Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-3657

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-12 Sep, 2018 | 19:00
Updated At-16 Sep, 2024 | 20:01
Rejected At-
Credits

Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:12 Sep, 2018 | 19:00
Updated At:16 Sep, 2024 | 20:01
Rejected At:
▼CVE Numbering Authority (CNA)

Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Intel(R) Active Management Technology
Versions
Affected
  • Versions before version 12.0.5.
Problem Types
TypeCWE IDDescription
textN/ADenial of Service, Information Disclosure
Type: text
CWE ID: N/A
Description: Denial of Service, Information Disclosure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf
x_refsource_CONFIRM
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05
x_refsource_MISC
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html
x_refsource_CONFIRM
http://www.securityfocus.com/bid/106996
vdb-entry
x_refsource_BID
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20180924-0003/
x_refsource_CONFIRM
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05
Resource:
x_refsource_MISC
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/106996
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20180924-0003/
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf
x_refsource_CONFIRM
x_transferred
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05
x_refsource_MISC
x_transferred
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/106996
vdb-entry
x_refsource_BID
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20180924-0003/
x_refsource_CONFIRM
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/106996
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20180924-0003/
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:12 Sep, 2018 | 19:29
Updated At:17 Aug, 2023 | 17:43

Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Siemens AG
siemens
>>simatic_field_pg_m5_firmware>>Versions before 22.01.06(exclusive)
cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_field_pg_m5>>-
cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc427e_firmware>>Versions before 21.01.09(exclusive)
cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc427e>>-
cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc477e_firmware>>Versions before 21.01.09(exclusive)
cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc477e>>-
cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc547e_firmware>>Versions before r1.30.0(exclusive)
cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_pc547e>>-
cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_pc547g_firmware>>Versions before r1.23.0(exclusive)
cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc547g>>-
cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc627d_firmware>>Versions before 19.02.11(exclusive)
cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc627d>>-
cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc647d_firmware>>Versions before 19.01.14(exclusive)
cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc647d>>-
cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc677d_firmware>>Versions before 19.02.11(exclusive)
cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc677d>>-
cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc827d_firmware>>Versions before 19.02.11(exclusive)
cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc827d>>-
cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc847d_firmware>>Versions before 19.01.14(exclusive)
cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_ipc847d>>-
cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_itp1000_firmware>>Versions before 23.01.04(exclusive)
cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*
Siemens AG
siemens
>>simatic_itp1000>>-
cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_management_engine_firmware>>Versions from 11.0.0(inclusive) to 12.0.5(exclusive)
cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>active_management_technology_firmware>>Versions before 12.0.5(exclusive)
cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>manageability_engine_firmware>>Versions from 9.0.0.0(inclusive) to 11.0(exclusive)
cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/106996secure@intel.com
Third Party Advisory
VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdfsecure@intel.com
