Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-12176

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-12 Sep, 2018 | 19:00
Updated At-16 Sep, 2024 | 19:47
Rejected At-
Credits

Improper input validation in firmware for Intel NUC Kits may allow a privileged user to potentially execute arbitrary code resulting in information disclosure, escalation of privilege and/or denial of service via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:12 Sep, 2018 | 19:00
Updated At:16 Sep, 2024 | 19:47
Rejected At:
▼CVE Numbering Authority (CNA)

Improper input validation in firmware for Intel NUC Kits may allow a privileged user to potentially execute arbitrary code resulting in information disclosure, escalation of privilege and/or denial of service via local access.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Intel(R) NUC Kits and Intel(R) Compute Cards
Versions
Affected
  • Multiple Intel(R) NUC Kits and Intel(R) Compute Cards (see list in Intel advisory).
Problem Types
TypeCWE IDDescription
textN/AEscalation of Privilege, Denial of Service, Information Disclosure
Type: text
CWE ID: N/A
Description: Escalation of Privilege, Denial of Service, Information Disclosure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00176.html
x_refsource_CONFIRM
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00176.html
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00176.html
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00176.html
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:12 Sep, 2018 | 19:29
Updated At:03 Oct, 2019 | 00:03

Improper input validation in firmware for Intel NUC Kits may allow a privileged user to potentially execute arbitrary code resulting in information disclosure, escalation of privilege and/or denial of service via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.2HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Intel Corporation
intel
>>nuc_kit_firmware>>-
cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_d33217gke>>-
cpe:2.3:h:intel:nuc_kit_d33217gke:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_d53427rke>>-
cpe:2.3:h:intel:nuc_kit_d53427rke:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_d54250wyb>>-
cpe:2.3:h:intel:nuc_kit_d54250wyb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_de3815tybe>>-
cpe:2.3:h:intel:nuc_kit_de3815tybe:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_dn2820fykh>>-
cpe:2.3:h:intel:nuc_kit_dn2820fykh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc5cpyh>>-
cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc5i3myhe>>-
cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc5i5myhe>>-
cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc5i7ryh>>-
cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc5pgyh>>-
cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc6cays>>-
cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc6i5syh>>-
cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc6i7kyk>>-
cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc7cjyh>>-
cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc7i3dnhe>>-
cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc7i5dnke>>-
cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc7i7bnh>>-
cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc7i7dnke>>-
cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_kit_nuc8i7hnk>>-
cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_card_firmware>>-
cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_card_cd1iv128mk>>-
cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_card_cd1m3128mk>>-
cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_card_cd1p64gk>>-
cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_stick_firmware>>-
cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_stick_stck1a32wfc>>-
cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_stick_stk1aw32sc>>-
cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_stick_stk2m3w64cc>>-
cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_stick_stk2mv64cc>>-
cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00176.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00176.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

670Records found

CVE-2018-3638
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.47%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 21:00
Updated-17 Sep, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Escalation of privilege in all versions of the Intel Remote Keyboard allows an authorized local attacker to execute arbitrary code as a privileged user.

Action-Not Available
Vendor-Intel Corporation
Product-remote_keyboard_mobile_appremote_keyboardIntel Remote Keyboard
CVE-2018-12202
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.31%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-17 Sep, 2024 | 04:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.

Action-Not Available
Vendor-Intel Corporation
Product-core_i5platform_sample_firmwaresilicon_reference_firmwarecore_i7core_i3Intel Platform Sample / Silicon Reference firmware
CVE-2018-12148
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.07%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation in file permissions in Intel Driver and Support Assistant before 3.5.0.1 may allow an authenticated user to potentially execute code as administrator via local access.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantIntel(R) Driver & Support Assistant
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12199
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.15% / 36.47%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 23:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in an OS component in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel TXE version before 3.1.60 or 4.0.10 may allow a privileged user to potentially execute arbitrary code via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12214
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.18% / 39.54%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12192
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 22.57%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic bug in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before version SPS_E5_04.00.04.393.0 may allow an unauthenticated user to potentially bypass MEBx authentication via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareconverged_security_management_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-287
Improper Authentication
CVE-2018-12203
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.18% / 39.80%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of service vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel Core Processor, 7th Generation Intel Core Processor may allow privileged user to potentially execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-core_i5platform_sample_firmwaresilicon_reference_firmwarecore_i7core_i3Intel Platform Sample / Silicon Reference firmware
CVE-2018-12220
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.05% / 16.78%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic bug in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CVE-2018-12173
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.6||HIGH
EPSS-0.04% / 11.63%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 18:00
Updated-16 Sep, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access protection in firmware in Intel Server Board, Intel Server System and Intel Compute Module before firmware version 00.01.0014 may allow an unauthenticated attacker to potentially execute arbitrary code resulting in information disclosure, escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-server_system_r1000wf_firmwareserver_board_s2600wfrserver_system_r1000wfrserver_board_s2600bpr_firmwareserver_board_s2600bprcompute_module_hns2600bprserver_system_h2000gr_firmwarecompute_module_hns2600bp_firmwareserver_system_r1000wfr_firmwareserver_board_s2600st_firmwarecompute_module_hns2600bpserver_system_h2000g_firmwareserver_system_h2000grserver_system_r2000wfrserver_system_r2000wf_firmwareserver_system_h2000gserver_board_s2600bpserver_system_r2000wfserver_system_r1000wfcompute_module_hns2600bpr_firmwareserver_board_s2600wfserver_board_s2600bp_firmwareserver_board_s2600wf_firmwareserver_board_s2600wfr_firmwareserver_board_s2600stserver_board_s2600str_firmwareserver_system_r2000wfr_firmwareserver_board_s2600strIntel Server Boards Firmware
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12201
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.33% / 55.00%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-core_i5platform_sample_firmwareceleronpentium_silversilicon_reference_firmwarecore_i7core_i3Intel Platform Sample / Silicon Reference firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12204
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.31%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-hns2600tp24strbbs2600bpbr1208wftysr1304wf0yshns2600tprhns7200apr2224wfqzshns2600bpqbbs2600stqs2600tpnrs2600kptrhns2600bpblcr2208wttyc1rr2208wt2ysrbbs2600stbr2208wf0zsr2208wftzsdbs2600cw2rdbs2600cwtrr2312wf0npplatform_sample_firmwarer2312wttysrs2600stbs2600wtts1rr2224wftzsr1208wt2gsrs2600wt2rhns2600kpfrhns2600kprr1304wttgsrbbs7200apbbs2600bpshns2600bpsr2208wfqzshns2600bpb24bbs7200aplhns2600bps24hns2600tpfrs2600wfohns2600bpq24hns2600bpblc24r2312wfqzss2600wttrr2224wttysrr1208wttgsrhns2600tpnrr1304wt2gsrhns2600bpbs2600tprr1304wftyshns7200aprlsilicon_reference_firmwares2600tptrr2208wttysrs2600stqr2308wftzsdbs2600cwtsrhns7200aprs7200aprhns2600tp24srdbs2600cw2srhns7200aplhns2600tp24rs2600kprs2600wfqr2308wttysrbbs2600bpqs2600kpfrs2600tpfrs2600wftr2312wftzsIntel Platform Sample / Silicon Reference firmware
CWE ID-CWE-665
Improper Initialization
CVE-2018-12168
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.07%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation in file permissions in Intel Computing Improvement Program before version 2.2.0.03942 may allow an authenticated user to potentially execute code as administrator via local access.

Action-Not Available
Vendor-Intel Corporation
Product-computing_improvement_programIntel(R) Computing Improvement Program
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12205
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 31.20%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 19:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper certificate validation in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core(tm) Processor, 7th Generation Intel(R) Core(tm) Processor may allow an unauthenticated user to potentially enable an escalation of privilege via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-core_i5platform_sample_firmwaresilicon_reference_firmwarecore_i7core_i3Intel Platform Sample / Silicon Reference firmware
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-12191
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.6||HIGH
EPSS-0.25% / 47.71%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 22:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bounds check in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before versions 4.00.04.383 or SPS 4.01.02.174, or Intel(R) TXE before versions 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially execute arbitrary code via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareconverged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5707
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Trusted Execution Engine Firmware 3.0 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-trusted_execution_engine_firmwareTrusted Execution Engine
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5683
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.64%
||
7 Day CHG~0.00%
Published-04 Apr, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation in IntelHAXM.sys driver in the Intel Hardware Accelerated Execution Manager before version 6.0.6 allows a local user to gain system level access.

Action-Not Available
Vendor-Intel Corporation
Product-hardware_accelerated_execution_managerIntel Hardware Accelerated Execution Manager
CVE-2017-5700
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.48%
||
7 Day CHG~0.00%
Published-11 Oct, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient protection of password storage in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to bypass Administrator and User passwords via access to password storage.

Action-Not Available
Vendor-Intel Corporation
Product-nuc7i3bnhnuc7i3bnk_firmwarenuc7i3bnh_firmwarenuc7i3bnknuc7i7bnh_firmwarenuc7i7bnhnuc7i5bnknuc7i5bnh_firmwarenuc7i5bnhnuc7i5bnk_firmwareNUC Kits
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2017-5711
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.97%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)Siemens AGIntel Corporation
Product-rog_strix_z270g_gaming_firmwareh110-plus_firmwareh170m-plus\/brsimatic_ipc627dprime_h110m-ptuf_z270_mark_2rog_strix_z270h_gaming\/k1prime_j3355i-cb150i_pro_gaming\/aurasimatic_ipc827ch110m-a\/dp_firmwaresimatic_ipc477d_firmwareq170t_firmwareb250m-f_plush110m-ksh110m-a_d3ex-b150m-v5rog_strix_b250i_gaming_firmwareh170_pro_gamingsimotion_p320-4strooper_b150_d3_firmwareh110s2b150m-dtuf_z370-plus_gaming_firmwareh110m-ts_firmwaresimatic_ipc647d_firmwareb150-asimatic_ipc477db150m-plus_d3_firmwarerog_maximus_viii_hero_firmwarerog_strix_z270f_gamingrog_maximus_viii_ranger_firmwareb150m-v_plus_firmwareprime_q270m-ch110-plush110s2_firmwareh110m-e_firmwareprime_h110m2\/fpt_firmwaresabertooth_z170_mark_1h110m-c\/hdmi_firmwaresinumerik_pcu50.5-p_firmwaretuf_z370-pro_gaming_firmwarerog_maximus_viii_hero_alpha_firmwarerog_maximus_ix_hero_firmwarez170-krog_strix_b250g_gaming_firmwarerog_strix_z370-f_gamingb150m-ah110m-aex-b250m-v5z170-prosimatic_ipc477eb150m-k_d3prime_h110m2_firmwarerog_maximus_viii_formulaprime_b250m-dsimatic_field_pg_m3_firmwarerog_maximus_ix_extremesimatic_ipc677cb150m-k_firmwareq170s1_firmwareex-b150m-v3_firmwareprime_b250m-jb150m-a_d3_firmwarez170m-e_d3z170-k_firmwarepio-b150m_firmwarerog_strix_h270i_gaming_firmwareh170m-plush110m-ks_r1_firmwareex-b250-v7b150m-plusz170-ar_firmwareh110m-plusb150m-v_plush110m-kex-b150-v7_firmwareh110m-a_d3_firmwarerog_strix_b250h_gaming_firmwareh110m-c\/br_firmwarez170m-plus\/brprime_h270-plus_firmwareprime_h110m2\/fptprime_z270m-plus\/br_firmwareh110t-a_firmwareh110i-plus_firmwaresimatic_ipc627d_firmwaresimatic_field_pg_m3prime_z270-kh170i-pro_firmwaresimatic_field_pg_m4simatic_ipc627ch170i-prob150m-plus_d3z170-premium_firmwaresabertooth_z170_mark_1_firmwareb150m-f_plush170m-e_d3z170-eb150-pro_firmwarepio-b150mrog_maximus_ix_codeprime_b250-plus_firmwareh110m-c_firmwarerog_maximus_x_hero_firmwaresimatic_itp1000simatic_ipc427d_firmwareh110m-e\/m.2_firmwareprime_h110m2rog_maximus_x_formularog_maximus_x_formula_firmwareh110m-d\/exper\/sib150_pro_gaming\/aura_firmwaremanageability_engine_firmwarerog_maximus_ix_herorog_strix_z270i_gamingh170-plus_d3_firmwareex-b150m-v_firmwareq170m-cm-brog_strix_z370-g_gamingprime_z270-arb150-pro_d3rog_strix_z270h_gamingh110m-cs\/br_firmwarerog_strix_z370-i_gamingrog_strix_z370-h_gaming_firmwareh110m-d_firmwaresabertooth_z170_sb150_pro_gamingh110m-a\/m.2q270m-cm-asimatic_ipc847c_firmwareh110m-rh170-pro\/usb_3.1_firmwareq170m2_firmwareb150m-kprime_z270m-plus_firmwareh110m-a_firmwareex-h110m-v3_firmwareh110m-k_x_firmwarez170m-e_d3_firmwareh170_pro_gaming_firmwareb150m-k_d3_firmwarerog_strix_z270f_gaming_firmwarerog_strix_b250f_gamingh110m-cs\/brq170s1ex-b250-v7_firmwaresabertooth_z170_s_firmwarerog_strix_b250h_gamingh110m-d\/exper\/si_firmwareex-b150m-v5_firmwareprime_b250m-d_firmwareh110m-p\/dvib150i_pro_gaming\/aura_firmwaresimatic_ipc647db150m-f_plus_firmwareh110m-ks_r1h110m-c\/ps_firmwareb150-proprime_h270-proex-h110m-v_firmwareex-b250m-v3rog_strix_z270g_gamingrog_maximus_ix_formula_firmwarerog_maximus_viii_gene_firmwareprime_z270-p_firmwareex-h110m-v3h110m-c2\/tf_firmwarez170-p_firmwareq270-sactive_management_technology_firmwaresimatic_ipc427e_firmwarez170m-plustrooper_h110_d3z170-deluxe_firmwaresimatic_ipc547d_firmwaresimatic_ipc847cprime_q270m-c_firmwaresimatic_ipc547dh170m-plus_firmwareb250_mining_expert_firmwarerog_strix_h270i_gamingrog_strix_z270h_gaming\/k1_firmwareprime_z370-pz170-e_firmwarerog_maximus_viii_extreme_firmwareb250_mining_expertb150m-a_d3simatic_ipc677dh110m-c2prime_b250m-a_firmwaresimatic_ipc627c_firmwareprime_b250m-plus\/br_firmwarez170-ah110m-k_firmwaretuf_z270_mark_1_firmwareb150_pro_gaming_d3q170m-c_firmwarez170_pro_gaming\/auraex-b250m-vh110m-a\/m.2_firmwareb150m-d_firmwarerog_strix_b250f_gaming_firmwareprime_z370-a_firmwaresinumerik_pcu50.5-crog_maximus_x_code_firmwarerog_maximus_viii_impactsimatic_ipc827d_firmwareprime_b250m-plus_firmwarez170-deluxeb150m-cprime_b250m-plush110m-cs_xb150-pro_d3_firmwareprime_b250-proz170-a_firmwareb150_pro_gaming_d3_firmwareb150-plusprime_z270-a_firmwareprime_z270-k_firmwareh110m-c\/hdmisimatic_itp1000_firmwareprime_b250-a_firmwareprime_b250-arog_maximus_viii_geneh110t-aex-b250m-v5_firmwaresimatic_ipc647c_firmwareb150-a_firmwaresimatic_ipc427drog_maximus_viii_impact_firmwareq170th110m-r_firmwareh110m-crog_maximus_ix_apex_firmwareprime_z270-ar_firmwarez170_pro_gaming\/aura_firmwareh110m-fprime_b250m-k_firmwareprime_b250m-j_firmwarerog_strix_z370-e_gamingprime_b250m-c_firmwarerog_strix_z270i_gaming_firmwareprime_b250m-ah110m-p\/dvi_firmwareb150m-a_firmwareh170-plus_d3h110m-c\/brrog_strix_b250g_gamingb250-srog_maximus_ix_extreme_firmwareprime_z270m-plusb150_pro_gaming_firmwareex-b150-v7prime_j3355i-c_firmwareb150m-c_d3_firmwaresimatic_ipc427eprime_b250-pro_firmwareh110tq170m2\/cdm\/sib150m-a\/m.2z170_pro_gaming_firmwarerog_strix_z270e_gaming_firmwareb150m-c_firmwarerog_strix_z370-e_gaming_firmwareb150_pro_gaming\/auraq170m2prime_b250m-kprime_z370-aex-h110m-vh110m-dq170t_v2b150m-plus_firmwaresimatic_ipc647csinumerik_pcu50.5-c_firmwareb150m-a\/m.2_firmwareprime_h110m-p_firmwarez170-pro_firmwaresimatic_ipc847dh110m-k_d3z170-premiumex-b250m-v_firmwarerog_strix_z370-g_gaming_firmwareh110i-plussimatic_ipc477d_pro_firmwareb250m-f_plus_firmwarerog_maximus_viii_rangerh110m-plus_firmwareh110m-f_firmwareex-b150m-vtrooper_h110_d3_firmwarerog_maximus_x_apex_firmwarez170i_pro_gamingsimatic_field_pg_m5_firmwaretrooper_b150_d3simatic_ipc677d_firmwarerog_maximus_ix_apexh110m-a\/dpb150m-c\/brrog_strix_z370-i_gaming_firmwareh170-pro_firmwareb150i_pro_gaming\/wifi\/aura_firmwareh110m-erog_maximus_x_heroh110m-cs_firmwareh110m-cssimatic_field_pg_m4_firmwareh110m-cs_x_firmwareb150m-c_d3rog_maximus_viii_extremeh110s1_firmwaretuf_z270_mark_1z170m-plus\/br_firmwareex-b150m-v3prime_z270-pb150-plus_firmwareprime_z370-p_firmwareq170m2\/cdm\/si_firmwarerog_maximus_ix_formulatuf_z370-pro_gamingh170m-e_d3_firmwareb250m-c_prorog_strix_b250i_gamingrog_strix_z370-h_gamingprime_z270m-plus\/brh110m-ks_firmwareb250-mr_firmwareq170m-cm-b_firmwaresimatic_ipc477e_firmwarerog_strix_h270f_gamingrog_strix_z370-f_gaming_firmwareh110s1prime_h270m-plusz170-p_d3prime_b250m-cz170i_pro_gaming_firmwarerog_maximus_viii_heroh110m-tssimatic_ipc477d_propio-b250i_firmwareq170t_v2_firmwareprime_h270m-plus_firmwareb150m-c\/br_firmwareq170m-crog_maximus_x_codetuf_z370-plus_gamingb250-mrh170-prosimatic_ipc547erog_maximus_viii_formula_firmwareb250m-c_pro_firmwarerog_strix_h270f_gaming_firmwareh170-pro\/usb_3.1z170-p_d3_firmwarerog_maximus_x_apexpio-b250ib150m_pro_gaming_firmwarez170m-plus_firmwaresimatic_ipc547e_firmwaresimatic_ipc827dh110m-c\/psh110m-k_d3_firmwarerog_maximus_viii_hero_alphasimatic_field_pg_m5b150i_pro_gaming\/wifi\/aurarog_strix_z270h_gaming_firmwarerog_maximus_ix_code_firmwareprime_h270-pro_firmwareb150m_pro_gamingh110m-c2\/tfq270m-cm-a_firmwareh110m-c2_firmwarerog_strix_z270e_gamingtuf_z270_mark_2_firmwaresimatic_ipc677c_firmwareprime_b250m-plus\/brq270-s_firmwareh110t_firmwareex-b250m-v3_firmwarez170-ph110m-e\/m.2z170-arh110m-k_xsinumerik_pcu50.5-pb250-s_firmwareprime_z270-asimotion_p320-4s_firmwareprime_b250-plusprime_h270-plussimatic_ipc847d_firmwareh170m-plus\/br_firmwarez170_pro_gamingsimatic_ipc827c_firmwareActive Management Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5727
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.72%
||
7 Day CHG~0.00%
Published-02 Feb, 2018 | 15:00
Updated-17 Sep, 2024 | 02:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel Graphics Driver
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2017-5706
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.54%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareServer Platform Services
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5717
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.94% / 75.29%
||
7 Day CHG~0.00%
Published-12 Dec, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Type Confusion in Content Protection HECI Service in Intel Graphics Driver allows unprivileged user to elevate privileges via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel Graphics Driver
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2017-5736
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.05% / 13.71%
||
7 Day CHG~0.00%
Published-20 Mar, 2018 | 20:00
Updated-16 Sep, 2024 | 23:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege in Intel Software Guard Extensions Platform Software Component before 1.9.105.42329 allows a local attacker to execute arbitrary code as administrator.

