexeon_gold_5218_firmwarexeon_silver_4210txeon_gold_5320txeon_gold_6244_firmwarexeon_gold_6342xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarexeon_platinum_8276xeon_silver_4316xeon_gold_6240_firmwarexeon_gold_5220txeon_gold_6336y_firmwarexeon_gold_6244xeon_gold_6242rxeon_gold_6330nxeon_platinum_9242_firmwarexeon_gold_6226rxeon_gold_6258r_firmwarexeon_bronze_3204xeon_gold_6230_firmwarexeon_gold_5218b_firmwarexeon_gold_5218bxeon_gold_6348hxeon_platinum_8354hxeon_gold_6248_firmwarexeon_gold_6328hxeon_platinum_8360hl_firmwarexeon_silver_4214r_firmwarexeon_gold_5318s_firmwarexeon_gold_6254xeon_gold_5218rxeon_gold_6334xeon_gold_6342_firmwarexeon_gold_6326xeon_gold_5320xeon_gold_6240yxeon_gold_6238lxeon_gold_5320h_firmwarexeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_platinum_8362_firmwarexeon_gold_5318h_firmwarexeon_gold_6348xeon_gold_6246r_firmwarexeon_gold_6354xeon_gold_6246rxeon_gold_6234_firmwarexeon_gold_5320hxeon_gold_6312uxeon_gold_5220r_firmwarexeon_gold_5222xeon_platinum_8380hlxeon_gold_6256xeon_platinum_8260l_firmwarexeon_gold_6338n_firmwarexeon_gold_6248rxeon_silver_4214xeon_gold_5318nxeon_platinum_9222xeon_platinum_8358_firmwarexeon_gold_5220sxeon_platinum_8260xeon_platinum_8280lxeon_silver_4309yxeon_platinum_8356hxeon_gold_6338t_firmwarexeon_gold_6314uxeon_gold_5320t_firmwarexeon_gold_5318y_firmwarexeon_gold_5222_firmwarexeon_platinum_9242xeon_silver_4216xeon_platinum_8358p_firmwarexeon_platinum_8362xeon_platinum_8276lxeon_platinum_8352v_firmwarexeon_platinum_8351n_firmwarexeon_gold_5318n_firmwarexeon_gold_6238txeon_gold_6314u_firmwarexeon_platinum_9221_firmwarexeon_silver_4310t_firmwarexeon_platinum_8368qxeon_gold_6240r_firmwarexeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarexeon_silver_4310xeon_gold_6209u_firmwarexeon_platinum_8352m_firmwarexeon_platinum_8356h_firmwarexeon_platinum_9282_firmwarexeon_platinum_8276l_firmwarexeon_gold_6250xeon_platinum_8260lxeon_platinum_8270xeon_gold_6248r_firmwarexeon_platinum_8380hxeon_gold_6262v_firmwarexeon_gold_6226xeon_gold_5318sxeon_silver_4214_firmwarexeon_platinum_8268_firmwarexeon_gold_6348_firmwarexeon_gold_6226_firmwarexeon_silver_4210xeon_gold_6250l_firmwarexeon_gold_6234xeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_gold_6252n_firmwarexeon_gold_6262vxeon_gold_6240y_firmwarexeon_platinum_8354h_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_platinum_8358pxeon_gold_6330_firmwarexeon_silver_4210_firmwarexeon_platinum_8380hl_firmwarexeon_gold_5218xeon_gold_6338_firmwarexeon_gold_6238rxeon_bronze_3204_firmwarexeon_gold_6222v_firmwarexeon_gold_6238r_firmwarexeon_bronze_3206r_firmwarexeon_platinum_8352yxeon_silver_4215r_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_gold_5217xeon_platinum_8376hlxeon_gold_6210uxeon_gold_6222vxeon_silver_4216_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8351nxeon_gold_6354_firmwarexeon_gold_6230Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0189