Patch
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05secure@intel.com
Third Party Advisory
US Government Resource
https://security.netapp.com/advisory/ntap-20180924-0003/secure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_ussecure@intel.com
Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.htmlsecure@intel.com
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/106996
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf
Source: secure@intel.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://security.netapp.com/advisory/ntap-20180924-0003/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

876Records found

CVE-2022-36372
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.63%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-09 Oct, 2024 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_enthusiast_nuc8i7hvkva_firmwarenuc_business_nuc8i7hnkqc_firmwarenuc_8_compute_element_cm8ccb4rnuc_kit_nuc8i7hnkqcnuc_pro_kit_nuc8i3pnh_firmwarenuc_business_nuc8i7hnkqcnuc_pro_compute_element_nuc9v7qnb_firmwarenuc_pro_compute_element_nuc9v7qnx_firmwarenuc_8_compute_element_cm8i3cb4nnuc_rugged_kit_nuc8cchbnnuc_8_compute_element_cm8i7cb8nnuc_kit_nuc8i7hnknuc_rugged_kit_nuc8cchkrnuc_business_nuc8i7hvkva_firmwarenuc_enthusiast_nuc8i7hvkvanuc_8_compute_element_cm8i5cb8nnuc_pro_board_nuc8i3pnh_firmwarenuc_kit_nuc8i7hvknuc_pro_compute_element_nuc9v7qnbnuc_pro_compute_element_nuc9vxqnb_firmwarenuc_business_nuc8i7hvkvanuc_kit_nuc8i7hnk_firmwarenuc_pro_kit_nuc8i3pnknuc_enthusiast_nuc8i7hnknuc_pro_compute_element_nuc9vxqnxnuc_pro_board_nuc8i3pnk_firmwarenuc_business_nuc8i7hvkvawnuc_business_nuc8i7hnknuc_kit_nuc8i7hvkvawnuc_8_compute_element_cm8pcb4r_firmwarenuc_pro_board_nuc8i3pnb_firmwarenuc_pro_board_nuc8i3pnhnuc_8_compute_element_cm8ccb4r_firmwarenuc_enthusiast_nuc8i7hnkqcnuc_business_nuc8i7hnk_firmwarenuc_rugged_kit_nuc8cchbn_firmwarenuc_kit_nuc8i7hvk_firmwarenuc_8_compute_element_cm8pcb4rnuc_pro_kit_nuc8i3pnbnuc_enthusiast_nuc8i7hvkvaw_firmwarenuc_rugged_kit_nuc8cchbnuc_enthusiast_nuc8i7hvknuc_kit_nuc8i7hvkva_firmwarenuc_pro_kit_nuc8i3pnb_firmwarenuc_8_compute_element_cm8i3cb4n_firmwarenuc_rugged_kit_nuc8cchkr_firmwarenuc_kit_nuc8i7hvkvanuc_pro_kit_nuc8i3pnk_firmwarenuc_enthusiast_nuc8i7hvk_firmwarenuc_business_nuc8i7hvk_firmwarenuc_kit_nuc8i7hnkqc_firmwarenuc_8_compute_element_cm8i7cb8n_firmwarenuc_8_compute_element_cm8i5cb8n_firmwarenuc_kit_nuc8i7hvkvaw_firmwarenuc_rugged_kit_nuc8cchb_firmwarenuc_enthusiast_nuc8i7hnk_firmwarenuc_pro_compute_element_nuc9vxqnx_firmwarenuc_pro_board_nuc8i3pnknuc_pro_kit_nuc8i3pnhnuc_pro_board_nuc8i3pnbnuc_pro_compute_element_nuc9v7qnxnuc_pro_compute_element_nuc9vxqnbnuc_rugged_kit_nuc8cchkrn_firmwarenuc_rugged_kit_nuc8cchkrnnuc_enthusiast_nuc8i7hvkvawnuc_business_nuc8i7hvkvaw_firmwarenuc_enthusiast_nuc8i7hnkqc_firmwarenuc_business_nuc8i7hvkIntel(R) NUC BIOS firmwarebios
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0151
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.62%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:07
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2687w_v2_firmwarexeon_platinum_8153xeon_e3-1230_v5xeon_e5-1620_v2_firmwarexeon_e7-8893_v3xeon_e5-1630_v3_firmwarexeon_e3-1558l_v5xeon_bronze_3104_firmwarexeon_e5-4610_v4xeon_e7-8894_v4xeon_e5-2608l_v4_firmwarexeon_e3-1226_v3_firmwarexeon_gold_6146xeon_e5-2660_v3xeon_gold_6126f_firmwarexeon_e3-1240_v3_firmwarexeon_e5-2450_v2xeon_e7-8880l_v2xeon_platinum_8168_firmwarexeon_e3-1501l_v6_firmwarexeon_silver_4108_firmwarexeon_e5-2670_v2xeon_e5-1680_v3xeon_e-2124g_firmwarexeon_e5-2697_v4xeon_d-1527xeon_e5-2608l_v3_firmwarexeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_e-2254me_firmwarexeon_w-2125core_i5-8400hcore_m-5y71_firmwarexeon_e5-2690_v2xeon_e3-1220_v2_firmwarexeon_e5-2648l_v2xeon_e5-4610_v3xeon_e7-8890_v3_firmwarexeon_e3-1220_v5_firmwarexeon_e7-8870_v3xeon_e-2276me_firmwarexeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-2448l_v2_firmwarexeon_e5-2620_v2_firmwarexeon_e3-1275l_v3_firmwarexeon_d-2163it_firmwarexeon_e5-1660_v4xeon_e5-2699r_v4_firmwarexeon_e7-8891_v4xeon_platinum_8164core_i7-9700xeon_d-1521_firmwarexeon_e5-1620_v2core_i7-6650u_firmwarexeon_e3-1280_v5xeon_e-2226gxeon_e3-1226_v3xeon_e5-2699r_v4xeon_e3-1265l_v2xeon_e5-2658a_v3_firmwarexeon_silver_4116t_firmwarexeon_d-1557_firmwarexeon_e7-4820_v2_firmwarexeon_e5-1680_v3_firmwarexeon_d-1518xeon_e3-1285l_v4_firmwarexeon_e5-1620_v3_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i7-6700texeon_e7-4830_v2xeon_e7-4830_v3_firmwarexeon_e3-1501l_v6xeon_e5-2609_v4_firmwarexeon_platinum_8168xeon_e5-2683_v4core_i7-7600uxeon_e5-1660_v3_firmwarexeon_e5-2640_v3xeon_e5-2608l_v4xeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarexeon_e5-2418l_v3_firmwarexeon_e3-1280_v3_firmwarexeon_e5-1620_v4xeon_e7-8880l_v3xeon_d-1567_firmwarexeon_e3-1230_v2_firmwarexeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_gold_6138t_firmwarexeon_e-2134_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_5122xeon_platinum_8180_firmwarexeon_e5-2699_v3core_i7-7600u_firmwarexeon_gold_6126_firmwarexeon_e5-4624l_v2_firmwarexeon_e3-1240_v5_firmwarexeon_e5-4640_v2xeon_e3-1285_v3_firmwarexeon_e5-2618l_v2_firmwarexeon_e5-4657l_v2core_i5-9500_firmwarexeon_e7-8870_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e3-1558l_v5_firmwarexeon_e7-8870_v4xeon_e5-2609_v2_firmwarecore_i5-8400h_firmwarexeon_gold_6150_firmwarexeon_e3-1265l_v4xeon_platinum_8156core_i5-8600xeon_e5-2450l_v2_firmwarexeon_e-2136core_i7-9700kxeon_bronze_3106_firmwarexeon_e7-8893_v4_firmwarexeon_gold_6138_firmwarexeon_d-2177nt_firmwarexeon_d-1533n_firmwarexeon_e7-4860_v2_firmwarexeon_e5-2667_v4_firmwarexeon_e7-8893_v2xeon_e5-2667_v4core_m7-6y75xeon_e3-1285l_v4xeon_gold_6126fxeon_e5-2628l_v2xeon_e7-8870_v2xeon_d-1539xeon_silver_4109t_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5xeon_e5-1680_v4xeon_silver_4114_firmwarexeon_e7-4809_v3xeon_d-2146ntxeon_e3-1575m_v5_firmwarexeon_e5-2609_v2xeon_e3-1268l_v5core_i5-8600kxeon_platinum_8160fxeon_e7-4820_v3_firmwarexeon_d-1577_firmwarecore_i7-8700k_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1290_v2_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240_v6_firmwarexeon_e5-2658_v3xeon_e5-4660_v4xeon_e3-1501m_v6core_i5-8365uxeon_e3-1105c_v2_firmwarexeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_d-2187ntxeon_e5-2643_v3_firmwarexeon_e5-4669_v4_firmwarexeon_platinum_8158_firmwarexeon_e5-2680_v2xeon_e5-2698_v3_firmwarexeon_e3-1270_v6xeon_gold_5120_firmwarexeon_e-2286mxeon_d-2166ntxeon_e3-1505m_v5xeon_e3-1280_v2_firmwarexeon_silver_4114t_firmwarexeon_w-2195xeon_e5-2403_v2_firmwarexeon_e5-2630l_v4xeon_gold_6134_firmwarexeon_e5-4667_v4core_i7-5650uxeon_e5-2628l_v4xeon_gold_6130t_firmwarexeon_e-2276gxeon_e5-2658_v2xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e5-2690_v4_firmwarexeon_e-2174gxeon_e5-2630_v4xeon_e5-2687w_v2xeon_e5-4610_v3_firmwarexeon_e5-4667_v3xeon_e5-2609_v3_firmwarexeon_e7-4809_v2_firmwarecore_m-5y70xeon_e3-1280_v2xeon_w-2145_firmwarexeon_e3-1230_v6_firmwarexeon_e5-2643_v3xeon_e3-1220_v2xeon_e5-1650_v4xeon_d-2145ntxeon_e5-2630_v3xeon_gold_6126t_firmwarexeon_e5-4627_v2_firmwarexeon_e3-1275_v6_firmwarecore_i5-5300uxeon_e3-1585_v5xeon_e3-1225_v6_firmwarexeon_e5-2667_v2_firmwarexeon_e5-2623_v4xeon_e5-4620_v4_firmwarexeon_w-2123xeon_e7-8890_v4_firmwarecore_i5-8600t_firmwarexeon_gold_5119t_firmwarexeon_e3-1220_v6_firmwarexeon_d-1513n_firmwarexeon_e5-2683_v3xeon_e5-2637_v2_firmwarexeon_gold_6142_firmwarexeon_e3-1535m_v6_firmwarexeon_e3-1265l_v4_firmwarecore_i7-5600uxeon_e5-2428l_v3_firmwarexeon_e5-1620_v4_firmwarexeon_gold_6130txeon_silver_4108xeon_e3-1280_v3core_i5-9600xeon_e3-1285_v3xeon_e5-2618l_v4_firmwarexeon_e5-2650_v3_firmwarexeon_e5-2637_v4_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1240l_v5_firmwarexeon_e5-2428l_v2xeon_e7-8867_v4xeon_e3-1225_v2_firmwarexeon_e5-2660_v3_firmwarecore_i5-7300u_firmwarecore_i5-8600_firmwarexeon_e3-1281_v3xeon_bronze_3106xeon_e-2224_firmwarexeon_e3-1240l_v3xeon_e-2274gxeon_e7-8880_v3core_i5-9500xeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1280_v6xeon_e3-1225_v3xeon_e7-8891_v3_firmwarecore_i7-6700t_firmwarexeon_e5-1650_v2xeon_e3-1245_v5_firmwarexeon_e5-2650l_v3_firmwarexeon_e5-2698_v4xeon_e7-4890_v2_firmwarexeon_platinum_8160txeon_d-1528xeon_e5-2697_v3xeon_e5-4603_v2xeon_e5-4627_v4xeon_e5-4620_v2_firmwarexeon_e3-1280_v6_firmwarexeon_e-2124core_i9-9880hxeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_d-2141icore_i5-8500t_firmwarexeon_e3-1275_v3xeon_e7-4809_v2xeon_e7-4830_v4xeon_d-1541xeon_e5-2650_v4_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarecore_i5-6300uxeon_e5-1660_v2xeon_e5-2690_v2_firmwarexeon_e-2276mexeon_e5-4620_v3_firmwarexeon_e5-2687w_v4xeon_e5-2630_v4_firmwarexeon_e-2274g_firmwarexeon_e5-4607_v2xeon_e3-1271_v3xeon_e5-2695_v2_firmwarexeon_w-2133_firmwarexeon_e5-4667_v3_firmwarexeon_e3-1220l_v3_firmwarexeon_e3-1275_v2_firmwarexeon_e3-1535m_v6xeon_e5-4667_v4_firmwarexeon_e3-1278l_v4_firmwarexeon_e5-2699a_v4_firmwarexeon_d-1548xeon_e3-1265l_v3xeon_d-1529core_i9-9900xeon_e5-2603_v4_firmwarexeon_e3-1220_v5xeon_platinum_8160xeon_gold_5115_firmwarexeon_platinum_8156_firmwarexeon_e5-4660_v4_firmwarexeon_e-2146g_firmwarexeon_e5-2403_v2xeon_e5-2428l_v3core_i7-8850h_firmwarecore_m7-6y75_firmwarexeon_gold_5118_firmwarexeon_e5-2667_v3_firmwarexeon_e5-4648_v3xeon_e7-4809_v4core_i7-9850h_firmwarexeon_gold_6146_firmwarexeon_gold_6148fxeon_e5-2630l_v4_firmwarexeon_e5-2640_v2xeon_e5-2407_v2_firmwarexeon_gold_6132xeon_e5-2618l_v3_firmwarecore_i7-6660u_firmwarexeon_e5-2618l_v4xeon_e7-8891_v4_firmwarexeon_e3-1258l_v4xeon_w-2155xeon_e-2278g_firmwarexeon_e-2276ml_firmwarexeon_e5-2623_v3_firmwarexeon_e5-2650l_v4_firmwarexeon_e-2224gxeon_w-2135xeon_platinum_8160_firmwarexeon_w-2145xeon_e7-8894_v4_firmwarexeon_e3-1231_v3_firmwarexeon_e5-2648l_v2_firmwarexeon_e-2226gecore_i7-6650uxeon_gold_6142xeon_e5-4650_v3_firmwarecore_m-5y71xeon_gold_6148_firmwarexeon_e5-4610_v4_firmwarecore_i7-8665u_firmwarexeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i5-9400hxeon_e5-2620_v2xeon_e5-4640_v3_firmwarecore_i9-9900txeon_e5-2680_v4_firmwarexeon_e5-1428l_v2_firmwarexeon_e3-1286l_v3_firmwarexeon_e5-1630_v4_firmwarexeon_e3-1286_v3xeon_e7-8890_v2xeon_e3-1230_v3xeon_d-2161ixeon_e5-4603_v2_firmwarexeon_e3-1225_v3_firmwarexeon_e5-2640_v2_firmwarexeon_platinum_8164_firmwarexeon_d-2141i_firmwarexeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_e7-2880_v2_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2648l_v3xeon_e5-1680_v4_firmwarexeon_e3-1271_v3_firmwarexeon_e5-2609_v3xeon_e3-1275_v5core_i7-9700k_firmwarexeon_e3-1270_v2_firmwarexeon_e5-2438l_v3xeon_e3-1240_v5xeon_e-2288g_firmwarexeon_e5-2430_v2_firmwarexeon_e5-2450_v2_firmwarexeon_e5-2440_v2_firmwarexeon_e3-1230l_v3xeon_e3-1286_v3_firmwarexeon_e5-2660_v2_firmwarexeon_e5-2650_v3xeon_e-2246g_firmwarexeon_e5-2648l_v4xeon_e5-1650_v4_firmwarexeon_e-2176m_firmwarexeon_e-2174g_firmwarexeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_e5-2683_v3_firmwarexeon_e3-1515m_v5xeon_d-2187nt_firmwarexeon_e3-1225_v5xeon_e7-8880_v4_firmwarexeon_e5-2630l_v2core_i5-8500xeon_d-1539_firmwarexeon_silver_4112xeon_d-1559xeon_gold_6130_firmwarexeon_e5-2667_v2xeon_e3-1515m_v5_firmwarexeon_e5-2618l_v2xeon_e7-4890_v2xeon_gold_5120txeon_e5-2630_v3_firmwarexeon_e7-4830_v2_firmwarexeon_w-3175xxeon_e3-1230l_v3_firmwarexeon_gold_6134xeon_e5-2628l_v3xeon_e-2254mexeon_platinum_8160f_firmwarexeon_e5-2448l_v2core_i5-6440hqxeon_e3-1258l_v4_firmwarecore_i7-7y75xeon_e5-2648l_v4_firmwarexeon_e5-4669_v3xeon_e7-8893_v2_firmwarexeon_e5-1660_v2_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1220_v3xeon_d-2183it_firmwarexeon_w-2133core_i5-7y57xeon_e5-4627_v3xeon_e7-2890_v2_firmwarexeon_e7-4850_v4xeon_gold_6148xeon_d-1557xeon_e3-1505m_v6xeon_gold_6144core_i5-9600k_firmwarecore_i9-9900t_firmwarexeon_e7-2870_v2_firmwarexeon_e7-4880_v2_firmwarexeon_e-2224g_firmwarexeon_e5-2670_v2_firmwarexeon_e7-8860_v3_firmwarexeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_e3-1578l_v5_firmwarexeon_e5-2687w_v3_firmwarexeon_e5-4627_v2xeon_platinum_8170_firmwarexeon_e-2276mxeon_e7-4860_v2core_i7-8665uxeon_e5-4620_v2xeon_e5-2470_v2_firmwarecore_i7-6600uxeon_e3-1220l_v2xeon_gold_6126txeon_gold_6140_firmwarexeon_e3-1565l_v5_firmwarexeon_e5-2630_v2_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarexeon_e5-4610_v2_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e5-2408l_v3xeon_e5-2643_v2_firmwarexeon_e-2126g_firmwarexeon_e3-1240_v6core_i7-8700xeon_w-2155_firmwarexeon_e7-4850_v3_firmwarexeon_e3-1285l_v3_firmwarexeon_e5-2640_v4_firmwarexeon_e5-1630_v4xeon_e5-4660_v3xeon_e7-2850_v2_firmwarexeon_e5-1428l_v2xeon_e5-2603_v2core_i7-6600u_firmwarexeon_e5-2603_v3_firmwarexeon_d-1527_firmwarexeon_e5-2697_v3_firmwarecore_i7-8700kxeon_e5-2407_v2xeon_e5-2683_v4_firmwarexeon_e3-1268l_v3xeon_e5-4628l_v4_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-2603_v3xeon_e7-4850_v4_firmwarexeon_e3-1270_v6_firmwarexeon_e5-2658_v3_firmwarecore_i5-8600k_firmwarexeon_e7-8870_v3_firmwarexeon_e3-1285_v6_firmwarexeon_e-2134xeon