Action-Not Available
Vendor-Intel Corporation
Product-software_guard_extensions_platform_software_componentSoftware Guard Extensions Platform Software Component
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-5710
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.79%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple privilege escalations in kernel in Intel Trusted Execution Engine Firmware 3.0 allows unauthorized process to access privileged content via unspecified vector.

Action-Not Available
Vendor-Intel Corporation
Product-trusted_execution_engine_firmwareTrusted Execution Engine
CVE-2017-5708
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.36%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple privilege escalations in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow unauthorized process to access privileged content via unspecified vector.

Action-Not Available
Vendor-Intel Corporation
Product-manageability_engine_firmwareManageability Engine
CVE-2017-5688
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 22.63%
||
7 Day CHG~0.00%
Published-31 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an escalation of privilege vulnerability in the Intel Solid State Drive Toolbox versions before 3.4.5 which allow a local administrative attacker to load and execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-solid_state_drive_toolboxSolid State Drive Toolbox
CVE-2017-5709
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.57%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple privilege escalations in kernel in Intel Server Platform Services Firmware 4.0 allows unauthorized process to access privileged content via unspecified vector.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareServer Platform Services
CVE-2017-5705
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.37%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-manageability_engine_firmwareManageability Engine
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-33124
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.62%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e-2286gcore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7xeon_e5-2603_v4_firmwarecore_i9-7900xxeon_d-2733nt_firmwarecore_i7-10710u_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_w-1270p_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_e5-2637_v4core_i9-9960xxeon_w-2123xeon_platinum_8353hcore_i7-9700k_firmwarecore_i5-8500t_firmwarexeon_d-1749nt_firmwarecore_i3-9300t_firmwarexeon_e-2236xeon_platinum_8280_firmwarexeon_e3-1220_v5_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_w-1270exeon_silver_4209t_firmwarecore_i5-7500xeon_e5-2650_v4_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqcore_i7-8709gxeon_d-2786nte_firmwarexeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4core_i5-8200ycore_i5-10500t_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260uxeon_gold_6226r_firmwarexeon_e3-1235l_v5core_i5-7287u_firmwarecore_i9-10900xxeon_gold_6256_firmwarexeon_w-3335xeon_e7-8891_v4_firmwarexeon_w-11555mrecore_i5-10500hcore_i7-6800k_firmwarecore_i5-10600kfxeon_e5-2648l_v4core_i5-1035g1_firmwarexeon_w-2123_firmwarexeon_e-2146gxeon_d-2752nte_firmwarecore_i5-8210y_firmwarecore_i3-10100exeon_silver_4316_firmwarexeon_w-3365_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwarecore_i7-9700txeon_gold_6238core_i5-7600tcore_i7-4820kxeon_e3-1260l_v5_firmwarexeon_w-2195_firmwarexeon_e3-1240l_v5xeon_platinum_8256xeon_w-2275_firmwarexeon_e-2276mxeon_d-2163itcore_i7-3930kxeon_gold_6334_firmwarexeon_e3-1505m_v5xeon_w-2235_firmwarexeon_gold_6328hlxeon_d-1623nxeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarecore_i7-10810ucore_i3-10300txeon_e5-2628l_v4core_i3-8100xeon_e-2378g_firmwarecore_i5-9600kxeon_e5-2658_v4xeon_gold_5218r_firmwarecore_i3-7100xeon_e5-1630_v4_firmwarecore_i7-7600u_firmwarecore_i7-9700kf_firmwarecore_i5-9300hcore_i5-10500exeon_silver_4214y_firmwarecore_i9-10850kcore_i5-8500bcore_i3-7100e_firmwarexeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_platinum_8368q_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_w-2175_firmwarecore_i3-8100hcore_i3-7300t_firmwarexeon_e5-2695_v4core_i7-9700f_firmwarexeon_d-2177nt_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-1712tr_firmwarecore_i3-8130u_firmwarecore_i5-10310ucore_i7-6950x_firmwarexeon_e7-8860_v4_firmwarecore_i7-8557ucore_i3-8350k_firmwarexeon_e5-2683_v4core_i9-9820x_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarexeon_platinum_8376hl_firmwarecore_i9-10980hkxeon_d-2733ntxeon_w-11155mlexeon_d-1559_firmwarecore_i7-10700k_firmwarexeon_gold_5320tcore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarexeon_e5-2630l_v4core_i7-10510y_firmwarexeon_e7-8893_v4core_i7-1060g7_firmwarecore_i7-8500yxeon_w-3323xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarecore_i7-1068ng7_firmwarecore_i5-7400_firmwarexeon_w-2133_firmwarecore_i5-9600xeon_w-3375core_i5-8600tcore_i5-7200u_firmwarexeon_e3-1585_v5_firmwarexeon_gold_6258r_firmwarecore_i3-10320_firmwarexeon_gold_5218bxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_d-1734nt_firmwarexeon_e-2288gxeon_w-1370pcore_i7-7500uxeon_e-2274g_firmwarexeon_gold_5318s_firmwarexeon_e3-1225_v6xeon_e3-1280_v6xeon_gold_5218rxeon_d-2752ntexeon_e-2124g_firmwarexeon_e5-2695_v4_firmwarexeon_w-2235xeon_e5-2608l_v4_firmwarexeon_w-3175xxeon_platinum_8362_firmwarexeon_w-3225core_i3-7101texeon_e5-2609_v4core_i7-7700xeon_d-1540xeon_gold_6246r_firmwarexeon_gold_6246rcore_i5-7300hqxeon_d-1513ncore_i5-10505_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e5-2690_v4core_i9-9900xcore_i9-9900t_firmwarexeon_e5-2699a_v4_firmwarecore_i5-9600_firmwarexeon_e3-1505m_v6_firmwarecore_i7-9700exeon_e-2254mexeon_platinum_8260l_firmwarecore_i7-8500y_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_w-3235_firmwarexeon_platinum_9222xeon_gold_5318ncore_i3-10105tcore_i3-8100h_firmwarecore_i7-10510u_firmwarexeon_platinum_8358_firmwarecore_i7-7700_firmwarecore_i3-1000g4core_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i9-9980hk_firmwarexeon_e-2144gxeon_gold_6314ucore_i5-8300h_firmwarexeon_e3-1270_v6_firmwarexeon_d-2752tercore_i5-8279u_firmwarecore_i5-8500b_firmwarexeon_w-11555mlexeon_w-1390txeon_silver_4216xeon_e5-2640_v4xeon_e5-2697a_v4_firmwarexeon_platinum_8362core_i7-10610uxeon_platinum_8276lxeon_platinum_8351n_firmwarecore_i7-7740xxeon_e5-2637_v4_firmwarecore_i7-7y75xeon_d-1713nte_firmwarexeon_e3-1575m_v5xeon_e-2124gxeon_platinum_9221_firmwarecore_i7-4930kcore_i5-9400core_i5-8500_firmwarexeon_d-1557xeon_e5-2623_v4core_i3-10105f_firmwarexeon_w-3245mxeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_gold_5318sxeon_w-11555mle_firmwarecore_i5-7300hq_firmwarexeon_w-1350core_i5-1035g1xeon_w-3345_firmwarexeon_w-1290xeon_e-2314_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i7-8086k_firmwarexeon_w-2223_firmwarexeon_d-1718t_firmwarexeon_gold_6234core_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarecore_i5-7442eq_firmwarexeon_gold_6252n_firmwarecore_i7-4930mxcore_i9-10900xeon_e3-1230_v6_firmwarexeon_w-1250core_i7-1065g7_firmwarexeon_e3-1565l_v5_firmwarecore_i5-7360uxeon_e3-1275_v6xeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4core_i5-7300uxeon_e5-2698_v4_firmwarexeon_e5-2618l_v4_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarexeon_d-1736ntcore_i3-7100h_firmwarecore_i7-8565uxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_d-1747ntexeon_bronze_3206r_firmwarecore_i7-7700kxeon_w-3323_firmwarecore_i3-10100fcore_i9-9900_firmwarexeon_gold_5217core_i7-6850kcore_i7-9750hf_firmwarexeon_gold_6210ucore_i5-7200uxeon_d-1548_firmwarecore_i7-9700fcore_i5-8265u_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarecore_i5-10210ucore_i3-7300_firmwarecore_i7-7740x_firmwarexeon_w-11155mre_firmwarecore_i5-8400bcore_i3-7100hxeon_gold_5215core_i5-10400t_firmwarecore_i9-9900ksxeon_d-1531_firmwarexeon_d-1527_firmwarecore_i9-7920xxeon_d-1633n_firmwarexeon_platinum_8352vcore_i9-7960x_firmwarexeon_e3-1230_v6xeon_d-1513n_firmwarecore_i9-8950hkxeon_e7-4809_v4_firmwarexeon_platinum_8360ycore_i5-10600tcore_i5-10600kf_firmwarexeon_d-1747nte_firmwarecore_i5-7640xxeon_w-3275mcore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_d-1726_firmwarexeon_gold_6336yxeon_gold_6209ucore_i9-10900e_firmwarexeon_gold_6250lxeon_e-2176m_firmwarexeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_d-2146nt_firmwarexeon_e3-1240_v5_firmwarecore_i7-7660uxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_d-1518_firmwarexeon_platinum_8376h_firmwarecore_i7-7700hqxeon_e-2236_firmwarexeon_e-2244g_firmwarecore_i7-6900k_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_gold_6238l_firmwarecore_m3-7y30core_i5-8269u_firmwarexeon_w-11155mrexeon_gold_6252xeon_w-2135xeon_e3-1505l_v6_firmwarexeon_e3-1285_v6xeon_e5-4627_v4xeon_e-2276mlxeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarecore_i7-5820k_firmwarecore_i3-8300xeon_e3-1545m_v5core_i3-7102e_firmwarexeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_gold_6346_firmwarexeon_e-2276me_firmwarecore_i5-8400txeon_d-2775texeon_w-1370p_firmwarecore_i7-1065g7core_i7-9800xxeon_silver_4208xeon_e-2136_firmwarexeon_w-1270_firmwarexeon_gold_6210u_firmwarexeon_w-1250ecore_i5-8257u_firmwarecore_i5-1038ng7_firmwarecore_i5-9400f_firmwarecore_i7-8706g_firmwarexeon_gold_5215lcore_i5-7287uxeon_e5-4660_v4xeon_e-2146g_firmwarecore_i7-3970xcore_i7-3960xxeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_e-2126g_firmwarecore_i5-9600t_firmwarexeon_d-2753nt_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarexeon_d-1529_firmwarexeon_gold_6240lxeon_w-3265mxeon_gold_6248xeon_e5-4640_v4_firmwarexeon_d-1712trxeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_d-1736_firmwarecore_i3-8145ucore_i3-9300xeon_d-2173itxeon_d-2766ntcore_i7-7567ucore_i7-10870h_firmwarecore_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_gold_6252_firmwarexeon_e5-2650_v4xeon_d-2776ntcore_i7-3820xeon_e7-4820_v4_firmwarexeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700ecore_i3-7320xeon_e3-1585l_v5core_i7-3940xmxeon_gold_6348h_firmwarexeon_e-2388gcore_i7-9700te_firmwarexeon_platinum_8268xeon_d-2786ntexeon_e-2226gxeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_silver_4215rxeon_e-2278gcore_i9-10900ecore_i3-9100core_i5-8600core_i5-8250uxeon_platinum_8380xeon_w-3265core_m3-8100y_firmwarecore_i7-3940xm_firmwarecore_i5-10500tecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i7-8700bcore_i5-10500txeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_w-1250texeon_platinum_8352mxeon_gold_6208ucore_i3-9100tecore_i5-9300hf_firmwarexeon_d-1749ntxeon_gold_6242core_i7-10700kxeon_d-1627xeon_e3-1575m_v5_firmwarexeon_e-2186mcore_i3-8109u_firmwarexeon_e3-1558l_v5xeon_gold_6250_firmwarexeon_d-1623n_firmwarecore_i3-9350k_firmwarecore_i5-7442eqxeon_d-1702core_i7-8665uecore_i3-8130uxeon_e7-4830_v4core_i3-7167uxeon_e5-2699_v4_firmwarecore_i3-8300txeon_d-1528_firmwarexeon_gold_6342xeon_e5-4628l_v4xeon_d-1732te_firmwarexeon_e3-1268l_v5core_i9-9900kxeon_silver_4316xeon_gold_6240_firmwarecore_i7-5930kcore_i5-10400fxeon_w-2265_firmwarexeon_e-2278ge_firmwarexeon_gold_6330ncore_i5-9400_firmwarexeon_gold_6226rxeon_bronze_3204xeon_w-1270e_firmwarexeon_e-2276m_firmwarecore_i3-7350k_firmwarexeon_d-1567core_i5-8400t_firmwarexeon_w-3365core_i7-9850hlxeon_w-2135_firmwarexeon_e-2286m_firmwarecore_i5-8400hxeon_e3-1245_v5xeon_w-2175xeon_d-2141i_firmwarexeon_silver_4214r_firmwarexeon_w-3335_firmwarecore_i3-10110yxeon_d-2776nt_firmwarexeon_gold_6334core_i7-7820hkcore_i5-9300h_firmwarexeon_d-1734ntxeon_w-11855mxeon_gold_6240yxeon_e5-4655_v4_firmwarexeon_gold_6238lxeon_w-1390xeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_gold_5318h_firmwarexeon_gold_6354core_i7-8665ucore_i3-10305tcore_i3-9350kf_firmwarecore_i7-5960x_firmwarexeon_w-1370_firmwarecore_i5-7440eq_firmwarexeon_d-1649n_firmwarecore_i3-8140uxeon_gold_5320hcore_i7-8086kcore_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kxeon_gold_5222xeon_e7-8870_v4_firmwarecore_i7-10850hxeon_gold_6256xeon_d-1523ncore_i3-1005g1_firmwarexeon_gold_6338n_firmwarecore_i3-9100hl_firmwarecore_i9-9900x_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i3-8100bcore_i5-8279ucore_i3-10100f_firmwarecore_i5-8600kcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarexeon_d-1541xeon_d-1543n_firmwarexeon_gold_5320t_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1622xeon_gold_5222_firmwarecore_i7-8700t_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_platinum_8352v_firmwarexeon_w-2223xeon_gold_5318n_firmwarexeon_gold_6238tcore_i5-8500xeon_silver_4310t_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i9-10980xe_firmwarexeon_gold_6240r_firmwarecore_i5-8257uxeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarecore_i7-8569uxeon_silver_4310core_i9-9900tcore_i7-10700t_firmwarexeon_d-2796ntxeon_e3-1240_v5xeon_w-2133xeon_platinum_8260lxeon_e-2336_firmwarexeon_platinum_8270xeon_gold_6248r_firmwarecore_i5-8500txeon_e3-1501m_v6core_i7-4930k_firmwarexeon_d-2766nt_firmwarexeon_w-11555mre_firmwarexeon_d-2166ntxeon_gold_6348_firmwarecore_i3-10305core_i7-9850he_firmwarexeon_e5-2608l_v4xeon_w-1390pcore_i3-9100_firmwarexeon_e5-2658_v4_firmwarecore_i7-7560u_firmwarexeon_gold_6262vxeon_platinum_8354h_firmwarecore_i7-10710uxeon_e5-2620_v4xeon_e7-4809_v4core_i5-10300hxeon_platinum_8358pcore_i5-10210yxeon_silver_4210_firmwarexeon_d-1702_firmwarexeon_platinum_8380hl_firmwarexeon_w-1270texeon_e-2224core_i9-9900ks_firmwarexeon_e-2124_firmwarexeon_gold_6238rxeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarexeon_d-2798nt_firmwarecore_i9-10980hk_firmwarexeon_d-2166nt_firmwarexeon_e5-2699a_v4core_i5-10400_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_w-2155core_i3-7102exeon_w-11155mle_firmwarexeon_platinum_8376hlxeon_e7-8894_v4_firmwarexeon_silver_4216_firmwarexeon_d-1746tercore_i9-10900k_firmwarexeon_gold_5215l_firmwarexeon_d-2738_firmwarexeon_w-2225_firmwarexeon_gold_6230xeon_d-1714_firmwarexeon_e5-2650l_v4xeon_e7-4820_v4core_i3-9100ecore_i3-7300xeon_d-1548core_i7-10510yxeon_e3-1220_v5core_i5-7y57_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_d-1653nxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarecore_i9-10900_firmwarexeon_gold_5218txeon_e-2374gxeon_e-2254ml_firmwarexeon_d-1557_firmwarecore_i5-9500t_firmwarexeon_gold_5218ncore_i7-8709g_firmwarexeon_d-2163it_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarexeon_e7-8891_v4xeon_silver_4314_firmwarexeon_d-1533n_firmwarexeon_e-2278gexeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_w-10855mxeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_w-3275_firmwarecore_i5-10600t_firmwarexeon_platinum_8270_firmwarecore_i5-10300h_firmwarexeon_d-2775te_firmwarexeon_w-3235xeon_e5-2680_v4_firmwarecore_i9-10900txeon_d-1571_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarecore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarexeon_e5-4650_v4_firmwarexeon_gold_5220rxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-9700kfxeon_d-2796texeon_d-1541_firmwarexeon_w-1290te_firmwarexeon_gold_6328hl_firmwarexeon_platinum_9221xeon_d-2142itcore_i5-7600k_firmwarexeon_platinum_9222_firmwarecore_i5-8305g_firmwarexeon_e5-2699r_v4core_i3-8100b_firmwarecore_i9-10900te_firmwarexeon_e5-2640_v4_firmwarecore_i3-8300t_firmwarecore_i3-7167u_firmwarexeon_d-1726xeon_platinum_8380_firmwarecore_i7-10700_firmwarexeon_d-1735tr_firmwarexeon_silver_4314core_i3-1005g1core_i7-1068ng7xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarecore_i7-7820eq_firmwarexeon_d-1637core_i5-9400fxeon_d-1539_firmwarexeon_e3-1515m_v5core_i5-9500f_firmwarecore_i7-6800kcore_i7-7560uxeon_platinum_8368_firmwarecore_i7-8550u_firmwarexeon_d-1602xeon_e5-4655_v4core_i5-8365uxeon_platinum_8376hxeon_w-2245xeon_d-2799xeon_gold_6312u_firmwarexeon_d-2145ntcore_i5-9600kfxeon_e5-2697a_v4xeon_e-2288g_firmwarexeon_w-1250te_firmwarexeon_e-2224gcore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uxeon_gold_6254_firmwarexeon_e5-1620_v4xeon_e5-4669_v4xeon_gold_5220_firmwarexeon_e5-2609_v4_firmwarexeon_gold_6338ncore_i5-7600t_firmwarecore_i7-9700t_firmwarecore_i7-8665ue_firmwarecore_i7-4820k_firmwarexeon_gold_6330core_i7-7820hq_firmwarexeon