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.22%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of out-of-range pointer offset in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e7-4820_v4xeon_e-2286gxeon_gold_5215xeon_e3-1240_v6_firmwarexeon_e3-1220_v5xeon_e-2174g_firmwarexeon_platinum_8260yxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarexeon_e-2246gxeon_e3-1230_v6xeon_platinum_8260y_firmwarexeon_e-2374gxeon_gold_5218txeon_e3-1501l_v6xeon_e-2254ml_firmwarexeon_e7-4809_v4_firmwarexeon_e7-8867_v4xeon_e-2378xeon_e-2236xeon_e3-1220_v5_firmwarexeon_platinum_8280_firmwarexeon_e-2374g_firmwarexeon_gold_5218nxeon_silver_4209t_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarexeon_gold_6250lxeon_gold_6209uxeon_e7-8891_v4xeon_e-2278g_firmwarexeon_e3-1240_v6xeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e-2278gexeon_platinum_8253xeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_gold_6252nxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_e7-8894_v4xeon_platinum_8270_firmwarexeon_gold_6230txeon_silver_4210rxeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e-2236_firmwarexeon_e-2244g_firmwarexeon_platinum_8280xeon_gold_6238l_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarexeon_gold_5220t_firmwarexeon_gold_6252xeon_gold_5220rxeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_gold_6246xeon_gold_6226r_firmwarexeon_e-2276mlxeon_e3-1235l_v5xeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarexeon_silver_4210r_firmwarexeon_e3-1270_v6xeon_e3-1545m_v5xeon_gold_6256_firmwarexeon_platinum_9221xeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_e-2276me_firmwarexeon_platinum_9222_firmwarexeon_e7-8891_v4_firmwarexeon_silver_4208xeon_e-2136_firmwarexeon_gold_6210u_firmwarexeon_e-2276mexeon_silver_4210t_firmwarexeon_e-2146gxeon_gold_5218t_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarexeon_e7-8880_v4_firmwarexeon_gold_5215lxeon_e-2146g_firmwarexeon_e-2286g_firmwarexeon_e3-1515m_v5xeon_platinum_8253_firmwarexeon_gold_6238xeon_e-2126g_firmwarexeon_gold_6240lxeon_e3-1260l_v5_firmwarexeon_gold_6248xeon_e3-1240l_v5xeon_e-2136xeon_e-2378_firmwarexeon_gold_6258rxeon_platinum_8256xeon_gold_6240l_firmwarexeon_e-2288g_firmwarexeon_platinum_9282xeon_e-2276mxeon_e-2224gxeon_silver_4215_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarexeon_e3-1505m_v5xeon_gold_6252_firmwarexeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarexeon_bronze_3206rxeon_silver_4208_firmwarexeon_e7-4820_v4_firmwarexeon_gold_6240xeon_e-2144g_firmwarexeon_e3-1585l_v5xeon_gold_5220xeon_e-2378g_firmwarexeon_platinum_8256_firmwarexeon_e3-1275_v5xeon_e-2246g_firmwarexeon_gold_5218r_firmwarexeon_e3-1558l_v5_firmwarexeon_e-2388gxeon_platinum_8268xeon_e-2226gxeon_silver_4214y_firmwarexeon_gold_6240rxeon_gold_6238_firmwarexeon_e-2226ge_firmwarexeon_silver_4209txeon_e-2226gexeon_e3-1225_v6_firmwarexeon_e-2278gxeon_silver_4215rxeon_gold_6212uxeon_e7-8890_v4_firmwarexeon_e-2124xeon_e-2186g_firmwarexeon_silver_4215xeon_gold_6230nxeon_e3-1270_v5_firmwarexeon_platinum_8280l_firmwarexeon_e3-1240l_v5_firmwarexeon_e7-8860_v4_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1260l_v5xeon_e-2386gxeon_gold_6208uxeon_gold_6242_firmwarexeon_e-2134xeon_e-2388g_firmwarexeon_gold_6230r_firmwarexeon_gold_6242xeon_e-2336xeon_e3-1575m_v5_firmwarexeon_e3-1225_v5xeon_e-2186mxeon_gold_6246_firmwarexeon_e3-1558l_v5xeon_platinum_8260_firmwarexeon_e-2176mxeon_gold_6230t_firmwarexeon_e-2286mxeon_gold_6250_firmwarexeon_gold_5218_firmwarexeon_silver_4210txeon_gold_6244_firmwarexeon_e-2274gxeon_e7-8893_v4xeon_e7-4830_v4xeon_e-2134_firmwarexeon_platinum_8276_firmwarexeon_e3-1268l_v5xeon_e-2226g_firmwarexeon_platinum_8276xeon_gold_6240_firmwarexeon_gold_5220txeon_e-2324g_firmwarexeon_gold_6244xeon_gold_6242rxeon_e-2278ge_firmwarexeon_platinum_9242_firmwarexeon_e-2174gxeon_gold_6226rxeon_e3-1535m_v6xeon_e3-1585_v5_firmwarexeon_e3-1220_v6xeon_gold_6258r_firmwarexeon_bronze_3204xeon_e-2276m_firmwarexeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_e7-4850_v4_firmwarexeon_gold_5218bxeon_gold_6230_firmwarexeon_e-2286m_firmwarexeon_gold_5218b_firmwarexeon_gold_6248_firmwarexeon_e3-1245_v5xeon_e3-1501m_v6_firmwarexeon_e-2176gxeon_e-2288gxeon_e-2274g_firmwarexeon_silver_4214r_firmwarexeon_e3-1225_v6xeon_gold_6254xeon_e3-1280_v6xeon_e7-8880_v4xeon_gold_5218rxeon_e-2176g_firmwarexeon_e-2254mlxeon_e-2124g_firmwarexeon_gold_6240yxeon_e-2224_firmwarexeon_gold_6238lxeon_gold_5218n_firmwarexeon_e7-8890_v4xeon_gold_6246r_firmwarexeon_gold_6246rxeon_e3-1275_v6_firmwarexeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e3-1535m_v5xeon_gold_5220r_firmwarexeon_e3-1505m_v6_firmwarexeon_gold_5222xeon_e7-8870_v4_firmwarexeon_e-2254mexeon_gold_6256xeon_e3-1505l_v5xeon_platinum_8260l_firmwarexeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_platinum_9222xeon_e3-1280_v6_firmwarexeon_gold_5220sxeon_platinum_8260xeon_platinum_8280lxeon_e-2144gxeon_e3-1270_v6_firmwarexeon_e-2244gxeon_e7-8867_v4_firmwarexeon_e3-1245_v5_firmwarexeon_gold_5222_firmwarexeon_silver_4216xeon_platinum_9242xeon_e3-1235l_v5_firmwarexeon_platinum_8276lxeon_e3-1575m_v5xeon_e-2124gxeon_gold_6238txeon_platinum_9221_firmwarexeon_gold_6240r_firmwarexeon_gold_6212u_firmwarexeon_e3-1285_v6_firmwarexeon_gold_6208u_firmwarexeon_gold_6209u_firmwarexeon_e-2356gxeon_platinum_9282_firmwarexeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_platinum_8276l_firmwarexeon_e-2336_firmwarexeon_gold_6250xeon_platinum_8260lxeon_e3-1585_v5xeon_platinum_8270xeon_gold_6248r_firmwarexeon_gold_6262v_firmwarexeon_gold_6226xeon_e-2334xeon_e3-1501m_v6xeon_silver_4214_firmwarexeon_platinum_8268_firmwarexeon_e3-1535m_v5_firmwarexeon_e3-1505l_v5_firmwarexeon_e-2314xeon_e3-1280_v5_firmwarexeon_e-2186gxeon_e-2314_firmwarexeon_gold_6226_firmwarexeon_silver_4210xeon_gold_6250l_firmwarexeon_gold_6234xeon_e3-1280_v5xeon_gold_6252n_firmwarexeon_gold_6262vxeon_gold_6240y_firmwarexeon_e7-4809_v4xeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1565l_v5_firmwarexeon_e3-1275_v6xeon_silver_4210_firmwarexeon_e-2276g_firmwarexeon_e-2224xeon_gold_5218xeon_e-2124_firmwarexeon_gold_6238rxeon_bronze_3204_firmwarexeon_e3-1230_v5_firmwarexeon_e-2278gelxeon_e3-1578l_v5xeon_e3-1245_v6xeon_gold_6222v_firmwarexeon_e-2378gxeon_e-2234_firmwarexeon_bronze_3206r_firmwarexeon_gold_6238r_firmwarexeon_silver_4215r_firmwarexeon_gold_6242r_firmwarexeon_gold_5217xeon_e-2324gxeon_e3-1268l_v5_firmwarexeon_e7-8894_v4_firmwarexeon_e-2276gxeon_gold_6210uxeon_gold_6222vxeon_silver_4216_firmwarexeon_e3-1270_v5xeon_e-2186m_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_e-2234xeon_gold_5217_firmwarexeon_gold_6230Intel(R) Processors
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-3672
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.04% / 11.47%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 15:00
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a system calls.