_e5-2667_v3xeon_e5-4655_v3xeon_e5-2650_v2xeon_e7-4820_v3xeon_e5-2620_v4_firmwarexeon_d-2143itxeon_e-2226g_firmwarexeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_d-2161i_firmwarexeon_e3-1278l_v4xeon_e3-1225_v6xeon_e3-1220l_v3xeon_e5-2699_v3_firmwarexeon_e-2144g_firmwarexeon_silver_4109txeon_e5-2650l_v2_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5122_firmwarexeon_e5-2658_v4xeon_gold_6138fxeon_e5-2440_v2xeon_e5-1630_v3xeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_e5-4650_v2_firmwarecore_i5-9600kxeon_e7-8893_v3_firmwarexeon_e3-1290_v2xeon_e3-1286l_v3xeon_e5-2418l_v2_firmwarexeon_e5-2680_v3xeon_e3-1125c_v2xeon_d-1531_firmwarexeon_e5-2697_v4_firmwarexeon_e7-4830_v3xeon_e5-2420_v2_firmwarexeon_silver_4114xeon_e5-4655_v3_firmwarexeon_d-2123it_firmwarexeon_e3-1245_v3xeon_e5-2698_v3xeon_e3-1245_v5xeon_e7-8880_v3_firmwarexeon_e3-1230_v2xeon_e5-2648l_v3_firmwarexeon_e7-8857_v2_firmwarexeon_bronze_3104xeon_d-1571xeon_e3-1265l_v2_firmwarexeon_e5-2699_v4_firmwarexeon_e5-2637_v3xeon_e7-8890_v2_firmwarexeon_e5-1620_v3core_i5-8350uxeon_e7-8880l_v3_firmwarecore_i5-7300ucore_i5-6440hq_firmwarexeon_e3-1505l_v6_firmwarexeon_e3-1240_v2xeon_e7-8850_v2_firmwarexeon_d-2173itxeon_d-2123itcore_i7-5600u_firmwarecore_i5-8500txeon_e-2246gxeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_e3-1241_v3xeon_gold_6144_firmwarexeon_e5-2687w_v3xeon_e5-2695_v4_firmwarexeon_e5-1428l_v3_firmwarexeon_e3-1270_v5_firmwarexeon_e7-8890_v4xeon_e5-2680_v4core_i5-8350u_firmwarexeon_e5-4607_v2_firmwarexeon_e5-2630l_v3_firmwarexeon_e5-2697a_v4xeon_gold_6150xeon_e3-1535m_v5_firmwarexeon_e7-4809_v3_firmwarexeon_gold_6140xeon_e5-2690_v4core_i7-6820hq_firmwarexeon_e5-2609_v4xeon_e7-8891_v2xeon_e3-1220_v3_firmwarexeon_e5-2658_v4_firmwarexeon_e7-4850_v2xeon_e-2254mlxeon_e5-2660_v2xeon_e3-1545m_v5xeon_e5-1650_v2_firmwarexeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_e3-1501m_v6_firmwarexeon_e-2254ml_firmwarexeon_e7-4870_v2xeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_d-1537_firmwarexeon_gold_6126xeon_d-1541_firmwarexeon_e3-1245_v3_firmwarexeon_d-2166nt_firmwarexeon_e3-1260l_v5xeon_e3-1246_v3core_i5-6500_firmwarexeon_e5-2699a_v4xeon_e5-2643_v4xeon_d-1548_firmwarexeon_e-2276mlxeon_gold_6130f_firmwarexeon_e5-2690_v3_firmwarexeon_e7-2870_v2xeon_e7-8860_v3xeon_e-2244gcore_i9-9900kxeon_d-1559_firmwarexeon_e-2176gxeon_e3-1125c_v2_firmwarexeon_e3-1275l_v3xeon_e5-4648_v3_firmwarexeon_e5-2698_v4_firmwarexeon_gold_6142fxeon_e5-2637_v2xeon_e7-4809_v4_firmwarecore_i7-7y75_firmwarexeon_e7-4870_v2_firmwarexeon_platinum_8153_firmwarexeon_e5-2697a_v4_firmwarexeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_d-1529_firmwarexeon_d-1540_firmwarexeon_e5-1650_v3_firmwarexeon_e7-8850_v2xeon_e5-2695_v2xeon_platinum_8160t_firmwarexeon_e5-4640_v2_firmwarecore_i7-5650u_firmwarexeon_e3-1245_v2xeon_d-2142it_firmwarexeon_e-2278ge_firmwarecore_i5-9500txeon_e5-2470_v2core_i7-8700txeon_d-2143it_firmwarexeon_e3-1280_v5_firmwarexeon_e5-2420_v2core_i7-6820hqxeon_e3-1270_v3_firmwarexeon_e7-4850_v3xeon_silver_4110core_i7-8650uxeon_d-1523n_firmwarexeon_e5-2697_v2xeon_e5-2430_v2xeon_e5-4627_v3_firmwarexeon_gold_5119txeon_e-2286m_firmwarecore_i7-6700txeon_e7-8880l_v2_firmwarecore_i7-6920hqxeon_e5-4669_v3_firmwarexeon_e5-2408l_v3_firmwarexeon_e7-8870_v2_firmwarexeon_e3-1230_v6xeon_e5-2687w_v4_firmwarexeon_e7-8867_v3_firmwarecore_i7-6700_firmwarexeon_e-2234_firmwarexeon_e5-2430l_v2xeon_e5-2628l_v2_firmwarexeon_e3-1245_v2_firmwarexeon_e7-2850_v2xeon_e5-2620_v4xeon_e7-4820_v4_firmwarexeon_gold_6138txeon_e-2186g_firmwarexeon_e3-1276_v3xeon_gold_5120xeon_e-2124gxeon_e5-2618l_v3xeon_e3-1230_v3_firmwarexeon_e3-1270_v3xeon_d-1523nxeon_e5-2608l_v3xeon_e3-1231_v3xeon_e5-4660_v3_firmwarexeon_e-2288gxeon_e7-8880_v2xeon_e7-8891_v2_firmwarexeon_gold_6154_firmwarexeon_e-2234xeon_e7-8860_v4_firmwarexeon_e5-4650_v2xeon_d-1577xeon_silver_4114tcore_i7-9850hcore_i7-9700t_firmwarexeon_e5-4669_v4xeon_platinum_8176_firmwarexeon_gold_6154xeon_d-1543n_firmwarexeon_e5-2640_v4xeon_w-2195_firmwarexeon_e7-8893_v4xeon_gold_5120t_firmwarexeon_e3-1240_v2_firmwarexeon_e5-1650_v3xeon_e5-2630_v2xeon_e3-1276_v3_firmwarexeon_e3-1105c_v2xeon_e7-8891_v3xeon_e5-2640_v3_firmwarecore_m5-6y57xeon_d-1553nxeon_e-2126gxeon_d-1571_firmwarecore_i7-6920hq_firmwarexeon_e5-4620_v3core_i7-9700txeon_silver_4116xeon_e7-4820_v4xeon_e3-1268l_v3_firmwarexeon_e