_silver_4208_firmwarexeon_d-1521core_i3-8145uexeon_w-2155_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarecore_i5-8265ucore_i7-10700txeon_e-2246g_firmwarecore_i9-9900kfxeon_e5-4620_v4_firmwarecore_i7-10750hxeon_e-2226ge_firmwarexeon_d-2753ntxeon_e3-1225_v6_firmwarexeon_gold_6338xeon_gold_5315ycore_i5-8400b_firmwarecore_i7-8706gcore_i7-5930k_firmwarecore_i5-7400t_firmwarexeon_silver_4215xeon_gold_6230ncore_i5-8365u_firmwarexeon_platinum_8280l_firmwarexeon_e5-2667_v4_firmwarecore_i9-10885hxeon_gold_6338tcore_i5-9500_firmwarecore_i5-7440eqxeon_d-1739_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_m3-7y32xeon_gold_6242_firmwarexeon_d-1733nt_firmwarecore_i7-10750h_firmwarexeon_e-2134xeon_w-1290texeon_w-3265_firmwarexeon_d-2142it_firmwarexeon_platinum_8360y_firmwarecore_i7-8557u_firmwarecore_m3-7y32_firmwarexeon_w-11865mre_firmwarexeon_platinum_8360hxeon_e-2176mxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_5218_firmwarecore_i9-10900t_firmwarexeon_silver_4210txeon_w-3275m_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-2795ntcore_i5-7267u_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_w-3245m_firmwarecore_i5-9600txeon_e-2226g_firmwarexeon_e5-1650_v4core_i9-7960xxeon_gold_6336y_firmwarexeon_w-1370xeon_d-1715terxeon_d-1559xeon_platinum_9242_firmwarexeon_e-2174gxeon_e3-1220_v6core_i7-7y75_firmwarexeon_d-1537xeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_gold_6230_firmwarexeon_e7-4850_v4_firmwarexeon_e-2176gxeon_gold_6254xeon_e7-8880_v4core_i3-10320xeon_gold_6342_firmwarexeon_e5-2667_v4core_i3-10105fxeon_w-1390t_firmwarexeon_gold_5320xeon_e-2224_firmwarexeon_gold_5320h_firmwarexeon_d-1649nxeon_e7-8890_v4core_i7-10875hxeon_d-1736nt_firmwarecore_i5-10400hxeon_d-2712t_firmwarecore_i5-9600kf_firmwarecore_i7-9800x_firmwarexeon_w-10885mxeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_d-1527core_i9-9940xcore_i9-9980xe_firmwarexeon_gold_6312uxeon_e3-1535m_v5core_i9-7940xxeon_gold_5220r_firmwarexeon_platinum_8380hlxeon_e3-1505l_v5core_i7-9700texeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_w-2125core_i9-9900k_firmwarexeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-10400h_firmwarexeon_silver_4309yxeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntcore_i3-10100txeon_d-1713ntcore_i3-9100f_firmwarecore_i7-7700hq_firmwarecore_i9-9980hkxeon_e-2244gcore_i3-7100txeon_w-2125_firmwarecore_i5-1035g4_firmwarexeon_platinum_8358p_firmwarexeon_e3-1235l_v5_firmwarecore_i7-9850h_firmwarexeon_d-2795nt_firmwarecore_i7-8559ucore_i5-9500exeon_gold_6314u_firmwarecore_i9-9920x_firmwarexeon_platinum_8368qxeon_w-1250e_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarexeon_gold_6209u_firmwarecore_i3-10325core_i9-7920x_firmwarexeon_e-2356gxeon_platinum_8356h_firmwarecore_i7-8700core_i3-7130ucore_i5-8400xeon_platinum_8276l_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_platinum_8380hxeon_gold_6262v_firmwarexeon_e-2334core_i7\+8700core_i5-7440hq_firmwarecore_i7-9850hcore_i3-10110u_firmwarecore_i5-7600core_i9-10980xexeon_e3-1505l_v5_firmwarexeon_w-11865mlexeon_e3-1280_v5_firmwarexeon_e5-2697_v4xeon_e-2186gxeon_gold_6226_firmwarecore_i5-8310y_firmwarexeon_silver_4210core_i9-10885h_firmwarexeon_gold_6250l_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i3-7320_firmwarecore_i7-8569u_firmwarexeon_e5-2630_v4xeon_gold_6240y_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i5-9400txeon_w-3245_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i3-8100t_firmwarecore_i5-7600_firmwarecore_i9-9960x_firmwarecore_i5-10310u_firmwarecore_i5-8400_firmwarexeon_e-2234_firmwarecore_i7-10870hxeon_silver_4215r_firmwarecore_i7-10510uxeon_w-1290pcore_i7-7920hq_firmwarecore_i5-8310ycore_i5-10500h_firmwarexeon_d-1523n_firmwarecore_i3-10300_firmwarexeon_d-2183it_firmwarexeon_w-3245xeon_e-2324gxeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_w-3345xeon_e-2186m_firmwarexeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500xeon_platinum_8351nxeon_gold_6354_firmwarexeon_e5-1650_v4_firmwarecore_i7-8850hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarexeon_e3-1240_v6_firmwarexeon_d-1622_firmwarexeon_w-11865mrecore_i3-10100_firmwarexeon_platinum_8352y_firmwarecore_i9-10900texeon_platinum_8260y_firmwarexeon_platinum_8358core_i5-1030g4_firmwarecore_i5-9500fxeon_e3-1501l_v6core_i3-10100yxeon_e7-8867_v4xeon_e-2378core_i7-7820xcore_i7-3970x_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2699r_v4_firmwarexeon_gold_5317_firmwarecore_i7-7800xcore_i5-9400hxeon_platinum_8253xeon_gold_6252nxeon_e7-8894_v4core_i3-9320xeon_platinum_8280core_i7-10700f_firmwarecore_i3-10100t_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarecore_i3-10105xeon_silver_4309y_firmwarecore_i7-4940mxxeon_gold_6246core_i9-10900kf_firmwarexeon_e5-4610_v4_firmwarexeon_e5-1630_v4core_i7-8550uxeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i9-10940xcore_i7-9700xeon_e3-1270_v6xeon_w-3265m_firmwarexeon_d-1577_firmwarecore_i7-9850hexeon_platinum_8360hlcore_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwarexeon_d-1748texeon_gold_5315y_firmwarecore_i5-7500txeon_silver_4310txeon_d-2187ntxeon_d-1518xeon_gold_5318hcore_i3-1000g1xeon_w-2225xeon_gold_5320_firmwarecore_i7-3820_firmwarexeon_e-2276mexeon_silver_4210t_firmwarecore_i5-7y54xeon_gold_5218t_firmwarecore_i7-6950xxeon_e5-4620_v4core_i5-7400core_i7-8700b_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarecore_i3-10305t_firmwarexeon_w-10855m_firmwarecore_i9-10850k_firmwarecore_i7-7660u_firmwarecore_i5-8365ue_firmwarexeon_e5-2698_v4xeon_platinum_8352score_i7-7920hqxeon_d-1718tcore_i7-10700xeon_d-1533ncore_i3-7020uxeon_w-2195xeon_e-2136core_i5-9300hfcore_i3-8145u_firmwarexeon_w-1270pcore_i5-8600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rxeon_platinum_9282core_i5-10400core_i3-7020u_firmwarexeon_d-2161ixeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarexeon_silver_4215_firmwarexeon_d-2123itcore_i5-8365uecore_i3-8109ucore_i7-4960x_firmwarexeon_bronze_3206rxeon_gold_6346xeon_d-1722nexeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarexeon_gold_5220core_i5-8350uxeon_platinum_8256_firmwarexeon_e3-1275_v5core_i7-8750h_firmwarexeon_e5-4610_v4core_i3-10100texeon_e3-1558l_v5_firmwarecore_i5-10210u_firmwarecore_i3-8140u_firmwarexeon_d-1537_firmwarexeon_d-2796te_firmwarecore_i5-7y57xeon_w-3375_firmwarecore_i3-9300_firmwarecore_i7-3920xmxeon_gold_6330hcore_i5-7260uxeon_d-1540_firmwarecore_i5-10600k_firmwarexeon_e7-8890_v4_firmwarecore_i5-8259u_firmwarexeon_e5-2683_v4_firmwarexeon_e-2124core_i7-9750hcore_i3-10110y_firmwarexeon_e-2186g_firmwarexeon_d-1553n_firmwarecore_i9-7980xe_firmwarexeon_platinum_8368xeon_w-1270te_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarexeon_d-2798ntcore_i5-10600xeon_e3-1240l_v5_firmwarecore_i5-10500_firmwarexeon_w-2245_firmwarexeon_e3-1260l_v5core_i5-10310yxeon_d-1736core_i5-10310y_firmwarexeon_d-2738xeon_d-1567_firmwarecore_i5-8259uxeon_e-2388g_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_e-2336xeon_gold_6246_firmwarexeon_e3-1225_v5xeon_platinum_8260_firmwarexeon_e-2286mcore_i9-9880hcore_i7-8705g_firmwarecore_i7-4930mx_firmwarexeon_gold_6244_firmwarexeon_d-1722ne_firmwarecore_i5-1035g4core_i7-8650ucore_i5-10200hcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220txeon_e-2324g_firmwarecore_i7-7600uxeon_gold_6244xeon_w-3223_firmwarexeon_gold_6242rcore_i5-1035g7_firmwarecore_i3-7100exeon_w-2275xeon_w-3175x_firmwarecore_i7\+8700_firmwarexeon_w-2265core_i5-9500xeon_e3-1535m_v6core_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_d-1714xeon_gold_5218b_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_gold_6248_firmwarecore_i7-9750hfxeon_e3-1501m_v6_firmwarexeon_d-2141icore_i7-3920xm_firmwarecore_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e-2176g_firmwarecore_i5-1035g7xeon_gold_6326xeon_e-2254mlcore_i5-8305gcore_i3-9350kcore_i5-7400txeon_gold_6348core_i7-8750hxeon_w-2145_firmwarecore_i3-10100e_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i5-8300hcore_i9-7940x_firmwarecore_i3-7101te_firmwarexeon_d-2712txeon_e5-2650l_v4_firmwarecore_i5-9500e_firmwarecore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i5-9500texeon_w-1290e_firmwarexeon_d-1520core_i5-7y54_firmwarexeon_d-2187nt_firmwarexeon_w-1390p_firmwarexeon_e3-1280_v6_firmwarecore_i9-10900f_firmwarexeon_w-11955m_firmwarexeon_platinum_8280lcore_m3-8100yxeon_platinum_8356hxeon_gold_6338t_firmwarecore_i5-7267ucore_i3-7100uxeon_d-1543ncore_i5-7260u_firmwarexeon_e7-8867_v4_firmwarexeon_gold_5318y_firmwarecore_i5-7300u_firmwarexeon_d-1732texeon_d-1520_firmwarexeon_platinum_9242xeon_e5-4660_v4_firmwarexeon_e5-2680_v4core_i7-10700e_firmwarecore_i3-9100te_firmwarexeon_e5-2660_v4_firmwarecore_i3-7300tcore_i5-8210yxeon_e5-2687w_v4core_i7-1060g7core_i7-8565u_firmwarexeon_w-11855m_firmwarecore_i7-5820kxeon_platinum_8352m_firmwarecore_i7-9700_firmwarecore_i7-7700tcore_i7-6900kcore_i9-9980xexeon_platinum_9282_firmwarexeon_gold_6250xeon_d-1713ntecore_i3-9350kfxeon_w-1290txeon_d-1739core_i7-8809gxeon_gold_6226core_i3-10105_firmwarecore_i7-8650u_firmwarexeon_d-1577xeon_d-1735trxeon_silver_4214_firmwarexeon_platinum_8268_firmwarecore_i7-10850h_firmwarexeon_e3-1535m_v5_firmwarexeon_e-2314xeon_e5-2690_v4_firmwarecore_i7-8700_firmwarecore_i3-7350kcore_i3-8300_firmwarecore_i5-10505xeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_w-2255core_i9-10900x_firmwarecore_i5-7600kcore_m3-7y30_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_d-1746ter_firmwarexeon_w-11865mle_firmwarecore_i3-1000g4_firmwarexeon_gold_6330_firmwarecore_i5-8350u_firmwarexeon_e-2276g_firmwarexeon_d-1627_firmwarexeon_d-1733ntxeon_gold_5218xeon_w-2145xeon_gold_6338_firmwarecore_i7-4940mx_firmwarecore_i3-9100fxeon_w-1250_firmwarecore_i5-7500t_firmwarexeon_d-1653n_firmwarecore_i9-10900fxeon_w-3225_firmwarexeon_e3-1245_v6xeon_e-2378gcore_i5-10200h_firmwarecore_i3-8100txeon_gold_6238r_firmwarecore_i5-9500txeon_platinum_8352yxeon_w-3223xeon_e5-2643_v4xeon_e3-1268l_v5_firmwarexeon_e-2276gxeon_gold_6222vcore_i7-10700fxeon_e5-1620_v4_firmwarexeon_d-1571core_i5-9600k_firmwarexeon_gold_6238t_firmwarexeon_e5-2620_v4_firmwarexeon_platinum_8353h_firmwarexeon_gold_5217_firmwareIntel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33122
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 26.26%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i3-9100ecore_i7-12800h_firmwarecore_i3-10100core_i5-11600_firmwarecore_i5-1038ng7core_i5-10400t_firmwarecore_i5-11400core_i9-9900kscore_i7-10510ycore_i7-12650hcore_i7-10710u_firmwarecore_i9-11900_firmwareceleron_n4020_firmwareceleron_n4120core_i3-10100_firmwarecore_i9-10900_firmwarecore_i5-11600kcore_i5-1155g7_firmwarexeon_e-2374gcore_i9-10900tecore_i5-1030g4_firmwarecore_i7-9700k_firmwarecore_i5-1235ucore_i5-9500fcore_i3-10100ycore_i3-9300t_firmwarecore_i5-11260hcore_i5-9500t_firmwarexeon_e-2378core_i3-1115g4ecore_i5-10600tcore_i5-10600kf_firmwarexeon_e-2374g_firmwarecore_i5-9500te_firmwarecore_i7-10875h_firmwarexeon_e-2386g_firmwarecore_i5-9400hcore_i9-10900e_firmwareceleron_n4505core_i9-9900kf_firmwarecore_i3-9320core_i9-11900kfcore_i5-10600t_firmwarecore_i7-11700k_firmwarecore_i5-10300h_firmwarecore_i3-1120g4_firmwarecore_i9-10900tcore_i5-1230ucore_i3-10100t_firmwarecore_i7-10700f_firmwarecore_i5-10500t_firmwarecore_i7-10700tecore_i5-10600_firmwarecore_i9-10900kcore_i3-10105core_i5-9400t_firmwarecore_i5-1140g7_firmwarecore_i5-11400tcore_i3-1215uceleron_n4020core_i7-11700kcore_i5-11400fcore_i9-10900kf_firmwarecore_i5-10400tcore_i5-12600h_firmwarexeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i7-1185g7core_i7-9700kfcore_i9-9880h_firmwarecore_i7-9700xeon_e-2334_firmwarecore_i7-9850hecore_i7-1260ucore_i9-11980hk_firmwarecore_i7-10700kfcore_i7-9850hl_firmwarecore_i7-12850hx_firmwarecore_i7-12800hx_firmwarecore_i9-10900te_firmwareceleron_n4100_firmwarexeon_w-1370p_firmwarecore_i9-11900kcore_i5-10500hcore_i5-11600kf_firmwarecore_i9-12900hkcore_i7-1065g7core_i5-12450hcore_i5-10600kfcore_i3-1000g1core_i5-1130g7_firmwarecore_i7-10700_firmwarecore_i5-1035g1_firmwarecore_i3-1005g1core_i7-1068ng7core_i5-1038ng7_firmwarecore_i9-11900h_firmwarecore_i7-1185gre_firmwarexeon_e-2356g_firmwarecore_i5-9400f_firmwarecore_i3-10305t_firmwarecore_i5-11500he_firmwarecore_i3-1220pcore_i5-9400fcore_i3-10100ecore_i5-11320h_firmwarecore_i9-12900hxcore_i7-10700kf_firmwarecore_i9-10850k_firmwarecore_i5-9500f_firmwarecore_i7-12650h_firmwarecore_i7-11600hcore_i7-9700tcore_i7-10700core_i7-1270p_firmwarecore_i5-1135g7_firmwarecore_i5-11600kfcore_i5-9600t_firmwarecore_i9-11950h_firmwarecore_i7-1265u_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i3-1115g4_firmwarecore_i5-10500e_firmwarecore_i5-1145grecore_i5-11600k_firmwarecore_i5-1135g7core_i5-9300hfxeon_e-2378_firmwarecore_i3-1115g4core_i5-9600kfcore_i5-10400core_i3-9300core_i3-11100he_firmwarecore_i7-10870h_firmwarecore_i3-1120g4core_i5-1155g7core_i3-9300tcore_i7-9700kcore_i5-12500h_firmwarecore_i5-1245u_firmwarecore_i5-11400hcore_i7-11700kf_firmwarecore_i9-11900hcore_i7-12650hx_firmwarecore_i9-12900hk_firmwarecore_i7-9700t_firmwarecore_i7-1185g7ecore_i3-1110g4core_i7-1250u_firmwarecore_i7-10810ucore_i3-10300tpentium_silver_n6000_firmwarecore_i5-1235u_firmwarecore_i5-1130g7core_i7-10700te_firmwarecore_i7-10700exeon_e-2378g_firmwarecore_i9-11900core_i5-9600kcore_i3-10100tecore_i7-10700tcore_i9-9900kfceleron_n4000_firmwarexeon_e-2388gcore_i5-10210u_firmwarecore_i5-1240p_firmwarecore_i7-11390hcore_i7-9700te_firmwarecore_i9-12900hx_firmwarecore_i7-9700kf_firmwarecore_i5-1145g7core_i3-9300_firmwarecore_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kcore_i3-10100te_firmwarexeon_w-1390_firmwarecore_i7-1160g7_firmwarecore_i5-10600k_firmwarecore_i9-10900ecore_i3-9100core_i7-9750hcore_i3-10110y_firmwarepentium_silver_n6005core_i7-11850h_firmwarecore_i7-12850hxcore_i9-11980hkcore_i7-9700f_firmwarecore_i9-11900fcore_i5-10500tecore_i5-10210y_firmwarecore_i5-11500core_i9-11950hcore_i7-11700core_i7-12800hxcore_i5-10500tcore_i5-10600core_i7-1195g7core_i5-10310ucore_i9-10885hcore_i5-12450hxceleron_n4500core_i5-10500_firmwarecore_i7-1265ucore_i5-10310ycore_i5-9500_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_i7-1165g7core_i5-11400_firmwarecore_i7-11850heceleron_n5105_firmwarecore_i3-1215u_firmwarecore_i3-9100tecore_i5-10310y_firmwarecore_i5-12450hx_firmwarecore_i7-10750h_firmwarecore_i5-9300hf_firmwarecore_i5-11500t_firmwarexeon_e-2388g_firmwarecore_i3-1115gre_firmwarecore_i5-1145g7ecore_i7-10700kxeon_e-2336core_i5-1030g7core_i5-1230u_firmwarecore_i5-12450h_firmwarecore_i9-10980hkcore_i7-12650hxcore_i5-11600t_firmwarecore_i9-9880hcore_i3-1000g1_firmwarecore_i5-1240ucore_i7-10700k_firmwarecore_i9-10900t_firmwarecore_i3-9350k_firmwarecore_i7-11370hcore_i5-11400f_firmwarecore_i3-10305_firmwareceleron_n4100core_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i5-11500hcore_i7-1185g7_firmwarecore_i5-1035g4core_i5-11600tcore_i7-11800h_firmwarecore_i7-1180g7_firmwarecore_i7-1280pcore_i9-12950hx_firmwarecore_i7-1060g7_firmwarecore_i7-1068ng7_firmwarecore_i5-9600tcore_i9-11900t_firmwarecore_i5-10200hcore_i9-9900kcore_i3-1110g4_firmwarecore_i3-1210u_firmwareceleron_n4000core_i5-10400fxeon_e-2324g_firmwarecore_i7-1160g7xeon_w-1370core_i5-9600core_i5-1035g7_firmwarecore_i5-9400_firmwarecore_i5-9500core_i9-9900core_i9-12950hxcore_i7-9850hlcore_i3-10320_firmwarecore_i7-1260u_firmwarecore_i7-11850he_firmwarecore_i7-9750hfcore_i7-1180g7xeon_w-1370pcore_i3-10320core_i3-10110ycore_i5-1245ucore_i5-1035g7core_i5-9300h_firmwarecore_i3-10105fcore_i7-1255u_firmwarexeon_w-1390t_firmwarecore_i3-9350kxeon_w-1390core_i7-11700t_firmwarecore_i7-10875hcore_i3-1115grecore_i5-11600core_i7-11700fcore_i7-1195g7_firmwarecore_i3-11100hecore_i5-10400hceleron_n5105core_i7-1270pcore_i5-9600kf_firmwarecore_i3-10100e_firmwarecore_i3-10305tcore_i5-10505_firmwarecore_i3-9350kf_firmwarexeon_w-1370_firmwarepentium_silver_n6005_firmwarecore_i5-1240u_firmwarecore_i5-10600kcore_i9-9900t_firmwarecore_i5-9500e_firmwarecore_i5-9600_firmwarecore_i7-9700e_firmwarecore_i7-1255ucore_i7-9700ecore_i9-11900kf_firmwarecore_i5-12600hcore_i7-10850hcore_i5-10500core_i7-9700tecore_i3-1005g1_firmwarecore_i5-9500tecore_i3-9100hl_firmwarecore_i5-10500te_firmwarecore_i7-12700hcore_i3-10300t_firmwarecore_i5-1145g7e_firmwarecore_i3-10105tcore_i9-9900k_firmwarecore_i5-11300hcore_i7-10510u_firmwarexeon_w-1390p_firmwarecore_i3-1000g4core_i3-10105t_firmwarecore_i5-10400h_firmwarepentium_silver_n6000core_i3-10100f_firmwarecore_i9-10900f_firmwarecore_i3-9100hlcore_i7-11390h_firmwarecore_i9-10900kfcore_i5-12600hxcore_i3-10100tcore_i9-9980hk_firmwarecore_i3-9100f_firmwarecore_i7-12700h_firmwarecore_i7-1280p_firmwarecore_i3-9320_firmwarecore_i9-9980hkcore_i5-11500hecore_i5-12500hcore_i7-11700txeon_w-1390tcore_i5-1035g4_firmwarecore_i7-10700e_firmwarecore_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i3-1220p_firmwarecore_i7-9850h_firmwarecore_i3-9100te_firmwarecore_i5-1030g7_firmwarecore_i7-11700_firmwarecore_i7-11375hcore_i5-9500ecore_i7-1185g7e_firmwarecore_i5-11500tcore_i9-11900tcore_i5-11260h_firmwarecore_i5-9400h_firmwarecore_i9-12900h_firmwarecore_i5-10400f_firmwareceleron_n4120_firmwarecore_i7-11600h_firmwarecore_i7-1060g7core_i5-11400h_firmwarecore_i5-9400core_i7-1185grecore_i5-11400t_firmwarecore_i7-9750h_firmwarecore_i3-10325core_i7-10700t_firmwarexeon_e-2356gcore_i9-9900tcore_i7-9700_firmwarexeon_e-2336_firmwarecore_i5-1145gre_firmwarecore_i3-9350kfceleron_n5100core_i3-10105f_firmwarecore_i3-1210ucore_i3-10105_firmwarecore_i5-11320hxeon_e-2334core_i7-9850hxeon_w-1350core_i3-10110u_firmwarecore_i7-10850h_firmwarexeon_e-2314core_i3-10305core_i5-1035g1celeron_n4505_firmwarecore_i7-11850hcore_i7-9850he_firmwarecore_i9-11900f_firmwarexeon_e-2314_firmwarexeon_w-1390pcore_i3-10110ucore_i7-1250ucore_i3-9100_firmwarecore_i9-10885h_firmwarecore_i5-10505core_i5-1250p_firmwareceleron_n4500_firmwarecore_i3-10100y_firmwarecore_i3-9100e_firmwarecore_i5-11500_firmwarecore_i5-12600hx_firmwarecore_i7-10710uxeon_w-1350pcore_i5-10210ycore_i9-10900core_i3-1000g4_firmwarecore_i5-9400tcore_i7-1065g7_firmwareceleron_n5100_firmwarecore_i5-10300hcore_i7-1165g7_firmwarecore_i9-12900hcore_i5-1145g7_firmwarecore_i9-9900ks_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i3-10300core_i7-11375h_firmwarecore_i3-9100fcore_i7-11700f_firmwarecore_i3-1125g4_firmwarecore_i9-10900fcore_i3-1125g4core_i5-10310u_firmwarecore_i5-1030g4xeon_e-2378gcore_i5-10200h_firmwarecore_i9-10980hk_firmwarecore_i5-11500h_firmwarecore_i7-10870hcore_i5-1240pcore_i5-9500tcore_i3-10100fcore_i7-10510ucore_i5-10400_firmwarecore_i9-9900_firmwarecore_i7-12800hcore_i3-10300_firmwarecore_i5-10500h_firmwarecore_i7-9750hf_firmwarexeon_e-2324gcore_i5-1250pcore_i7-9700fcore_i7-10700fcore_i3-1115g4e_firmwarecore_i5-10210ucore_i5-9600k_firmwarecore_i9-10900k_firmwarecore_i3-9100tcore_i5-11300h_firmwareIntel(R) Processors
CVE-2021-33092
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.40%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:47
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit HID Event Filter driver pack before version 2.2.1.383 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_hid_event_filter_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit HID Event Filter driver pack
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33095
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.82%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:52
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unquoted search path in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_keyboard_led_service_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2023-29494
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 8.53%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-18 Oct, 2024 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in BIOS firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/abios_firmwareIntel Corporation
Product-nuc_11_pro_kit_nuc11tnhi3_firmwarenuc_11_pro_kit_nuc11tnki70znuc_11_pro_kit_nuc11tnki3_firmwarenuc_11_pro_kit_nuc11tnhi3nuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_board_nuc11tnbi30z_firmwarenuc_11_pro_board_nuc11tnbi5nuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_11_pro_board_nuc11tnbi3nuc_11_pro_board_nuc11tnbi70z_firmwarenuc_11_pro_kit_nuc11tnhi30znuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_11_pro_kit_nuc11tnhi30lnuc_11_pro_board_nuc11tnbi70znuc_11_pro_kit_nuc11tnhi70qnuc_11_pro_kit_nuc11tnhi30pnuc_11_pro_board_nuc11tnbi50z_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_11_pro_kit_nuc11tnhi70z_firmwarenuc_11_pro_kit_nuc11tnki30znuc_11_pro_kit_nuc11tnhi30z_firmwarenuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_pro_kit_nuc11tnhi5nuc_11_pro_kit_nuc11tnki5_firmwarenuc_11_pro_kit_nuc11tnhi70znuc_11_pro_kit_nuc11tnhi50wnuc_11_pro_kit_nuc11tnki50z_firmwarenuc_11_pro_kit_nuc11tnki50znuc_11_pro_kit_nuc11tnhi70q_firmwarenuc_11_pro_kit_nuc11tnki5nuc_11_pro_board_nuc11tnbi30znuc_11_pro_kit_nuc11tnki30z_firmwarenuc_11_pro_kit_nuc11tnhi7nuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_pro_kit_nuc11tnhi50z_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnhi50lnuc_11_pro_kit_nuc11tnki7nuc_11_pro_board_nuc11tnbi7nuc_11_pro_kit_nuc11tnhi50w_firmwarenuc_11_pro_kit_nuc11tnhi30l_firmwarenuc_11_pro_kit_nuc11tnki3nuc_11_pro_board_nuc11tnbi50znuc_11_pro_kit_nuc11tnhi70lnuc_11_pro_kit_nuc11tnhi50znuc_11_pro_kit_nuc11tnki70z_firmwarenuc_11_pro_board_nuc11tnbi3_firmwareIntel(R) NUCsintel_r_nucs
CWE ID-CWE-20
Improper Input Validation
CVE-2020-24452
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.17%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:46
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) SGX Platform Software for Windows* may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-sgx_platformIntel(R) SGX Platform Software for Windows*
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22449
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 6.76%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-09 Oct, 2024 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_pro_board_nuc12wsbi70znuc_13_extreme_compute_element_nuc13sbbi9_firmwarenuc_laptop_kit_lapkc51e_firmwarenuc_pro_board_nuc11tnhv50lnuc_12_compute_element_elm12hbc_firmwarenuc_pro_ki_nuc11tnkv5_firmwarenuc_pro_kit_nuc12wshi30l_firmwarenuc_pro_mini_pc_nuc11tnkv50z_firmwarenuc_laptop_kit_lapkc71e_firmwarenuc_13_extreme_kit_nuc13rngi7nuc_13_extreme_compute_element_nuc13sbbi5nuc_laptop_kit_lapbc710_firmwarenuc_pro_ki_nuc11tnkv50znuc_pro_board_nuc12wshi7nuc_pro_board_nuc12wsbi5_firmwarenuc_11_performance_mini_pc_nuc11pahi3nuc_pro_ki_nuc11tnbv7nuc_pro_board_nuc12wshi70z_firmwarenuc_pro_board_nuc12wski70z_firmwarenuc_boards_nuc11tnhi70l_firmwarenuc_13_extreme_compute_element_nuc13sbbi7fnuc_boards_nuc11tnbi30z_firmwarenuc_pro_mini_pc_nuc11tnkv7_firmwarenuc_11_performance_mini_pc_nuc11paki3nuc_13_extreme_compute_element_nuc13sbbi5_firmwarenuc_pro_ki_nuc11tnkv50z_firmwarenuc_11_performance_mini_pc_nuc11paki7_firmwarenuc_laptop_kits_lapac71g_firmwarenuc_11_performance_kit_nuc11pahi30znuc_pro_board_nuc12wsbi50z_firmwarenuc_11_performance_kit_nuc11pahi30z_firmwarenuc_11_compute_element_cm11ebc4w_firmwarenuc_pro_board_nuc12wshi30z_firmwarenuc_boards_nuc11tnbi50znuc_boards_nuc11tnhi70znuc_pro_kit_nuc12wsbi5_firmwarenuc_essential_nuc11atbc4_firmwarenuc_pro_mini_pc_nuc11tnbv7nuc_boards_nuc11tnki30z_firmwarenuc_pro_kit_nuc12wsbi70znuc_pro_board_nuc11tnkv50znuc_boards_nuc11tnki30znuc_pro_kit_nuc12wsbi5nuc_enthusiast_nuc12snki72nuc_boards_nuc11tnki50z_firmwarenuc_11_performance_mini_pc_nuc11paki3_firmwarenuc_extreme_nuc12dcmi9_firmwarenuc_11_performance_mini_pc_nuc11pahi7nuc_13_extreme_kit_nuc13rngi7_firmwarenuc_enthusiast_nuc12snki72vanuc_boards_nuc11tnki50znuc_pro_kit_nuc12wshi50znuc_pro_ki_nuc11tnhv7nuc_pro_board_nuc11tnbv7_firmwarenuc_pro_kit_nuc12wski50z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qanuc_boards_nuc11tnki5nuc_pro_board_nuc12wski7nuc_essential_nuc11atkc2nuc_boards_nuc11tnhi50znuc_pro_board_nuc12wsbi3nuc_boards_nuc11tnbi5_firmwarenuc_11_performance_mini_pc_nuc11paki7nuc_boards_nuc11tnki7nuc_pro_board_nuc12wsbi70z_firmwarenuc_laptop_kit_lapbc710nuc_11_performance_mini_pc_nuc11pahi7_firmwarenuc_pro_kit_nuc12wshi30znuc_11_performance_kit_nuc11paqi50wanuc_pro_mini_pc_nuc11tnhv5_firmwarenuc_13_extreme_compute_element_nuc13sbbi7_firmwarenuc_laptop_kit_lapkc71fnuc_11_performance_mini_pc_nuc11pahi50znuc_pro_mini_pc_nuc11tnhv70lnuc_11_performance_kit_nuc11pahi3_firmwarenuc_pro_board_nuc12wsbi30znuc_essential_nuc11atkc2_firmwarenuc_laptop_kit_lapbc510_firmwarenuc_pro_ki_nuc11tnhv70l_firmwarenuc_boards_nuc11tnki3_firmwarenuc_11_compute_element_cm11ebi58wnuc_boards_nuc11tnbi30znuc_13_extreme_kit_nuc13rngi9_firmwarenuc_11_performance_mini_pc_nuc11pahi70z_firmwarenuc_12_compute_element_elm12hbcnuc_essential_nuc11atkpenuc_boards_nuc11tnhi30l_firmwarenuc_11_performance_mini_pc_nuc11pahi70znuc_boards_nuc11tnhi30z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_boards_nuc11tnhi3nuc_pro_board_nuc12wshi5_firmwarenuc_laptop_kit_lapkc51enuc_11_performance_kit_nuc11pahi50znuc_pro_board_nuc12wshi30lnuc_pro_kit_nuc12wsbi3nuc_boards_nuc11tnhi50z_firmwarenuc_boards_nuc11tnhi7_firmwarenuc_pro_board_nuc11tnbv5nuc_laptop_kit_laprc710_firmwarenuc_pro_board_nuc12wshi3nuc_pro_board_nuc12wsbi50znuc_pro_board_nuc11tnhv7_firmwarenuc_pro_kit_nuc12wski70z_firmwarenuc_essential_nuc11atkc4nuc_11_performance_mini_pc_nuc11pahi50z_firmwarenuc_13_extreme_kit_nuc13rngi9nuc_11_compute_element_cm11ebi38w_firmwarenuc_11_performance_kit_nuc11paki3_firmwarenuc_11_performance_mini_pc_nuc11pahi5nuc_pro_kit_nuc12wski7nuc_12_compute_element_elm12hbi3nuc_pro_ki_nuc11tnhv5_firmwarenuc_boards_nuc11tnki70znuc_11_compute_element_cm11ebi38wnuc_boards_nuc11tnhi3_firmwarenuc_13_extreme_compute_element_nuc13sbbi7f_firmwarenuc_12_compute_element_elm12hbi5nuc_pro_board_nuc12wshi7_firmwarenuc_11_performance_kit_nuc11paki7nuc_pro_ki_nuc11tnbv5nuc_11_performance_kit_nuc11pahi70znuc_pro_ki_nuc11tnhv5nuc_pro_board_nuc11tnkv5_firmwarenuc_boards_nuc11tnbi7_firmwarenuc_boards_nuc11tnhi50lnuc_pro_kit_nuc12wski7_firmwarenuc_boards_nuc11tnhi30p_firmwarenuc_pro_mini_pc_nuc11tnhv7_firmwarenuc_boards_nuc11tnki7_firmwarenuc_boards_nuc11tnhi70q_firmwarenuc_pro_board_nuc12wski5_firmwarenuc_pro_kit_nuc12wski30znuc_laptop_kit_lapkc71enuc_pro_board_nuc12wshi50znuc_11_performance_mini_pc_nuc11paki5nuc_11_compute_element_cm11ebi716wnuc_extreme_nuc12dcmi7_firmwarenuc_pro_board_nuc12wshi30znuc_pro_ki_nuc11tnhv70lnuc_pro_kit_nuc12wski70znuc_pro_board_nuc12wski3_firmwarenuc_pro_mini_pc_nuc11tnkv5_firmwarenuc_pro_kit_nuc12wshi5_firmwarenuc_12_extreme_compute_element_nuc12dcmi9_firmwarenuc_laptop_kit_laprc510_firmwarenuc_pro_board_nuc11tnhv50l_firmwarenuc_pro_kit_nuc12wski3nuc_pro_ki_nuc11tnhv50l_firmwarenuc_pro_mini_pc_nuc11tnbv7_firmwarenuc_boards_nuc11tnki5_firmwarenuc_pro_kit_nuc12wski3_firmwarenuc_pro_kit_nuc12wsbi3_firmwarenuc_extreme_compute_element_nuc11dbbi9nuc_nuc11phki7cnuc_pro_mini_pc_nuc11tnbv5_firmwarenuc_extreme_compute_element_nuc11dbbi7nuc_11_performance_mini_pc_nuc11pahi5_firmwarenuc_13_extreme_compute_element_nuc13sbbi9fnuc_11_performance_kit_nuc11pahi3nuc_nuc11phki7c_firmwarenuc_13_extreme_compute_element_nuc13sbbi9f_firmwarenuc_pro_board_nuc11tnkv50z_firmwarenuc_11_performance_kit_nuc11pahi50z_firmwarenuc_pro_board_nuc12wshi70znuc_pro_board_nuc12wski30z_firmwarenuc_essential_nuc11atkc4_firmwarenuc_boards_nuc11tnhi50w_firmwarenuc_13_extreme_compute_element_nuc13sbbi5f_firmwarenuc_boards_nuc11tnhi70lnuc_12_extreme_compute_element_nuc12dcmi7nuc_boards_nuc11tnhi50l_firmwarenuc_extreme_nuc12dcmi7nuc_pro_board_nuc12wshi30l_firmwarenuc_boards_nuc11tnhi30znuc_extreme_nuc12edbi7_firmwarenuc_12_extreme_compute_element_nuc12edbi9_firmwarenuc_pro_kit_nuc12wsbi50znuc_11_performance_kit_nuc11paqi50wa_firmwarenuc_pro_board_nuc11tnbv5_firmwarenuc_13_extreme_kit_nuc13rngi5nuc_pro_kit_nuc12wshi7_firmwarenuc_pro_kit_nuc12wshi7nuc_laptop_kit_lapbc510nuc_extreme_compute_element_nuc11dbbi9_firmwarenuc_pro_mini_pc_nuc11tnhv50lnuc_boards_nuc11tnbi7nuc_pro_ki_nuc11tnkv7_firmwarenuc_11_performance_kit_nuc11paki5_firmwarenuc_boards_nuc11tnhi30lnuc_pro_kit_nuc12wski30z_firmwarenuc_pro_ki_nuc11tnbv5_firmwarenuc_pro_ki_nuc11tnkv7nuc_essential_nuc11atkpe_firmwarenuc_pro_board_nuc12wsbi3_firmwarenuc_pro_kit_nuc12wshi5nuc_pro_board_nuc12wski50z_firmwarenuc_extreme_compute_element_nuc11btmi7nuc_extreme_nuc12edbi7nuc_pro_kit_nuc12wski5nuc_boards_nuc11tnhi7nuc_pro_mini_pc_nuc11tnhv7nuc_11_performance_kit_nuc11pahi5_firmwarenuc_pro_board_nuc12wski3nuc_12_extreme_compute_element_nuc12edbi7_firmwarenuc_12_compute_element_elm12hbi5_firmwarenuc_pro_kit_nuc12wshi50z_firmwarenuc_pro_mini_pc_nuc11tnbv5nuc_pro_board_nuc11tnkv7_firmwarenuc_boards_nuc11tnbi50z_firmwarenuc_11_performance_kit_nuc11paki3nuc_12_compute_element_elm12hbi7nuc_13_extreme_compute_element_nuc13sbbi5fnuc_pro_kit_nuc12wshi3nuc_11_performance_mini_pc_nuc11pahi30z_firmwarenuc_boards_nuc11tnhi70z_firmwarenuc_11_performance_kit_nuc11paqi70qanuc_pro_board_nuc11tnkv7nuc_nuc11phki7caa_firmwarenuc_pro_board_nuc12wski30znuc_boards_nuc11tnbi3_firmwarenuc_boards_nuc11tnhi5nuc_pro_ki_nuc11tnhv50lnuc_pro_board_nuc11tnhv5_firmwarenuc_11_performance_mini_pc_nuc11pahi3_firmwarenuc_pro_ki_nuc11tnhv7_firmwarenuc_extreme_nuc12dcmi9nuc_boards_nuc11tnhi50wnuc_13_extreme_compute_element_nuc13sbbi9nuc_boards_nuc11tnbi70z_firmwarenuc_pro_ki_nuc11tnbv7_firmwarenuc_extreme_compute_element_nuc11btmi9_firmwarenuc_enthusiast_nuc12snki72va_firmwarenuc_pro_mini_pc_nuc11tnhv5nuc_boards_nuc11tnki3nuc_pro_board_nuc12wski50znuc_11_performance_kit_nuc11paqi70qa_firmwarenuc_11_performance_mini_pc_nuc11paqi50wanuc_boards_nuc11tnki70z_firmwarenuc_pro_kit_nuc12wsbi50z_firmwarenuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_pro_kit_nuc12wshi70z_firmwarenuc_11_performance_kit_nuc11pahi7nuc_pro_board_nuc12wski70znuc_laptop_kits_lapac71gnuc_pro_mini_pc_nuc11tnhv50l_firmwarenuc_laptop_kit_laprc510nuc_pro_board_nuc11tnbv7nuc_11_compute_element_cm11ebc4wnuc_pro_board_nuc12wski7_firmwarenuc_pro_mini_pc_nuc11tnkv5nuc_pro_kit_nuc12wshi70znuc_boards_nuc11tnhi70qnuc_extreme_nuc12edbi9nuc_laptop_kit_lapkc71f_firmwarenuc_nuc11phki7caanuc_pro_mini_pc_nuc11tnkv7nuc_pro_kit_nuc12wsbi70z_firmwarenuc_11_performance_kit_nuc11paki5nuc_extreme_compute_element_nuc11btmi9nuc_pro_board_nuc12wski5nuc_pro_board_nuc11tnkv5nuc_pro_board_nuc11tnhv70l_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc_13_extreme_compute_element_nuc13sbbi7nuc_13_extreme_kit_nuc13rngi5_firmwarenuc_11_performance_kit_nuc11pahi70z_firmwarenuc_extreme_compute_element_nuc11btmi7_firmwarenuc_boards_nuc11tnbi70znuc_12_extreme_compute_element_nuc12dcmi7_firmwarenuc_12_extreme_compute_element_nuc12edbi7nuc_laptop_kits_lapac71h_firmwarenuc_extreme_nuc12edbi9_firmwarenuc_12_compute_element_elm12hbi7_firmwarenuc_12_compute_element_elm12hbi3_firmwarenuc_extreme_compute_element_nuc11dbbi7_firmwarenuc_boards_nuc11tnbi5nuc_11_performance_mini_pc_nuc11pahi30znuc_pro_board_nuc12wsbi5nuc_pro_board_nuc11tnhv70lnuc_boards_nuc11tnhi5_firmwarenuc_pro_kit_nuc12wshi30z_firmwarenuc_laptop_kits_lapac71hnuc_11_compute_element_cm11ebi58w_firmwarenuc_pro_kit_nuc12wsbi30z_firmwarenuc_11_performance_kit_nuc11pahi5nuc_boards_nuc11tnhi30pnuc_essential_nuc11atbc4nuc_11_performance_kit_nuc11pahi7_firmwarenuc_pro_kit_nuc12wsbi30znuc_pro_board_nuc12wshi5nuc_pro_kit_nuc12wshi30lnuc_pro_ki_nuc11tnkv5nuc_pro_kit_nuc12wshi3_firmwarenuc_pro_mini_pc_nuc11tnkv50znuc_12_extreme_compute_element_nuc12dcmi9nuc_pro_kit_nuc12wski50znuc_enthusiast_nuc12snki72_firmwarenuc_boards_nuc11tnbi3nuc_pro_board_nuc12wshi3_firmwarenuc_pro_board_nuc11tnhv7nuc_11_performance_mini_pc_nuc11paki5_firmwarenuc_12_extreme_compute_element_nuc12edbi9nuc_pro_mini_pc_nuc11tnhv70l_firmwarenuc_pro_board_nuc12wshi50z_firmwarenuc_laptop_kit_laprc710nuc_pro_board_nuc12wsbi30z_firmwarenuc_pro_kit_nuc12wski5_firmwarenuc_pro_board_nuc11tnhv5Intel(R) NUC BIOS firmwarebios
CWE ID-CWE-20
Improper Input Validation
CVE-2020-24502
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.19% / 41.49%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:38