Action-Not Available
Vendor-Intel Corporation
Product-intel_smart_sound_technologySmart Sound Technology
CVE-2018-3666
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.04% / 11.47%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 15:00
Updated-17 Sep, 2024 | 00:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a non-paged pool overflow.

Action-Not Available
Vendor-Intel Corporation
Product-intel_smart_sound_technologySmart Sound Technology
CVE-2018-3645
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.50%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 21:00
Updated-16 Sep, 2024 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Escalation of privilege in all versions of the Intel Remote Keyboard allows a local attacker to inject keystrokes into another remote keyboard session.

Action-Not Available
Vendor-Intel Corporation
Product-remote_keyboard_mobile_appremote_keyboardIntel Remote Keyboard
CVE-2016-8102
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.91%
||
7 Day CHG~0.00%
Published-08 Dec, 2016 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unquoted service path vulnerability in Intel Wireless Bluetooth Drivers 16.x, 17.x, and before 18.1.1607.3129 allows local users to launch processes with elevated privileges.

Action-Not Available
Vendor-Intel Corporation
Product-wireless_bluetooth_driversIntel Wireless Bluetooth Drivers
CVE-2019-11181
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.40%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:38
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-125
Out-of-bounds Read
CVE-2011-5174
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.67%
||
7 Day CHG~0.00%
Published-15 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.

Action-Not Available
Vendor-n/aIntel Corporation
Product-7500_chipsetc206_chipsetmobile_intel_gm45_chipset3450_chipsetmobile_intel_qm57_chipsetx58_chipsetmobile_intel_qs67_chipsetmobile_intel_qm67_chipset5520_chipsetq35_express_chipsetmobile_intel_pm45_express_chipset5500_chipsetsinit_authenticated_code_modulec204_chipsetmobile_intel_qs57_express_chipsetc202_chipsetq67_express_chipsetq57_chipsetmobile_intel_qs57_chipsetmobile_intel_gs45_chipsetn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-11163
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.62%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:12
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in a hardware abstraction driver for Intel(R) Processor Identification Utility for Windows before version 6.1.0731 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-processor_identification_utilityIntel(R) Processor Identification Utility for Windows* Advisory
CVE-2019-11133
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 25.00%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 20:23
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Processor Diagnostic Tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-processor_diagnostic_toolIntel(R) Processor Diagnostic Tool Advisory
CVE-2019-11112
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.49%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:41
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-graphics_drivercloud_backupdata_availability_servicessteelstore_cloud_integrated_storage2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-11148
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.29%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:12
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for Intel(R) Remote Displays SDK before version 2.0.1 R2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-remote_displays_sdkIntel(R) Remote Displays SDK Advisory
CVE-2019-11146
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.87%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:13
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper file verification in Intel® Driver & Support Assistant before 19.7.30.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-driver_\&_support_assistantIntel(R) Driver & Support Assistant Advisory
CWE ID-CWE-275
Not Available
CVE-2019-0142
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.12% / 30.96%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:21
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in ilp60x64.sys driver for Intel(R) Ethernet 700 Series Controllers before version 1.33.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1ethernet_controller_xxv710-am1_firmwareethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CVE-2019-0171
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.84%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for Intel(R) Quartus(R) software may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quartus_iiquartus_primeIntel(R) Quartus(R)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-0152