3-1240_v3xeon_e3-1220l_v2_firmwarexeon_e5-2650_v2_firmwarexeon_e5-2695_v3core_i5-6500core_i7-8650u_firmwarexeon_e5-2658_v2_firmwarexeon_d-1518_firmwarexeon_e3-1220_v6core_i9-9900k_firmwarecore_m-5y70_firmwarexeon_w-2135_firmwarexeon_e3-1246_v3_firmwarexeon_e3-1225_v2xeon_e-2186mxeon_e5-2438l_v3_firmwarexeon_gold_6152_firmwarexeon_e5-2603_v2_firmwarexeon_e5-1660_v3xeon_platinum_8176f_firmwarexeon_d-1520xeon_e-2176mxeon_e3-1285_v4xeon_e5-4657l_v2_firmwarexeon_e3-1265l_v3_firmwarexeon_d-2146nt_firmwarexeon_gold_6152xeon_e3-1230_v5_firmwarexeon_e5-2623_v3xeon_e7-4830_v4_firmwarexeon_platinum_8158xeon_e3-1275_v3_firmwarexeon_e5-2418l_v3xeon_e5-2658a_v3xeon_e7-8857_v2xeon_e-2286gxeon_e5-2680_v2_firmwarexeon_e7-2890_v2xeon_w-2125_firmwarexeon_d-1520_firmwarexeon_e3-1268l_v5_firmwarecore_i5-8365u_firmwarexeon_platinum_8176xeon_w-2175_firmwarecore_i7-6700te_firmwarexeon_silver_4112_firmwarexeon_e3-1241_v3_firmwarexeon_e3-1275_v6xeon_e5-4610_v2xeon_e7-4820_v2xeon_d-1531xeon_e-2244g_firmwarexeon_e3-1575m_v5core_i5-6360u_firmwarexeon_e5-2660_v4_firmwarexeon_e-2278gxeon_e5-2650_v4xeon_e3-1505l_v5xeon_d-1533nxeon_e7-8867_v3xeon_e7-8880_v2_firmwarexeon_e5-2450l_v2xeon_e3-1245_v6xeon_gold_6128xeon_w-3175x_firmwarexeon_d-2142itcore_i7-8850hxeon_gold_5118xeon_e5-2695_v4xeon_gold_6130fcore_i5-5350uxeon_e3-1281_v3_firmwarexeon_e5-4624l_v2core_i9-9900_firmwarexeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarexeon_gold_6142f_firmwarexeon_e3-1235l_v5xeon_e5-2603_v4xeon_e5-2643_v2xeon_e5-2695_v3_firmwarexeon_e5-1660_v4_firmwarexeon_e5-4628l_v4xeon_e5-2630l_v2_firmwarexeon_e5-2418l_v2xeon_e7-8860_v4core_i5-8500_firmwarexeon_e3-1285l_v3xeon_e5-2650l_v2xeon_e5-2680_v3_firmwarexeon_gold_6138pcore_i5-5300u_firmwarexeon_e5-2430l_v2_firmwarexeon_gold_6138p_firmwarecore_i5-6300u_firmwarexeon_platinum_8176fxeon_e7-4880_v2xeon_e7-8867_v4_firmwarexeon_e3-1240l_v3_firmwarexeon_e7-4850_v2_firmwarecore_i5-9400h_firmwarexeon_e7-8890_v3xeon_e3-1275_v2xeon_e5-2623_v4_firmwarexeon_e3-1285_v4_firmwarexeon_e3-1505l_v5_firmwarexeon_e5-2697_v2_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_e-2278gel_firmwarecore_i5-5350u_firmwarecore_i5-6360uxeon_e3-1245_v6_firmwarexeon_d-1521xeon_e-2144gcore_i5-9500t_firmwarecore_m5-6y57_firmwarexeon_e5-2637_v3_firmwarexeon_e5-2428l_v2_firmwarexeon_e5-4640_v3xeon_e5-4650_v4_firmwarecore_i5-9600txeon_silver_4110_firmwarecore_i5-8600txeon_e5-1428l_v3core_i7-9700_firmwarexeon_platinum_8180xeon_d-2177ntxeon_e-2146gxeon_e5-2628l_v3_firmwarexeon_e5-2650l_v3xeon_w-2175xeon_e7-2880_v22019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0188
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.15%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Return of pointer value outside of expected range in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e3-1235l_v5_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240l_v5xeon_e3-1575m_v5xeon_e3-1240_v6_firmwarexeon_e3-1220_v5xeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarexeon_e3-1268l_v5xeon_e3-1230_v6xeon_e3-1285_v6_firmwarexeon_e3-1501l_v6xeon_e3-1505m_v5xeon_e3-1220_v5_firmwarexeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_e3-1535m_v6xeon_e3-1535m_v6_firmwarexeon_e3-1585_v5_firmwarexeon_e3-1220_v6xeon_e3-1240_v6xeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e3-1501m_v6xeon_e3-1220_v6_firmwarexeon_e3-1545m_v5_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1585l_v5xeon_e3-1535m_v5_firmwarexeon_e3-1505l_v5_firmwarexeon_e3-1245_v5xeon_e3-1501m_v6_firmwarexeon_e3-1275_v5xeon_e3-1280_v5_firmwarexeon_e3-1505l_v6xeon_e3-1225_v6xeon_e3-1280_v6xeon_e3-1558l_v5_firmwarexeon_e3-1280_v5xeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_e3-1235l_v5xeon_e3-1225_v5_firmwarexeon_e3-1245_v6_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1565l_v5_firmwarexeon_e3-1275_v6xeon_e3-1225_v6_firmwarexeon_e3-1270_v6xeon_e3-1275_v6_firmwarexeon_e3-1545m_v5xeon_e3-1515m_v5_firmwarexeon_e3-1505m_v6xeon_e3-1230_v5_firmwarexeon_e3-1270_v5_firmwarexeon_e3-1535m_v5xeon_e3-1578l_v5xeon_e3-1245_v6xeon_e3-1505m_v6_firmwarexeon_e3-1505l_v5xeon_e3-1240l_v5_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1260l_v5xeon_e3-1280_v6_firmwarexeon_e3-1268l_v5_firmwarexeon_e3-1575m_v5_firmwarexeon_e3-1225_v5xeon_e3-1270_v5xeon_e3-1515m_v5xeon_e3-1558l_v5xeon_e3-1270_v6_firmwarexeon_e3-1245_v5_firmwareIntel(R) Processors