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 and before version 1.4.29.0 for Windows*, may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_e810-cqda1_for_ocp_3.0ethernet_network_adapter_e810-cqda1_for_ocpethernet_network_adapter_e810-cqda2ethernet_network_adapter_e810-xxvda2ethernet_network_adapter_e810-xxvda2_for_ocpethernet_network_adapter_e810-xxvda4ethernet_network_adapter_e810-cqda1ethernet_network_adapter_e810-xxvda2_for_ocp_3.0ethernet_network_adapter_e810_firmwareethernet_network_adapter_e810-cqda2_for_ocp_3.0Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 and
CWE ID-CWE-20
Improper Input Validation
CVE-2020-24486
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.65%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:53
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel CorporationSiemens AG
Product-xeon_platinum_8153xeon_e3-1230_v5xeon_e3-1558l_v5xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7e-series_bioscore_i7-1160g7xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-1660_v4simatic_ipc547g_firmwarexeon_e7-8891_v4xeon_platinum_8164xeon_e-2226gxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_w-2255xeon_d-1518core_i7-11700core_i7-6822eqcore_i7-6700texeon_e3-1501l_v6xeon_gold_6262vcore_i7-11370hxeon_e5-2683_v4xeon_platinum_8168core_i7-7600uxeon_e5-2608l_v4xeon_e5-2640_v3xeon_e-2224xeon_gold_5218xeon_e5-1620_v4core_i7-11850hxeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122xeon_w-2245xeon_d-1587xeon_e5-2699_v3xeon_d-2191xeon_gold_6248rcore_i7-7820hkxeon_e5-2689_v4xeon_e7-8870_v4xeon_w-1290tcore_i5-l16g7xeon_gold_6240core_i7-6970hqxeon_gold_6262xeon_platinum_8156xeon_e-2136core_i7-10510ucore_i7-1060g7xeon_w-2265xeon_e5-2667_v4xeon_platinum_8274xeon_w-10855mxeon_gold_6126fxeon_d-1539xeon_e3-1535m_v5xeon_e5-1680_v4core_i7-7700xeon_gold_5220rxeon_d-2146ntxeon_e3-1268l_v5xeon_platinum_8160fxeon_e5-2658_v3xeon_e5-4660_v4core_i7-8750hxeon_e3-1501m_v6xeon_gold_6250lxeon_gold_6210uxeon_d-2187ntxeon_platinum_8160mcore_i7-10700fxeon_d-2166ntxeon_e3-1270_v6xeon_e-2286mxeon_e3-1505m_v5core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_e5-2630l_v4xeon_w-2195xeon_e5-4667_v4xeon_e5-2628l_v4xeon_e-2276gxeon_e5-2685_v3xeon_w-1390xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622core_i7-8809gxeon_e5-4667_v3xeon_platinum_8160hcore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pxeon_silver_4208xeon_e3-1585_v5xeon_w-2104xeon_e5-2623_v4core_i7-6560uxeon_w-2123xeon_gold_5220sxeon_w-3275mxeon_platinum_9282xeon_e5-2683_v3core_i7-10700exeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-11700kfcloud_backupcore_i7-10870hxeon_e7-8867_v4xeon_bronze_3106xeon_w-2102xeon_e-2274gcore_i7-10700kxeon_e-2278gelxeon_d-1540xeon_e3-1280_v6hci_compute_node_biosxeon_e5-2698_v4xeon_platinum_8160tcore_i7-11700kxeon_d-1528xeon_silver_4214rcore_i7-6500uxeon_e5-2697_v3xeon_e5-4627_v4xeon_e-2124core_i7-10710uxeon_d-2141icore_i7-10700kfxeon_d-1541xeon_e5-2660_v4xeon_e7-4830_v4xeon_w-1250texeon_platinum_8268xeon_platinum_8176mxeon_e-2276mecore_i7-8565uxeon_gold_5222xeon_e5-2687w_v4xeon_e5-1603_v3core_i7-7560uxeon_gold_5117fxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e5-2428l_v3core_i7-6700hqxeon_e7-4809_v4xeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fxeon_gold_6132biosxeon_e5-2618l_v4xeon_w-2155xeon_gold_6137core_i7-7500ucore_i7-8550uxeon_e-2224gxeon_w-2135xeon_d-1623nxeon_w-2145xeon_e-2226gecore_i7-6650uxeon_gold_6142core_i7-10610ucore_i7-8500ycore_i7-7567uxeon_silver_4214xeon_w-1390pxeon_d-2161ixeon_silver_4210rxeon_d-1632core_i7-7820hqxeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_gold_5218bxeon_e5-2648l_v3xeon_gold_6142mxeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1240_v5xeon_e5-2650_v3xeon_gold_6222core_i7-6567uxeon_e5-2648l_v4xeon_e5-4620_v4xeon_e7-8855_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5xeon_w-1290texeon_e3-1225_v5xeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223xeon_gold_5120txeon_w-3175xxeon_gold_6134xeon_gold_6162xeon_e5-2628l_v3xeon_e-2254mexeon_w-3235core_i7-7y75xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133core_i7-6700xeon_d-1557xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6148xeon_e3-1505m_v6xeon_gold_6144xeon_gold_6140mxeon_gold_5220txeon_platinum_8276lxeon_w-2223xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_gold_6129xeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-6600ucore_i7-8706gxeon_gold_6126tcore_i7-11700fxeon_platinum_8165xeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_e-2236xeon_w-1370core_i7-10850hxeon_e5-1603_v4core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i7-8700core_i7-7700tcore_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_gold_6246core_i7-8086kxeon_w-2295core_i7-6770hqcore_i7-8700kxeon_e5-2603_v3fas_biosxeon_e-2134xeon_e5-2667_v3xeon_gold_5215xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_w-1390txeon_w-1270xeon_e3-1225_v6xeon_platinum_8284xeon_silver_4109tcore_i7-10510yxeon_e3-1240l_v5xeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5215lxeon_silver_4215rxeon_e5-2658_v4xeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_silver_4210txeon_e5-2680_v3xeon_gold_6212uxeon_e3-1205_v6core_i7-7700hqxeon_w-1270texeon_silver_4114xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5core_i7-6870hqxeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_gold_6250xeon_d-2173itcore_i7-11700txeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_w-3265mxeon_d-1627xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_5218txeon_e5-2697a_v4xeon_gold_6150xeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i7-10700core_i9-10920xxeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_gold_6126xeon_e3-1260l_v5xeon_w-1250exeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4core_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2176gxeon_gold_6142fcore_i3-l13g4core_i7-8709gxeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_e-2104gxeon_platinum_8260core_i7-8557usimatic_ipc547gcore_i7-8700txeon_platinum_9242core_i7-6820hqxeon_platinum_8280lxeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_gold_5119tcore_i7-1180g7core_i7-6700tcore_i7-6920hqxeon_gold_6246rxeon_e3-1230_v6xeon_gold_5217xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_w-3245xeon_gold_5120core_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3core_i7-10700texeon_e-2288gxeon_d-1653nxeon_gold_5220xeon_e-2234xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269yxeon_silver_4114tcore_i7-6700kxeon_gold_6240yxeon_e5-4669_v4aff_biosxeon_gold_6154xeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208uxeon_e7-8893_v4xeon_w-1290exeon_e5-1650_v3xeon_w-3275core_i7-11700bxeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633ncore_i7-7820eqxeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_e5-2695_v3xeon_gold_6248xeon_e3-1220_v6xeon_w-1370pxeon_platinum_8280xeon_e-2186mxeon_e5-1660_v3xeon_d-1520xeon_e-2176mcore_i7-6785rcore_i7-6820hkxeon_platinum_8256xeon_gold_6152core_i7-1060ng7xeon_e5-2623_v3xeon_platinum_8158xeon_e5-2658a_v3xeon_e5-2418l_v3xeon_w-1290pxeon_e-2286gxeon_gold_6222vxeon_platinum_8176xeon_gold_6242xeon_e3-1275_v6xeon_d-1531core_i7-10810uxeon_e3-1575m_v5xeon_e-2278gxeon_e5-2650_v4xeon_platinum_8260yxeon_e3-1505l_v5xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_platinum_8180mcore_i7-8850hxeon_gold_5118xeon_w-2235xeon_e5-2695_v4xeon_gold_6130fxeon_w-11955mcore_i7-6820eqxeon_gold_6134mcore_i9-10900xxeon_platinum_8276xeon_gold_6238txeon_e3-1235l_v5xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-4628l_v4xeon_e7-8860_v4xeon_w-1350xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_w-1290xeon_platinum_8176fxeon_d-1524nsolidfire_biosxeon_gold_6240rxeon_w-10885mxeon_w-2275xeon_d-1543nxeon_gold_6226xeon_e-2144gxeon_gold_6256xeon_d-1521xeon_w-1350pxeon_gold_6230rcore_i7-8569uxeon_gold_6252xeon_e5-4640_v3core_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_platinum_8170mxeon_e-2146gxeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2022-24379
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.52%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-30 Aug, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Server System M70KLP Family BIOS firmware before version 01.04.0029 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_m70klp4s2uhhserver_board_m70klp2sb_firmwareserver_system_m70klp4s2uhh_firmwareserver_board_m70klp2sbIntel(R) Server System M70KLP Family BIOS firmwareintel_server_system_m70klp_family_bios_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-24382
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_11_pro_kit_nuc11tnhi30l_firmwarenuc11dbbi7_firmwarenuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_11_pro_kit_nuc11tnki7nuc11pa_firmwarenuc8i3cysnnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_pro_board_nuc11tnbi50znuc_11_pro_kit_nuc11tnki30z_firmwarenuc_8_compute_element_cm8pcbnuc_8_compute_element_cm8pcb_firmwarelapkc71fnuc_11_pro_board_nuc11tnbi70z_firmwarenuc_11_pro_board_nuc11tnbi7nuc_11_compute_element_cm11ebc4w_firmwarenuc_11_pro_kit_nuc11tnki50znuc_11_pro_kit_nuc11tnki5nuc_kit_nuc8i5benuc8i3cysmlapbc710nuc_11_pro_kit_nuc11tnhi50znuc_8_compute_element_cm8i3cbnuc8i3cysn_firmwarenuc_kit_nuc8i5be_firmwarenuc11pahnuc_11_pro_board_nuc11tnbi30z_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_8_compute_element_cm8ccbnuc11dbbi9_firmwarenuc_11_pro_board_nuc11tnbi5nuc_9_pro_compute_element_nuc9v7qnblapbc710_firmwarelapkc51enuc_11_pro_kit_nuc11tnki3nuc_11_pro_kit_nuc11tnki70znuc_8_compute_element_cm8i7cblapkc71f_firmwarenuc_11_enthusiast_kit_nuc11phki7cnuc11panuc_11_pro_kit_nuc11tnhi70lnuc_11_pro_kit_nuc11tnhi50lnuc_8_compute_element_cm8i7cb_firmwarenuc9i9qnnuc_11_pro_board_nuc11tnbi70znuc_11_pro_kit_nuc11tnhi30znuc_11_pro_kit_nuc11tnhi50w_firmwarelapbc510_firmwarenuc_11_compute_element_cm11ebi716wnuc_11_pro_kit_nuc11tnki30znuc_kit_nuc8i3b_firmwarenuc11btmi9nuc11btmi7nuc9i7qnnuc9i7qn_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_11_pro_kit_nuc11tnhi70qnuc_11_pro_kit_nuc11tnhi70znuc9i5qn_firmwarenuc_kit_nuc8i7be_firmwarenuc_11_pro_kit_nuc11tnhi30lnuc8i3cysm_firmwarelapkc71e_firmwarenuc_11_pro_kit_nuc11tnhi30z_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnki50z_firmwarenuc11paq_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_kit_nuc8i3bnuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc11btmi9_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_11_pro_board_nuc11tnbi30znuc_11_pro_kit_nuc11tnhi3nuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_11_pro_board_nuc11tnbi3nuc_11_pro_kit_nuc11tnhi7nuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarelapbc510nuc_11_pro_kit_nuc11tnki3_firmwarenuc_8_compute_element_cm8i5cbnuc_11_pro_kit_nuc11tnhi70q_firmwarenuc11pah_firmwarenuc_8_compute_element_cm8i3cb_firmwarelapkc51e_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc11paqnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_11_pro_kit_nuc11tnki70z_firmwarenuc_9_pro_kit_nuc9v7qnxnuc_11_compute_element_cm11ebi58wnuc_11_pro_kit_nuc11tnhi5nuc_11_pro_kit_nuc11tnhi3_firmwarenuc_11_pro_board_nuc11tnbi50z_firmwarenuc_11_compute_element_cm11ebc4wnuc11dbbi9nuc11btmi7_firmwarenuc_11_pro_kit_nuc11tnhi50wnuc_kit_nuc8i7benuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_11_pro_kit_nuc11tnhi30pnuc_11_pro_kit_nuc11tnhi70z_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc9i5qnnuc11dbbi7nuc9i9qn_firmwarenuc_11_pro_kit_nuc11tnhi50z_firmwarenuc_9_pro_compute_element_nuc9vxqnblapkc71enuc_11_compute_element_cm11ebi38wIntel(R) NUCs
CWE ID-CWE-20
Improper Input Validation
CVE-2024-41167
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.03% / 8.31%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:10
Updated-19 Nov, 2024 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in UEFI firmware in some Intel(R) Server Board M10JNP2SB Family may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-m10jnp2sb_firmwarem10jnp2sbIntel(R) Server Board M10JNP2SB Familym10jnp2sb_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2020-24453
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.87%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:46
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) EPID SDK before version 8, may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-epid_software_development_kitIntel(R) EPID SDK
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28743
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.24%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-17 Jun, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel NUC BIOS firmware before version QN0073 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_9_pro_kit_nuc9v7qnbnuc_9_pro_compute_element_nuc9v7qnbnuc_9_pro_compute_element_nuc9v7qnxnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_9_pro_kit_nuc9v7qnb_firmwarenuc_pro_compute_element_nuc9v7qnx_firmwarenuc_9_pro_kit_nuc9v7qnxIntel NUC BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28374
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 25.92%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-29 Oct, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-killer_wi-fi_6e_ax1690proset\/wirelesswi-fi_6e_ax211killerkiller_wi-fi_6e_ax1675wi-fi_6e_ax411proset_wi-fi_6e_ax210Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software
CWE ID-CWE-20
Improper Input Validation
CVE-2020-24491
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.55%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:44
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Debug message containing addresses of memory transactions in some Intel(R) 10th Generation Core Processors supporting SGX may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7core_i5core_i3Intel(R) 10th Generation Core Processors supporting SGX
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28738
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.97%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-21 Oct, 2024 | 12:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel NUC BIOS firmware before version JY0070 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7cjyhn_firmwarenuc_kit_nuc7cjysalnuc_kit_nuc7cjyhnuc_kit_nuc7cjyh_firmwarenuc_kit_nuc7cjyhnnuc_kit_nuc7pjyh_firmwarenuc_kit_nuc7cjysal_firmwarenuc_kit_nuc7pjyhn_firmwarenuc_kit_nuc7pjyhnnuc_7_essential_nuc7cjysamnnuc_kit_nuc7pjyhnuc_7_essential_nuc7cjysamn_firmwareIntel NUC BIOS firmwareintel_nuc_bios_firmware
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CWE ID-CWE-20
Improper Input Validation
CVE-2020-24496
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 17.09%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:42
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the firmware for Intel(R) 722 Ethernet Controllers before version 1.4.3 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_x722-da2_firmwareethernet_network_adapter_x722-da4_firmwareethernet_network_adapter_x722-da2ethernet_network_adapter_x722-da4Intel(R) 722 Ethernet Controllers
CWE ID-CWE-20
Improper Input Validation
CVE-2024-34163
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.03% / 6.11%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-12 Sep, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) NUC may allow a privileged user to potentially enableescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_x15_laptop_kit_laprc510nuc_x15_laptop_kit_lapbc710_firmwarenuc_x15_laptop_kit_lapbc510_firmwarenuc_x15_laptop_kit_lapbc710nuc_x15_laptop_kit_lapkc51e_firmwarenuc_x15_laptop_kit_laprc710_firmwarenuc_x15_laptop_kit_lapac71hnuc_x15_laptop_kit_lapkc51enuc_x15_laptop_kit_laprc710nuc_x15_laptop_kit_lapac71gnuc_x15_laptop_kit_lapbc510nuc_x15_laptop_kit_lapkc71f_firmwarenuc_x15_laptop_kit_lapac71g_firmwarenuc_x15_laptop_kit_laprc510_firmwarenuc_x15_laptop_kit_lapac71h_firmwarenuc_x15_laptop_kit_lapkc71e_firmwarenuc_x15_laptop_kit_lapkc71fnuc_x15_laptop_kit_lapkc71eIntel(R) NUClapkc71f_firmwarelapbc710_firmwarelapkc51e_firmwarelapkc71e_firmwarelaprc510_firmwarelaprc710_firmwarelapbc510_firmwarelapac71h_firmwarelapac71g_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12207
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.39% / 59.38%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:08
Updated-05 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.