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.63%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:06
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8276lxeon_platinum_8153xeon_platinum_8170_firmwarexeon_bronze_3104_firmwarexeon_gold_6146xeon_gold_6126txeon_gold_6126f_firmwarexeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_w-2125xeon_w-2155_firmwarexeon_gold_5217_firmwarexeon_gold_6138xeon_gold_6246xeon_d-2163it_firmwarexeon_platinum_8164xeon_gold_6240_firmwarexeon_gold_5215mxeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_d-2143itxeon_d-2163itxeon_platinum_8168xeon_gold_6244_firmwarexeon_d-2161i_firmwarexeon_gold_5218xeon_gold_6238m_firmwarexeon_platinum_8284xeon_silver_4109txeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_5122_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6212u_firmwarexeon_gold_6212uxeon_gold_6126_firmwarexeon_platinum_8280mxeon_gold_6240l_firmwarexeon_silver_4114xeon_d-2123it_firmwarexeon_platinum_8276_firmwarexeon_bronze_3104xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6150_firmwarexeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5220s_firmwarexeon_gold_5215_firmwarexeon_platinum_8260y_firmwarexeon_gold_6144_firmwarexeon_platinum_8274xeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_5218txeon_gold_6240y_firmwarexeon_gold_6150xeon_gold_6242_firmwarexeon_gold_6140xeon_silver_4114_firmwarexeon_gold_6230_firmwarexeon_d-2146ntxeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_gold_6210uxeon_d-2187ntxeon_gold_6126xeon_platinum_8158_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_gold_6140m_firmwarexeon_silver_4216xeon_platinum_8253xeon_gold_6230xeon_w-2195xeon_gold_6134_firmwarexeon_gold_6130t_firmwarexeon_gold_6130f_firmwarexeon_d-2183itxeon_gold_6142fxeon_w-2145_firmwarexeon_d-2145ntxeon_platinum_8153_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_gold_6130xeon_platinum_8260mxeon_silver_4214y_firmwarexeon_silver_4208xeon_platinum_8260xeon_platinum_8160t_firmwarexeon_bronze_3204_firmwarexeon_silver_4214_firmwarexeon_d-2142it_firmwarexeon_w-2123xeon_gold_5220sxeon_platinum_8280m_firmwarexeon_d-2143it_firmwarexeon_platinum_9242xeon_platinum_9282xeon_platinum_8280lxeon_silver_4110xeon_platinum_9242_firmwarexeon_bronze_3204xeon_platinum_8280_firmwarexeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_5217xeon_platinum_8276mxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_gold_6138txeon_bronze_3106xeon_gold_6238mxeon_gold_5120xeon_gold_5220xeon_gold_6154_firmwarexeon_platinum_8160txeon_gold_6254xeon_silver_4209t_firmwarexeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_d-2141ixeon_gold_5215l_firmwarexeon_silver_4208_firmwarexeon_w-2195_firmwarexeon_platinum_8268xeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_silver_4209txeon_w-2133_firmwarexeon_silver_4116xeon_gold_6240mxeon_gold_6210u_firmwarexeon_gold_6252nxeon_gold_6244xeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_platinum_8274_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_w-2135_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_5218_firmwarexeon_gold_6132xeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_d-2146nt_firmwarexeon_platinum_8158xeon_gold_6238l_firmwarexeon_w-2155xeon_gold_5218b_firmwarexeon_w-2135xeon_gold_6222vxeon_w-2125_firmwarexeon_platinum_8176xeon_platinum_8160_firmwarexeon_gold_6242xeon_w-2175_firmwarexeon_silver_4112_firmwarexeon_w-2145xeon_gold_6262v_firmwarexeon_platinum_8260yxeon_platinum_8270xeon_platinum_8260m_firmwarexeon_gold_6148_firmwarexeon_gold_6128xeon_w-3175x_firmwarexeon_silver_4215xeon_gold_5220t_firmwarexeon_d-2142itxeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_gold_5220_firmwarexeon_gold_6240m_firmwarexeon_gold_5215m_firmwarexeon_silver_4214xeon_platinum_8276xeon_gold_6142f_firmwarexeon_gold_6238txeon_d-2161ixeon_platinum_8164_firmwarexeon_silver_4214yxeon_d-2141i_firmwarexeon_gold_5218bxeon_silver_4216_firmwarexeon_gold_6254_firmwarexeon_platinum_8276m_firmwarexeon_platinum_8176fxeon_platinum_8284_firmwarexeon_d-2187nt_firmwarexeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_5120txeon_w-3175xxeon_gold_6252xeon_gold_6134xeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_platinum_8260_firmwarexeon_w-2133xeon_gold_6252_firmwarexeon_d-2183it_firmwarexeon_gold_6148xeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6140mxeon_platinum_9282_firmwarexeon_platinum_8180xeon_d-2177ntxeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_w-2175xeon_gold_5220t2019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found