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0189
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.20%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of out-of-range pointer offset in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e7-4820_v4xeon_e-2286gxeon_gold_5215xeon_e3-1240_v6_firmwarexeon_e3-1220_v5xeon_e-2174g_firmwarexeon_platinum_8260yxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarexeon_e-2246gxeon_e3-1230_v6xeon_platinum_8260y_firmwarexeon_e-2374gxeon_gold_5218txeon_e3-1501l_v6xeon_e-2254ml_firmwarexeon_e7-4809_v4_firmwarexeon_e7-8867_v4xeon_e-2378xeon_e-2236xeon_e3-1220_v5_firmwarexeon_platinum_8280_firmwarexeon_e-2374g_firmwarexeon_gold_5218nxeon_silver_4209t_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarexeon_gold_6250lxeon_gold_6209uxeon_e7-8891_v4xeon_e-2278g_firmwarexeon_e3-1240_v6xeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e-2278gexeon_platinum_8253xeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_gold_6252nxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_e7-8894_v4xeon_platinum_8270_firmwarexeon_gold_6230txeon_silver_4210rxeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e-2236_firmwarexeon_e-2244g_firmwarexeon_platinum_8280xeon_gold_6238l_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarexeon_gold_5220t_firmwarexeon_gold_6252xeon_gold_5220rxeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_gold_6246xeon_gold_6226r_firmwarexeon_e-2276mlxeon_e3-1235l_v5xeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarexeon_silver_4210r_firmwarexeon_e3-1270_v6xeon_e3-1545m_v5xeon_gold_6256_firmwarexeon_platinum_9221xeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_e-2276me_firmwarexeon_platinum_9222_firmwarexeon_e7-8891_v4_firmwarexeon_silver_4208xeon_e-2136_firmwarexeon_gold_6210u_firmwarexeon_e-2276mexeon_silver_4210t_firmwarexeon_e-2146gxeon_gold_5218t_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarexeon_e7-8880_v4_firmwarexeon_gold_5215lxeon_e-2146g_firmwarexeon_e-2286g_firmwarexeon_e3-1515m_v5xeon_platinum_8253_firmwarexeon_gold_6238xeon_e-2126g_firmwarexeon_gold_6240lxeon_e3-1260l_v5_firmwarexeon_gold_6248xeon_e3-1240l_v5xeon_e-2136xeon_e-2378_firmwarexeon_gold_6258rxeon_platinum_8256xeon_gold_6240l_firmwarexeon_e-2288g_firmwarexeon_platinum_9282xeon_e-2276mxeon_e-2224gxeon_silver_4215_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarexeon_e3-1505m_v5xeon_gold_6252_firmwarexeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarexeon_bronze_3206rxeon_silver_4208_firmwarexeon_e7-4820_v4_firmwarexeon_gold_6240xeon_e-2144g_firmwarexeon_e3-1585l_v5xeon_gold_5220xeon_e-2378g_firmwarexeon_platinum_8256_firmwarexeon_e3-1275_v5xeon_e-2246g_firmwarexeon_gold_5218r_firmwarexeon_e3-1558l_v5_firmwarexeon_e-2388gxeon_platinum_8268xeon_e-2226gxeon_silver_4214y_firmwarexeon_gold_6240rxeon_gold_6238_firmwarexeon_e-2226ge_firmwarexeon_silver_4209txeon_e-2226gexeon_e3-1225_v6_firmwarexeon_e-2278gxeon_silver_4215rxeon_gold_6212uxeon_e7-8890_v4_firmwarexeon_e-2124xeon_e-2186g_firmwarexeon_silver_4215xeon_gold_6230nxeon_e3-1270_v5_firmwarexeon_platinum_8280l_firmwarexeon_e3-1240l_v5_firmwarexeon_e7-8860_v4_firmwarexeon_e3-1501l_v6_firmwarexeon_e3-1260l_v5xeon_e-2386gxeon_gold_6208uxeon_gold_6242_firmwarexeon_e-2134xeon_e-2388g_firmwarexeon_gold_6230r_firmwarexeon_gold_6242xeon_e-2336xeon_e3-1575m_v5_firmwarexeon_e3-1225_v5xeon_e-2186mxeon_gold_6246_firmwarexeon_e3-1558l_v5xeon_platinum_8260_firmwarexeon_e-2176mxeon_gold_6230t_firmwarexeon_e-2286mxeon_gold_6250_firmwarexeon_gold_5218_firmwarexeon_silver_4210txeon_gold_6244_firmwarexeon_e-2274gxeon_e7-8893_v4xeon_e7-4830_v4xeon_e-2134_firmwarexeon_platinum_8276_firmwarexeon_e3-1268l_v5xeon_e-2226g_firmwarexeon_platinum_8276xeon_gold_6240_firmwarexeon_gold_5220txeon_e-2324g_firmwarexeon_gold_6244xeon_gold_6242rxeon_e-2278ge_firmwarexeon_platinum_9242_firmwarexeon_e-2174gxeon_gold_6226rxeon_e3-1535m_v6xeon_e3-1585_v5_firmwarexeon_e3-1220_v6xeon_gold_6258r_firmwarexeon_bronze_3204xeon_e-2276m_firmwarexeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_e7-4850_v4_firmwarexeon_gold_5218bxeon_gold_6230_firmwarexeon_e-2286m_firmwarexeon_gold_5218b_firmwarexeon_gold_6248_firmwarexeon_e3-1245_v5xeon_e3-1501m_v6_firmwarexeon_e-2176gxeon_e-2288gxeon_e-2274g_firmwarexeon_silver_4214r_firmwarexeon_e3-1225_v6xeon_gold_6254