Action-Not Available
Vendor-n/aopenSUSEOracle CorporationF5, Inc.Fedora ProjectDebian GNU/LinuxIntel CorporationRed Hat, Inc.Canonical Ltd.
Product-xeon_3040xeon_l7555_firmwarexeon_e7-8893_v3xeon_e7420_firmwarexeon_e5-1620_v2_firmwarexeon_e3-1558l_v5xeon_5140_firmwarexeon_e5-2608l_v4_firmwarexeon_e5-2660_v3xeon_e5-2450_v2core_i5-1035g7xeon_e7450core_i3-8350k_firmwarecore_i3-9350k_firmwarexeon_e5-2697_v4xeon_d-1527xeon_e5472xeon_x5492_firmwarexeon_x3370_firmwarexeon_w-2125xeon_e7-8890_v3_firmwarexeon_gold_5217_firmwarexeon_e6510xeon_e3-1220_v5_firmwarexeon_e7-8880_v4xeon_e5-2620_v2_firmwarexeon_d-2163it_firmwareceleron_g1610t_firmwarexeon_l7345core_i7-9700xeon_gold_6240_firmwarexeon_gold_6234xeon_e3-1280_v5pentium_gold_g5400txeon_lc5518_firmwarecore_i5-1035g4core_i9-9920x_x-seriesxeon_d-1518xeon_w-2255xeon_e5-1680_v3_firmwarexeon_e5462xeon_e3-1285l_v4_firmwarecore_i5-9600t_firmwarecore_i7-6567u_firmwarexeon_x3380_firmwarexeon_e7-4830_v3_firmwarexeon_gold_6248_firmwareenterprise_linux_servercore_i9-7920xxeon_e5-2683_v4xeon_e5-2608l_v4xeon_e5-1660_v3_firmwarexeon_e-2224xeon_l3110_firmwarexeon_gold_5218celeron_g1830core_i9-7940x_firmwarexeon_d-1567xeon_x5680_firmwarecore_i5-8269u_firmwarecore_i5-6287u_firmwarexeon_e5420xeon_d-2173it_firmwarecore_i5-5350h_firmwarexeon_w-2245xeon_e5-2699_v3xeon_x7350_firmwarexeon_e5620_firmwarecore_i5-8700bxeon_l5215xeon_e3-1240_v5_firmwarecore_i5-5250uxeon_e5-4640_v2xeon_x5472_firmwarecore_i7-10710u_firmwarecore_i7-7820hkxeon_e5-4657l_v2xeon_l3426_firmwarecore_i7-5850hqxeon_e7-8870_v4_firmwarexeon_e3-1558l_v5_firmwarexeon_e7-8895_v2_firmwarexeon_e5-2609_v2_firmwarexeon_gold_6240core_i7-6970hqxeon_7150nceleron_g1820te_firmwarexeon_e5-2450l_v2_firmwarecore_i5-9400_firmwarexeon_e7-8893_v4_firmwarexeon_d-2177nt_firmwarecore_i7-8500y_firmwarexeon_e7-4860_v2_firmwarexeon_e5-2667_v4_firmwareceleron_g4930e_firmwarexeon_gold_5218t_xeon_e7-8893_v2xeon_gold_5220s_firmwarexeon_e5520xeon_d-1539core_m3-6y30celeron_g4900txeon_5063_firmwarexeon_e5530_firmwarexeon_w3565core_m-5y31_firmwarexeon_e3-1275_v5_firmwarexeon_x5672xeon_e3-1535m_v5xeon_x5570_firmwareceleron_g3900te_firmwarexeon_l5530_firmwarexeon_e5603xeon_e7-4809_v3xeon_gold_6230_firmwarexeon_d-2146ntceleron_g4932exeon_e5-2609_v2xeon_e3-1268l_v5xeon_7130mxeon_e3110xeon_e7-4820_v3_firmwarexeon_x3210_firmwarexeon_w-2223_firmwarexeon_e3-1260l_v5_firmwarecore_i7-8750hcore_i7-5700hq_firmwarexeon_l5630xeon_e5607_firmwarecore_i3-7100u_firmwarexeon_e5-4669_v4_firmwarexeon_x3220xeon_e5-2680_v2xeon_d-2166ntxeon_e3-1270_v6xeon_e3-1505m_v5xeon_silver_4216xeon_gold_6230xeon_e5-2403_v2_firmwarexeon_w-2195xeon_e5630_firmwareopenshift_container_platformxeon_e5-2628l_v4xeon_e7540_firmwarexeon_e-2276gcore_i5-7267u_firmwarecore_i7-5557u_firmwarexeon_d-2183itxeon_l7455_firmwarecore_i3-5020uxeon_e5-2687w_v2core_i3-7100core_i7-8809gxeon_e5-4667_v3xeon_lc3518_firmwarexeon_e7-4809_v2_firmwarecore_i5-5257ucore_m-5y70xeon_x5677xeon_e3-1230_v6_firmwarecore_i5-7267ucore_i5\+8500xeon_e5220xeon_silver_4208core_m-5y10a_firmwarexeon_e3-1585_v5xeon_l5618_firmwarexeon_e5-2667_v2_firmwarecore_i7-6560uxeon_w-2123core_i5-9400txeon_gold_5220sxeon_platinum_8280m_firmwarecore_i7-5550u_firmwarexeon_platinum_9282core_i5-8300hxeon_x3370xeon_e3-1220_v6_firmwarexeon_e5-2683_v3core_i3-10110yxeon_e5-2637_v2_firmwarexeon_platinum_9242_firmwarexeon_e3-1535m_v6_firmwarexeon_7041xeon_silver_4210xeon_platinum_8256_firmwarexeon_e5649_firmwarexeon_e5420_firmwarexeon_l5240big-ip_application_acceleration_managerxeon_e5-2618l_v4_firmwarepentium_gold_g5500txeon_e5-2650_v3_firmwarexeon_e3-1240l_v5_firmwarexeon_7150n_firmwarexeon_e5-2660_v3_firmwarexeon_platinum_8276mxeon_x3470_firmwarexeon_gold_6238mceleron_g4920xeon_e-2274gcore_i3-6167uxeon_l3360_firmwarecore_i5-9500xeon_d-1540xeon_x3470xeon_e5-1650_v2xeon_e5-2698_v4xeon_e3-1245_v5_firmwarexeon_d-1528core_i7-6500ucore_i7-6500u_firmwarexeon_x3320_firmwareceleron_g3902exeon_e5-4620_v2_firmwarexeon_e3-1280_v6_firmwarexeon_x5260xeon_gold_6230t_firmwarexeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_lv_5128_firmwaredebian_linuxxeon_l7345_firmwarecore_i3-7100h_firmwarecore_i5-8300h_firmwarexeon_silver_4208_firmwarexeon_platinum_8268xeon_e5-2650_v4_firmwarexeon_e-2136_firmwarexeon_e3-1235l_v5_firmwarexeon_e5-2690_v2_firmwarexeon_e5-1660_v2xeon_ec5539core_i7-8565uxeon_e7450_firmwarexeon_x5675xeon_e5-2630_v4_firmwarexeon_e5-2687w_v4core_i9-9980xe_firmwarexeon_l5609_firmwarexeon_e-2274g_firmwarexeon_e7340xeon_e5502_firmwarecore_i5-7300hqcore_i7-7560uxeon_e5-2695_v2_firmwarexeon_e3-1271_v3xeon_gold_6240mxeon_e5-4667_v3_firmwarepentium_gold_g5420txeon_3040_firmwarexeon_e3-1220l_v3_firmwarexeon_x3330core_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259uxeon_e5-2699a_v4_firmwarexeon_d-1529xeon_e3-1265l_v3xeon_x3230core_i9-9900x_x-series_firmwarepentium_gold_g5500xeon_w-3265m_firmwarexeon_e5-4660_v4_firmwarecore_i7-5850hq_firmwarexeon_5040_firmwarexeon_e7-4809_v4xeon_x5690_firmwarecore_i9-7900x_firmwarecore_i7-9850h_firmwarexeon_e5335_firmwarecore_i5-6350hqxeon_e5-2630l_v4_firmwarexeon_gold_5218_firmwarexeon_l7455core_i5-7600tceleron_g1630_firmwareenterprise_linux_server_tusxeon_e5-2618l_v4xeon_l5520_firmwarecore_i5-6350hq_firmwarexeon_e-2224gxeon_5070xeon_w-2135xeon_l3014xeon_l5618xeon_e3-1231_v3_firmwarexeon_x3430_firmwarexeon_l5420_firmwarecore_i5-9300hxeon_w3565_firmwarecore_i3-7167u_firmwarecore_i7-8559u_firmwarexeon_gold_5220t_firmwarecore_i7-8086k_firmwarexeon_gold_5220_firmwarecore_i5-1035g1_firmwareceleron_g1620xeon_w5590core_i5-9400hcore_i7-8500yleapxeon_x5270xeon_e5-4640_v3_firmwarexeon_x5675_firmwarexeon_e5-2680_v4_firmwarecore_i7-5557uxeon_gold_6240m_firmwarexeon_e7530xeon_e5-1630_v4_firmwarexeon_e7-8890_v2xeon_lc5528xeon_x5560xeon_e5-4603_v2_firmwarexeon_e5-2640_v2_firmwarecore_i7-7820hqxeon_e5-2620_v3core_i5-6260u_firmwarexeon_w3690xeon_7041_firmwarexeon_l5640xeon_5063core_i3-8300t_firmwarecore_i3-8109u_firmwarecore_i5-7400_firmwarexeon_gold_6254_firmwarexeon_e3-1275_v5core_i7-9700k_firmwarexeon_x5355core_i9-10980xe_firmwarexeon_e3-1240_v5xeon_e-2288g_firmwarexeon_e5-2430_v2_firmwarexeon_5060_firmwarexeon_e5-2450_v2_firmwarexeon_e5-2440_v2_firmwarexeon_e3-1230l_v3xeon_l7445_firmwarexeon_e5-2650_v3xeon_e5-2660_v2_firmwarexeon_e7430xeon_x7560core_i7-6567uxeon_e5-1650_v4_firmwarexeon_x5365core_i7-5775cxeon_e5-2683_v3_firmwarexeon_5070_firmwarexeon_lv_5133_firmwarecore_i9-7900xxeon_e7-8880_v4_firmwareceleron_g3930_firmwarecore_i7-6870hq_firmwarecore_i9-10900x_x-series_firmwarexeon_w-3223xeon_d-1539_firmwarexeon_7130nxeon_d-1559xeon_7130m_firmwarexeon_x5650xeon_w-2235_firmwareceleron_g1610tcore_i5-8265ucore_i5-6300hqxeon_x5670xeon_e5-2648l_v4_firmwarecore_i3-5157u_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarexeon_3070_firmwarexeon_e-2286g_firmwarexeon_d-2183it_firmwarexeon_e3-1220_v3core_i3-5005u_firmwareceleron_g3920_firmwarexeon_e5-4627_v3xeon_e7-4850_v4core_i3-8350kxeon_7110ncore_i5-7500txeon_e3-1505m_v6core_i3-9100core_i5-9600k_firmwarexeon_e7-4880_v2_firmwarexeon_platinum_9282_firmwarexeon_5110_firmwarexeon_e-2224g_firmwarexeon_l5238pentium_gold_g5600xeon_lv_5148_firmwarexeon_e3120xeon_platinum_8276lceleron_g4950_firmwarecore_i7-7700kcore_i7-8705gxeon_e7-4860_v2xeon_l5408_firmwarexeon_platinum_9222big-ip_policy_enforcement_managerxeon_gold_6230tcore_i7-7660uxeon_d-1627_firmwarecore_i3-6100u_firmwarecore_i7-8706gxeon_w-3225xeon_w3550_firmwarexeon_e5-2630_v2_firmwarexeon_e3-1565l_v5xeon_x5470xeon_e5-4610_v2_firmwarepentium_gold_4415u_firmwarexeon_e5-2643_v2_firmwarexeon_e3-1240_v6core_i5-8259u_firmwarexeon_w-2155_firmwarexeon_e7-4850_v3_firmwarecore_i7-8705g_firmwarecore_i3-7100tcore_i7-7700txeon_e7-2850_v2_firmwarexeon_w-3225_firmwarexeon_e5-1630_v4xeon_e5-4660_v3xeon_w-2295core_i9-9900x_x-seriescore_i5-10210ucore_i5-7260u_firmwarecore_i5-7600k_firmwarexeon_e5-2697_v3_firmwarecore_i7-6770hqxeon_e5-2407_v2core_m-5y10axeon_e3-1270_v6_firmwarexeon_gold_5215mcore_i5-7200u_firmwarecore_i7-10510u_firmwarexeon_gold_5215xeon_e5-2667_v3xeon_e7-4820_v3xeon_e5-2650_v2xeon_e-2226g_firmwarexeon_d-2143itxeon_l5238_firmwareceleron_g1610_firmwarexeon_e5405xeon_e5-2699_v4xeon_gold_6244_firmwarexeon_7140n_firmwarexeon_d-2161i_firmwarexeon_e3-1225_v6xeon_e3-1220l_v3core_i7\+8700_firmwarexeon_e5-2699_v3_firmwarexeon_e-2144g_firmwarexeon_e5-2650l_v2_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1225_v5_firmwarexeon_e3-1240l_v5xeon_e5-2690_v3celeron_g1620t_firmwareceleron_g1820_firmwarecore_i3-10110uxeon_e5-1630_v3xeon_w3520xeon_e7530_firmwarecore_i9-10940x_x-series_firmwarexeon_e7310xeon_x5680xeon_e7440xeon_e5-4650_v2_firmwarexeon_x5450_firmwarexeon_e5-2680_v3core_i5-5287u_firmwarexeon_e5-2697_v4_firmwarexeon_platinum_8280mcore_i9-7980xexeon_gold_6240l_firmwarexeon_e5-4655_v3_firmwarexeon_d-2123it_firmwareceleron_g4900t_firmwarexeon_e5502xeon_x5670_firmwarecore_i7-6870hqpentium_gold_4415yxeon_x3480xeon_gold_6238lxeon_e5-2637_v3xeon_e5-2699_v4_firmwarexeon_l5430_firmwarexeon_e7-8890_v2_firmwarecore_i9-10920x_x-seriesxeon_w3670core_i3-1005g1_firmwarexeon_e7-8880l_v3_firmwarebig-ip_advanced_firewall_managerxeon_w-3265mxeon_e5620xeon_e5645core_i5-7500xeon_d-1627xeon_l5518xeon_platinum_8260y_firmwarexeon_x3460xeon_d-1602xeon_x5270_firmwarecore_i5\+8400_firmwarexeon_e3-1270_v5_firmwarexeon_e7-8890_v4core_i5-7200uxeon_e7310_firmwarecore_i5-8350u_firmwareceleron_g1820tceleron_g3930exeon_e5-4607_v2_firmwarexeon_gold_6240y_firmwarexeon_e5-2630l_v3_firmwarexeon_e3-1535m_v5_firmwarexeon_e5-2690_v4xeon_x3230_firmwarexeon_e7-8891_v2pentium_gold_g5600_firmwarexeon_e7-4850_v2xeon_e5-2658_v4_firmwarexeon_e3-1545m_v5xeon_w3680_firmwarecore_i3-9300_firmwarecore_i5-8400txeon_e5430_firmwarexeon_d-2145nt_firmwarepentium_gold_g5600tcore_i3-5015uceleron_g3930tcore_i9-9960x_x-series_firmwarexeon_e7340_firmwarexeon_e7-4870_v2xeon_l5506_firmwarexeon_d-1541_firmwarecore_i7-5775c_firmwarecore_i7-5500uceleron_g4920_firmwarexeon_e3-1260l_v5xeon_l5310_firmwarexeon_e5240_firmwarexeon_d-1623n_firmwarexeon_l5508_firmwarecore_i3-7100hxeon_l5215_firmwarexeon_d-1548_firmwarexeon_3070xeon_e5-2690_v3_firmwarexeon_d-1559_firmwarepentium_gold_g5400_firmwarexeon_x3320xeon_e7-4809_v4_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-6287ucore_i5-1035g7_firmwarexeon_e5-2697a_v4_firmwarexeon_e5450xeon_e5-4650_v3xeon_d-1540_firmwarexeon_platinum_8260mxeon_silver_4214y_firmwarecore_i5-9400xeon_w3680core_i3-8100txeon_e5-1650_v3_firmwarexeon_platinum_8260xeon_e7210big-ip_global_traffic_managerxeon_bronze_3204_firmwarecore_i7-5550uxeon_d-2142it_firmwarexeon_e5-2470_v2core_i5-7500t_firmwarecore_i7-6820hk_firmwarexeon_e3-1280_v5_firmwarexeon_e5-2420_v2celeron_g4930t_firmwarecore_i7-8650uxeon_bronze_3204xeon_e5-4627_v3_firmwarexeon_e5-2430_v2core_m3-7y30_firmwarexeon_e5504_firmwarexeon_e7-8870_v2_firmwarecore_i7-9750h_firmwarecore_i3-6167u_firmwarecore_i3-6100uxeon_w3670_firmwarexeon_gold_5217xeon_e5-2687w_v4_firmwarepentium_gold_4415uxeon_e7330_firmwarexeon_w5580_firmwarexeon_e-2234_firmwarexeon_w5590_firmwarexeon_e3120_firmwarexeon_x5365_firmwarexeon_gold_5222_firmwarexeon_w-3245xeon_e7-4820_v4_firmwareceleron_g1850_firmwarecore_i3-10110y_firmwarecore_i5-1035g4_firmwarecore_i5-8500bxeon_x5650_firmwarexeon_d-1523ncore_i5-8269uxeon_x3440xeon_e5-4660_v3_firmwarecore_i5-6300hq_firmwarexeon_e-2288gxeon_d-1653ncore_m-5y10_firmwarecore_i7-8709g_firmwarexeon_e5-4650_v2xeon_e5-4669_v4xeon_e7220_firmwarexeon_d-1543n_firmwareceleron_g3900txeon_w-2195_firmwarexeon_w3570enterprise_managerxeon_5040xeon_l7545xeon_x5472xeon_gold_6252n_firmwarexeon_5140core_i5-10210y_firmwarexeon_e5-1650_v3xeon_e5-2630_v2core_m-5y51_firmwarecore_i3-7350kxeon_w-2265_firmwarexeon_e3-1276_v3_firmwarexeon_e7-8891_v3core_i5-8250uxeon_e5440xeon_d-1571_firmwarecore_i7-9700txeon_gold_6252nxeon_7110m_firmwarexeon_l5506xeon_gold_6244xeon_e5-2695_v3xeon_x5690core_i7-8650u_firmwarexeon_w-3245_firmwarexeon_l5318xeon_gold_6226_firmwarecore_i3-5157uxeon_5130_firmwarecore_i5-6200ucore_i7-7700k_firmwarecore_i7-6700hq_firmwarexeon_x5460_firmwarexeon_3050_firmwarexeon_w-2135_firmwarecore_i9-9940x_x-seriescore_m-5y10c_firmwareceleron_g3902e_firmwarexeon_e5-2603_v2_firmwarexeon_e5-1660_v3xeon_d-1520core_i7-6970hq_firmwarexeon_platinum_8256xeon_gold_6238l_firmwarexeon_e5-2623_v3xeon_e7-4830_v4_firmwarexeon_e5-2680_v2_firmwarexeon_e7-2890_v2xeon_x5647_firmwarexeon_d-1520_firmwarexeon_w-2125_firmwarexeon_e3-1268l_v5_firmwarexeon_w-2175_firmwarexeon_e5507xeon_e3-1241_v3_firmwarexeon_7110n_firmwarexeon_e3-1275_v6xeon_d-1531xeon_x5550core_i3-9300txeon_gold_6262v_firmwarexeon_e-2278gxeon_5120_firmwarexeon_platinum_8260yxeon_platinum_8260m_firmwarexeon_e7-8867_v3xeon_x3350_firmwarexeon_e7-8880_v2_firmwarexeon_e5-2450l_v2core_i9-9980xexeon_d-2142itcore_i5-8265u_firmwarexeon_e3-1281_v3_firmwarexeon_e3-1505m_v6_firmwarexeon_gold_5215m_firmwareceleron_g3930te_firmwarexeon_e3-1545m_v5_firmwarexeon_platinum_8276xeon_x3450_firmwarexeon_e3-1235l_v5core_i7\+8700core_i7-5700hqxeon_e5-1660_v4_firmwarexeon_e5-4628l_v4xeon_e5-4610a_v4xeon_e5-2630l_v2_firmwarecore_m3-7y30core_i3-9350kxeon_e5-2650l_v2xeon_e5-2680_v3_firmwarexeon_7120mxeon_platinum_8276m_firmwarexeon_x5672_firmwareceleron_g4950xeon_e3-1240l_v3_firmwarexeon_e7-4850_v2_firmwarecore_i7-7700t_firmwarexeon_w-3275_firmwarexeon_e7220xeon_e7-8890_v3xeon_x5660_firmwarexeon_e5-2623_v4_firmwarecore_i5-8200ycore_i9-10900x_x-seriesceleron_g3900t_firmwarexeon_e3-1285_v4_firmwarexeon_w-2275xeon_e5-2697_v2_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_l5320_firmwareceleron_g4900_firmwarecore_i5-7440hqceleron_g1620txeon_e-2144gxeon_e3-1245_v6_firmwarexeon_d-1521xeon_d-2191_firmwarexeon_e5-2637_v3_firmwareceleron_g3900eceleron_g1820tecore_i7-7700_firmwareceleron_g3950_firmwarexeon_e5-4650_v4_firmwarexeon_e5630xeon_3060_firmwarebig-ip_analyticsxeon_7020core_i5-9600tcore_m-5y31xeon_w3540_firmwarecore_i3-9320core_i7-1065g7xeon_w3550core_i3-8130uxeon_x5450xeon_platinum_8276l_firmwarexeon_e5-2650l_v3xeon_lc5518xeon_5030xeon_e5-2687w_v2_firmwarexeon_e3-1230_v5enterprise_linux_server_eusxeon_e5-1630_v3_firmwareenterprise_linux_server_auscore_i3-9100_firmwarexeon_w-3245mxeon_lv_5113_firmwareceleron_g1620_firmwarexeon_e3-1226_v3_firmwarexeon_e5430xeon_e5205_firmwarexeon_e7-8880l_v2xeon_w3530_firmwarexeon_l5408xeon_e5-1680_v3xeon_e5-2670_v2pentium_gold_g5420xeon_e5606xeon_e-2124g_firmwarepentium_gold_g5420t_firmwarecore_i5-8305g_firmwarecore_i5-7500_firmwarecore_m-5y71_firmwarexeon_e5-2690_v2xeon_e5-4610_v3xeon_e7-8870_v3xeon_x7542pentium_gold_g5420_firmwarecore_i5-7y54xeon_e5-4650_v4xeon_e5-1660_v4xeon_e7-8891_v4xeon_d-1521_firmwarexeon_l5638_firmwarexeon_e5240xeon_e5-1620_v2xeon_e-2226gxeon_e3-1226_v3xeon_d-1557_firmwarexeon_x5687_firmwarecore_i7-5500u_firmwarecore_i3-8145uxeon_e7-4820_v2_firmwarexeon_e5-1620_v3_firmwarexeon_e7-4830_v2core_i5-9600_firmwarexeon_platinum_8268_firmwarexeon_gold_6262vcore_i3-8109uxeon_e5-2609_v4_firmwarexeon_e5-2640_v3xeon_e7-8880l_v3xeon_e5-1620_v4xeon_e6540_firmwarexeon_gold_6238m_firmwarecore_i3-7300xeon_d-1567_firmwarebig-ip_application_security_managerxeon_e5-2630l_v3xeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_e-2134_firmwarexeon_silver_4210_firmwarexeon_d-2191xeon_x7460_firmwarecore_i5-8400bcore_i3-9300t_firmwarexeon_e5405_firmwarexeon_lv_5113core_i5-9500_firmwarecore_m-5y10cxeon_e5-4627_v4_firmwarepentium_gold_g5620xeon_platinum_8276_firmwarexeon_e7440_firmwarexeon_e7-8870_v4core_i5-8700b_firmwarexeon_7030xeon_e7540xeon_5060xeon_e3-1265l_v4xeon_ec5509_firmwarexeon_x5482celeron_g3930texeon_e-2136pentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kxeon_d-1533n_firmwarecore_i3-8100xeon_w-2265xeon_gold_5215_firmwarexeon_e5335xeon_e5-2667_v4xeon_7130n_firmwarexeon_e5503_firmwarexeon_e3-1285l_v4xeon_w-2245_firmwarexeon_x5470_firmwarexeon_e7-8870_v2xeon_l5410_firmwarecore_i3-7300_firmwarexeon_e7330fedoraxeon_l3406_firmwarexeon_x3430xeon_lc3528core_i5-7287u_firmwarecore_i7-7700core_m-5y10xeon_e5-1680_v4core_i7-7820hq_firmwarexeon_5110core_i7-5950hq_firmwarexeon_e3-1575m_v5_firmwarecore_i7-7920hq_firmwarexeon_platinum_8280l_firmwarexeon_d-1577_firmwarexeon_e-2124_firmwarecore_i7-5750hq_firmwarexeon_e3-1240_v6_firmwarexeon_e5506xeon_e5-4660_v4xeon_x3360_firmwarexeon_e7520_firmwareceleron_g3900_firmwarexeon_e3-1505m_v5_firmwarexeon_d-2187ntcore_i5-8500b_firmwarexeon_e5-2643_v3_firmwareceleron_g4930core_i3-6100h_firmwarecore_i5-7600xeon_e5504core_i9-7940xxeon_w-3265_firmwarexeon_e5-2698_v3_firmwarexeon_7120n_firmwarexeon_e5530xeon_platinum_8253xeon_e5-2630l_v4xeon_e5-4667_v4big-ip_fraud_protection_servicexeon_lv_5128core_i3-8300xeon_e-2186gcore_i5-7400tcore_i3-5005uxeon_e5-2690_v4_firmwarexeon_e-2174gxeon_e5-2630_v4xeon_d-1622xeon_e5-4610_v3_firmwareceleron_g4932e_firmwarexeon_x5355_firmwarexeon_lc5528_firmwarecore_i5-7260uxeon_w-2145_firmwarexeon_e5-2643_v3xeon_d-2145ntxeon_e5450_firmwarexeon_e5-1650_v4big-ip_access_policy_managerxeon_gold_6238core_i7-7500u_firmwarexeon_e5-2630_v3xeon_e5-4627_v2_firmwarecore_i7-7800xxeon_e3-1275_v6_firmwarexeon_e7320core_i5-10210yxeon_e3-1225_v6_firmwarecore_i7-7820hk_firmwarexeon_e5-2623_v4xeon_e5-4620_v4_firmwarexeon_w-3275mxeon_e7420xeon_e7-8890_v4_firmwarecore_i5-10210u_firmwarexeon_x5460xeon_l5310xeon_d-1513n_firmwarexeon_e5540_firmwarecore_i3-7300t_firmwarexeon_e3-1265l_v4_firmwarexeon_e5-1620_v4_firmwareceleron_g4930exeon_e5472_firmwarepentium_gold_4410yxeon_x3350core_i5-9600xeon_e5-2637_v4_firmwarexeon_e3-1585l_v5_firmwarexeon_e7-8867_v4big-ip_local_traffic_managerxeon_e5410_firmwarexeon_5150_firmwarexeon_e5640xeon_e3-1281_v3pentium_gold_g5600t_firmwarexeon_lv_5133xeon_e-2224_firmwarexeon_x5272_firmwarexeon_e3-1240l_v3pentium_gold_6405uxeon_5050_firmwarecore_i5-9300h_firmwarexeon_e5345celeron_g1820xeon_e7-8880_v3core_i3-9320_firmwarexeon_l5630_firmwarexeon_gold_5220t_xeon_lv_5148xeon_3060core_i9-10940x_x-seriescore_i5-8400b_firmwarexeon_e3-1280_v6xeon_e7-8891_v3_firmwarecore_i5-5200uxeon_e3-1225_v3xeon_e7-4890_v2_firmwarecore_i3-8100_firmwarexeon_e5-2650l_v3_firmwarexeon_l5318_firmwarexeon_5030_firmwarexeon_e5-2697_v3xeon_w3580_firmwarexeon_e5-4603_v2xeon_e5-4627_v4xeon_e-2124core_i5-7287ucore_i7-10710uxeon_d-1541xeon_d-2141ixeon_e7-4830_v4xeon_e3-1275_v3xeon_e7-4809_v2xeon_e5310xeon_e5440_firmwarexeon_d-1633n_firmwarexeon_e-2276g_firmwarexeon_gold_6230n_firmwarexeon_e5-4620_v3_firmwarexeon_gold_5222core_i3-5015u_firmwarecore_i5-7300hq_firmwarexeon_x5260_firmwarexeon_e5-4607_v2core_i7-8706g_firmwarexeon_w-2133_firmwarecore_i3-6100hcore_i5-7400t_firmwarexeon_d-1548xeon_e5-4667_v4_firmwarepentium_gold_4415y_firmwarexeon_e3-1535m_v6xeon_d-1649nxeon_w5580xeon_platinum_9221xeon_l5638xeon_e5-2603_v4_firmwarecore_i7-10510y_firmwarexeon_e3-1220_v5core_i5-5257u_firmwarexeon_7040_firmwarexeon_5050xeon_e-2146g_firmwarexeon_5080xeon_e5-2403_v2xeon_l5335xeon_w3520_firmwarecore_i7-6700hqxeon_e5-2667_v3_firmwarexeon_x5482_firmwarecore_i7-7800x_firmwarexeon_w-2225_firmwarexeon_x7560_firmwarexeon_e5-2640_v2xeon_5120xeon_e5-2407_v2_firmwarexeon_gold_6238t_firmwarecore_i3-7100_firmwarexeon_e5320_firmwarexeon_e7-8891_v4_firmwarexeon_w-2155xeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uxeon_7110mxeon_l5320xeon_e5-2650l_v4_firmwareceleron_g1840_firmwareubuntu_linuxxeon_e5-2623_v3_firmwarexeon_x3480_firmwarexeon_lc3528_firmwarecore_i3-9100txeon_lv_5138xeon_d-1623nxeon_x7550xeon_3065xeon_w-2145pentium_gold_4425yxeon_e5-4650_v3_firmwarecore_m-5y71xeon_e5507_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_d-1622_firmwarexeon_e3-1585_v5_firmwarecore_i3-7167uxeon_e-2176g_firmwarexeon_e5-2620_v2core_i7-7567uceleron_g3900e_firmwarexeon_w-2295_firmwarecore_i3-8145u_firmwarexeon_silver_4214xeon_l5530xeon_d-2161ixeon_e3-1225_v3_firmwarexeon_d-2141i_firmwarecore_i7-7660u_firmwarexeon_e3-1585l_v5xeon_gold_5218bxeon_e7-2880_v2_firmwarexeon_e5-2670_v3xeon_e5-4640_v4_firmwarebig-iq_centralized_managementcore_i7-8750h_firmwarecore_i3-5010u_firmwarecore_i3-7300txeon_e5-1680_v4_firmwarexeon_silver_4216_firmwarexeon_e3-1271_v3_firmwarecore_m3-6y54_firmwarexeon_x5647core_i5-7y54_firmwarexeon_e-2246g_firmwarexeon_e5607xeon_e5-2648l_v4xeon_e5645_firmwarexeon_e-2174g_firmwarexeon_e5-4620_v4xeon_e7-8855_v4xeon_7040xeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_e3-1515m_v5xeon_x5660xeon_e3-1225_v5xeon_e5-2630l_v2xeon_l7555core_i5-7600_firmwarexeon_l3426xeon_w-3275m_firmwarexeon_5150xeon_e5-2667_v2xeon_e7-4890_v2xeon_e3-1515m_v5_firmwarexeon_lc3518xeon_e5-2630_v3_firmwarexeon_e7-4830_v2_firmwarexeon_w-3175xxeon_e3-1230l_v3_firmwarecore_i5-6267u_firmwarexeon_l5609xeon_gold_6222v_firmwarecore_i7-9750hxeon_platinum_8260_firmwarexeon_e7-8893_v2_firmwarexeon_w-2225xeon_e5-4669_v3xeon_ec5539_firmwarexeon_x3360core_i7-7560u_firmwarexeon_w-2133xeon_e5-1660_v2_firmwarexeon_d-1557xeon_e7-2890_v2_firmwarexeon_e7430_firmwarexeon_e7-2870_v2_firmwarepentium_gold_g5500_firmwarexeon_e7-8860_v3_firmwarexeon_e5-2670_v2_firmwarexeon_d-1553n_firmwarexeon_e5-2687w_v3_firmwarexeon_e5-4627_v2xeon_w-2223core_i9-7920x_firmwarexeon_x6550_firmwarexeon_e5-4620_v2xeon_e5-2470_v2_firmwarecore_i3-8300txeon_e3-1565l_v5_firmwarepentium_gold_g5620_firmwarexeon_ec5549_firmwarexeon_x3460_firmwarexeon_e-2236xeon_e-2236_firmwarexeon_e-2126g_firmwarexeon_gold_6238_firmwareceleron_g1820t_firmwarexeon_x5492xeon_e5640_firmwarecore_i9-7960x_firmwarexeon_x5570celeron_g3950xeon_e5-2640_v4_firmwarecore_i5-8400xeon_x5667_firmwarexeon_gold_6246core_i7-8086kxeon_x7460pentium_gold_g5500t_firmwarexeon_e5-2603_v3_firmwarexeon_e5-2603_v2xeon_d-1527_firmwarepentium_gold_5405u_firmwarebig-ip_domain_name_systemxeon_e5-2683_v4_firmwarexeon_w-3245m_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-4628l_v4_firmwarexeon_e5-2603_v3xeon_e7-4850_v4_firmwarexeon_3065_firmwarexeon_gold_6240y_xeon_e7-8870_v3_firmwarexeon_w3540xeon_e5310_firmwarexeon_e-2134xeon_l3360xeon_e5-4655_v3core_i5-5350hxeon_e5-2620_v4_firmwarexeon_d-2163itxeon_e5220_firmwaresolariscore_i5-10310y_firmwarepentium_gold_4417uxeon_e5-4610a_v4_firmwarecore_i7-10510yxeon_gold_5215lxeon_e5-4655_v4xeon_silver_4215_firmwarecore_i5-7360u_firmwarexeon_w-2275_firmwarexeon_l5430xeon_e5-2658_v4xeon_e5-2440_v2xeon_l5335_firmwarexeon_x5272xeon_w3570_firmwarecore_i9-7960xceleron_g3900core_i7-7820xxeon_e7-8893_v3_firmwarecore_i5-9600kxeon_d-1531_firmwarecore_i7-7700hqxeon_e6510_firmwarexeon_e7-4830_v3xeon_e5-2420_v2_firmwarexeon_e5-2698_v3core_i3-9100t_firmwarexeon_e3-1245_v5xeon_l5508xeon_e7-8880_v3_firmwarexeon_7140m_firmwarexeon_e7-8857_v2_firmwarebig-ip_link_controllerxeon_d-1571xeon_gold_6240lxeon_e5-1620_v3xeon_5080_firmwarecore_i5-8350uxeon_w-3223_firmwarecore_m3-6y30_firmwarexeon_e7-8850_v2_firmwareceleron_g1830_firmwarexeon_d-2173itceleron_g3930xeon_d-2123itxeon_e-2246gceleron_g3930t_firmwarexeon_l5240_firmwarexeon_l5420xeon_gold_5218n_firmwarexeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_w-2255_firmwarexeon_e3-1241_v3xeon_ec3539_firmwarexeon_e5-2695_v4_firmwarexeon_e5-2687w_v3xeon_x5677_firmwarecore_i5-5200u_firmwarexeon_e5-2680_v4xeon_e5-2697a_v4xeon_e7-4809_v3_firmwarexeon_gold_6242_firmwarexeon_d-1649n_firmwarexeon_e-2104g_firmwarexeon_e5-2609_v4core_i7-7920hqxeon_e3-1220_v3_firmwarexeon_e5503xeon_e5-2660_v2xeon_e5-1650_v2_firmwarexeon_w-2123_firmwarecore_m3-6y54core_i3-6100_firmwarecore_m-5y51xeon_e3-1270_v5xeon_d-1537_firmwarecore_i3-7350k_firmwarexeon_x5560_firmwarexeon_e7320_firmwarexeon_d-2166nt_firmwareceleron_g1840t_firmwarexeon_e3-1246_v3xeon_e5-2643_v4xeon_e5-2699a_v4xeon_7120nxeon_l5410celeron_g1840xeon_l3110core_i3-9300xeon_5160_firmwarexeon_e7-2870_v2xeon_e7-8860_v3xeon_e-2244gcore_i5\+8400xeon_e-2176gxeon_e5-2698_v4_firmwarexeon_7020_firmwarexeon_e5-2637_v2xeon_7140mceleron_g1630core_i7-8709gxeon_l3014_firmwarexeon_l7545_firmwarecore_i3-5020u_firmwarexeon_e7-4870_v2_firmwarexeon_l5640_firmwarexeon_3050xeon_e5-2650l_v4xeon_7120m_firmwarexeon_l5518_firmwarexeon_d-1529_firmwarepentium_gold_4417u_firmwarexeon_d-1637_firmwarecore_m3-8100y_firmwarexeon_e-2104gcore_i7-5950hqxeon_7030_firmwarexeon_e7-8850_v2xeon_e5-2695_v2core_i5-6260uxeon_5130xeon_e5-4640_v2_firmwarexeon_e5606_firmwarexeon_e5345_firmwarexeon_silver_4214_firmwareceleron_g4930_firmwarecore_i5-9500tceleron_g1610xeon_d-2143it_firmwarexeon_platinum_9242core_i5-7400xeon_platinum_8280lxeon_e7-4850_v3xeon_d-1523n_firmwarexeon_platinum_8280_firmwarexeon_e5-2697_v2xeon_x7350core_i3-7320xeon_e5205xeon_e7-8880l_v2_firmwarexeon_e5-4669_v3_firmwarecore_i9-9960x_x-seriesxeon_e3-1230_v6xeon_e7-8867_v3_firmwarexeon_e5-2430l_v2core_i5-1035g1xeon_w3580xeon_gold_6230ncore_i5-5250u_firmwarexeon_w-3265core_i7-8565u_firmwarexeon_gold_6246_firmwarexeon_e7-2850_v2pentium_gold_4425y_firmwarexeon_gold_5218nxeon_e5-2620_v4xeon_platinum_9221_firmwarexeon_e-2186g_firmwarexeon_ec5549xeon_e3-1276_v3xeon_w3530core_i5-7600t_firmwarexeon_e-2124gxeon_e3-1231_v3core_i9-7980xe_firmwarexeon_e6540core_i5-7440hq_firmwarexeon_e7-8880_v2xeon_e7-8891_v2_firmwarexeon_x3380xeon_e5462_firmwarexeon_gold_5220xeon_e-2234xeon_e7-8860_v4_firmwarexeon_d-1637xeon_d-1577celeron_g3930e_firmwarexeon_gold_6254xeon_silver_4209t_firmwarecore_i7-9850hcore_i7-9700t_firmwarexeon_x3210xeon_gold_5215l_firmwarecore_i7-7820x_firmwarexeon_e3110_firmwarexeon_e5-2640_v4xeon_e7-8893_v4core_i3-8130u_firmwarexeon_ec3539celeron_g3920core_i3-7100uceleron_g1850core_i5-5287uxeon_d-1653n_firmwarexeon_w-3275core_i5-7600kxeon_platinum_8270_firmwarexeon_e5-2640_v3_firmwarexeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_gold_6234_firmwarexeon_d-1633ncore_i3-7100t_firmwareceleron_g1840tcore_i5-7360uxeon_e7-4820_v4xeon_e5-2650_v2_firmwarexeon_gold_5218t_firmwarexeon_gold_6248xeon_platinum_8260l_firmwarexeon_d-1518_firmwarexeon_e3-1220_v6xeon_e5649xeon_platinum_8280core_m3-8100ycore_m-5y70_firmwarecore_i5-8250u_firmwarexeon_e3-1246_v3_firmwarecore_i7-7567u_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarexeon_e5520_firmwarexeon_e5-4657l_v2_firmwarexeon_e3-1285_v4xeon_e5320xeon_x7550_firmwarecore_i7-7700hq_firmwarexeon_e3-1265l_v3_firmwarecore_i7-6820hkxeon_d-2146nt_firmwarexeon_e3-1230_v5_firmwarexeon_x5687xeon_e3-1275_v3_firmwarecore_i5-10310ycore_i9-10920x_x-series_firmwarexeon_gold_5218b_firmwarecore_i5-8400t_firmwarexeon_e7-8857_v2xeon_lv_5138_firmwarexeon_e-2286gxeon_gold_6222vcore_i9-9940x_x-series_firmwarexeon_5160xeon_x6550xeon_x5550_firmwarexeon_gold_6242xeon_x7542_firmwarexeon_e5-4610_v2xeon_e7-4820_v2xeon_e-2244g_firmwarexeon_e3-1575m_v5xeon_e7-8895_v2xeon_e7-8855_v4_firmwarexeon_platinum_8270xeon_e5-2650_v4xeon_x3450xeon_e5-2660_v4_firmwarexeon_d-1533nxeon_x3330_firmwarexeon_e3-1245_v6xeon_silver_4215xeon_w-3175x_firmwarexeon_l7445xeon_w-2235xeon_e5-2695_v4xeon_7140ncore_i7-6560u_firmwarecore_i3-8300_firmwareceleron_g4930tcore_i7-1065g7_firmwarecore_i5\+8500_firmwarexeon_gold_6238txeon_silver_4214yxeon_e5-2603_v4xeon_e5506_firmwarecore_i9-10980xexeon_e5-2643_v2xeon_e5-2695_v3_firmwarexeon_e7-8860_v4xeon_w3690_firmwarexeon_e5-2430l_v2_firmwarexeon_x3220_firmwarecore_i7-8809g_firmwarexeon_e7520xeon_e7-4880_v2xeon_e7-8867_v4_firmwareceleron_g4900core_i5-9400h_firmwarecore_i3-5010upentium_gold_g5400core_i3-6100xeon_ec5509xeon_l5520xeon_x5667core_i3-10110u_firmwarexeon_x3440_firmwarexeon_gold_6226core_i5-9500t_firmwarexeon_gold_6252xeon_e5410core_i7-6770hq_firmwarexeon_e5-4640_v3core_i7-5750hqcore_i5-6267upentium_gold_5405uceleron_g3900tecore_i3-1005g1core_i9-9920x_x-series_firmwarexeon_l3406xeon_gold_6252_firmwarexeon_e7210_firmwarecore_i5-8305gxeon_e5603_firmwarecore_i5-9400t_firmwarexeon_platinum_8260lcore_i7-8559uxeon_d-1602_firmwarexeon_e5540core_i7-9700_firmwarexeon_e-2146gxeon_d-2177ntxeon_w-2175xeon_e7-2880_v22019.2 IPU – Intel(R) Processor Machine Check Error
CWE ID-CWE-20
Improper Input Validation
CVE-2023-27519
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 13.92%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-11 Jun, 2025 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_905poptane_ssd_900poptane_ssd_dc_p4801xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4800xoptane_ssd_905p_firmwareoptane_ssd_900p_firmwareIntel(R) Optane(TM) SSD products
CWE ID-CWE-20
Improper Input Validation
CVE-2024-39811
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 8.33%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:10
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) Server M20NTP Family UEFI may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Server M20NTP Family UEFIm20ntp_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2020-24505
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 17.09%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:42
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the firmware for the Intel(R) 700-series of Ethernet Controllers before version 7.3 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_x710-da2_for_ocp_3.0ethernet_network_adapter_x710-t4ethernet_network_adapter_xl710-qda1ethernet_network_adapter_xxv710-da2tethernet_network_adapter_xl710-qda2_for_open_compute_projectethernet_network_adapter_xl710-bm1ethernet_network_adapter_x710-am2ethernet_network_adapter_x710-t2lethernet_network_adapter_xxv710-da1_for_ocpethernet_network_adapter_x722-da2ethernet_network_adapter_xxv710-am2ethernet_network_adapter_v710-at2ethernet_network_adapter_x710-tm4ethernet_network_adapter_xxv710-dax_for_ocpethernet_network_adapter_x722-da4ethernet_network_adapter_x710-da4_for_ocp_3.0ethernet_network_adapter_x710-da2ethernet_network_adapter_x710-da2_for_ocpethernet_network_adapter_x710-da4ethernet_network_adapter_x710-bm2ethernet_network_adapter_xl710-am1ethernet_network_adapter_xxv710-da1ethernet_network_adapter_x710-t2l_for_ocp_3.0ethernet_network_adapter_xl710-am2ethernet_network_adapter_xl710-qda1_for_open_compute_projectethernet_network_adapter_xxv710-da2ethernet_network_adapter_x710-t4lethernet_network_adapter_700_firmwareethernet_network_adapter_x710-at2ethernet_network_adapter_xlk710-qda2ethernet_network_adapter_xxv710-am1ethernet_network_adapter_xl710-bm2ethernet_network_adapter_x710-t4l_for_ocp_3.0Intel(R) 700-series of Ethernet Controllers
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 13
  • 14
  • Next
Details not found