xeon_e3-1280_v6xeon_e7-8880_v4xeon_gold_5218rxeon_e-2176g_firmwarexeon_e-2254mlxeon_e-2124g_firmwarexeon_gold_6240yxeon_e-2224_firmwarexeon_gold_6238lxeon_gold_5218n_firmwarexeon_e7-8890_v4xeon_gold_6246r_firmwarexeon_gold_6246rxeon_e3-1275_v6_firmwarexeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e3-1535m_v5xeon_gold_5220r_firmwarexeon_e3-1505m_v6_firmwarexeon_gold_5222xeon_e7-8870_v4_firmwarexeon_e-2254mexeon_gold_6256xeon_e3-1505l_v5xeon_platinum_8260l_firmwarexeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_platinum_9222xeon_e3-1280_v6_firmwarexeon_gold_5220sxeon_platinum_8260xeon_platinum_8280lxeon_e-2144gxeon_e3-1270_v6_firmwarexeon_e-2244gxeon_e7-8867_v4_firmwarexeon_e3-1245_v5_firmwarexeon_gold_5222_firmwarexeon_silver_4216xeon_platinum_9242xeon_e3-1235l_v5_firmwarexeon_platinum_8276lxeon_e3-1575m_v5xeon_e-2124gxeon_gold_6238txeon_platinum_9221_firmwarexeon_gold_6240r_firmwarexeon_gold_6212u_firmwarexeon_e3-1285_v6_firmwarexeon_gold_6208u_firmwarexeon_gold_6209u_firmwarexeon_e-2356gxeon_platinum_9282_firmwarexeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_platinum_8276l_firmwarexeon_e-2336_firmwarexeon_gold_6250xeon_platinum_8260lxeon_e3-1585_v5xeon_platinum_8270xeon_gold_6248r_firmwarexeon_gold_6262v_firmwarexeon_gold_6226xeon_e-2334xeon_e3-1501m_v6xeon_silver_4214_firmwarexeon_platinum_8268_firmwarexeon_e3-1535m_v5_firmwarexeon_e3-1505l_v5_firmwarexeon_e-2314xeon_e3-1280_v5_firmwarexeon_e-2186gxeon_e-2314_firmwarexeon_gold_6226_firmwarexeon_silver_4210xeon_gold_6250l_firmwarexeon_gold_6234xeon_e3-1280_v5xeon_gold_6252n_firmwarexeon_gold_6262vxeon_gold_6240y_firmwarexeon_e7-4809_v4xeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1565l_v5_firmwarexeon_e3-1275_v6xeon_silver_4210_firmwarexeon_e-2276g_firmwarexeon_e-2224xeon_gold_5218xeon_e-2124_firmwarexeon_gold_6238rxeon_bronze_3204_firmwarexeon_e3-1230_v5_firmwarexeon_e-2278gelxeon_e3-1578l_v5xeon_e3-1245_v6xeon_gold_6222v_firmwarexeon_e-2378gxeon_e-2234_firmwarexeon_bronze_3206r_firmwarexeon_gold_6238r_firmwarexeon_silver_4215r_firmwarexeon_gold_6242r_firmwarexeon_gold_5217xeon_e-2324gxeon_e3-1268l_v5_firmwarexeon_e7-8894_v4_firmwarexeon_e-2276gxeon_gold_6210uxeon_gold_6222vxeon_silver_4216_firmwarexeon_e3-1270_v5xeon_e-2186m_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_e-2234xeon_gold_5217_firmwarexeon_gold_6230Intel(R) Processors
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0054
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.18%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:07
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_8_compute_element_cm8pcbnuc_10_performance_kit_nuc10i5fnhf_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_8_mainstream-g_kit_nuc8i7inh_firmwarenuc_8_pro_board_nuc8i3pnb_firmwarenuc_11_performance_kit_nuc11pahi3nuc_8_business\,_a_mini_pc_with_windows_10_nuc8i7hnkqcnuc_m15_laptop_kit_lapbc710_firmwarenuc_8_mainstream-g_kit_nuc8i5inhnuc_10_performance_mini_pc_nuc10i5fnkpanuc_11_pro_kit_nuc11tnhi30lnuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvanuc_11_pro_kit_nuc11tnhi70qnuc_10_performance_kit_nuc10i5fnh_firmwarenuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarenuc_9_pro_compute_element_nuc9v7qnbnuc_10_performance_mini_pc_nuc10i7fnkpanuc_10_performance_mini_pc_nuc10i5fnhca_firmwarenuc_11_pro_kit_nuc11tnhi70q_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inh_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnhi7nuc_11_pro_kit_nuc11tnhi50lnuc_11_pro_board_nuc11tnbi7nuc_10_performance_kit_nuc10i7fnhcnuc_10_performance_mini_pc_nuc10i3fnhfa_firmwarenuc_10_performance_kit_nuc10i7fnknuc_10_performance_mini_pc_nuc10i5fnhjanuc_kit_nuc8i7hvk_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_m15_laptop_kit_lapbc710nuc_11_performance_kit_nuc11paki5_firmwarenuc_10_performance_mini_pc_nuc10i5fnhja_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_10_performance_mini_pc_nuc10i3fnhja_firmwarenuc_10_performance_kit_nuc10i3fnhfnuc_10_performance_kit_nuc10i3fnk_firmwarenuc_10_performance_kit_nuc10i5fnhj_firmwarenuc_11_pro_kit_nuc11tnhi3_firmwarenuc_10_performance_kit_nuc10i7fnh_firmwarenuc_8_pro_kit_nuc8i3pnknuc_8_pro_board_nuc8i3pnbnuc_11_pro_board_nuc11tnbi5nuc_7_essential\,_a_mini_pc_with_windows_10_nuc7cjysal_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc_10_performance_mini_pc_nuc10i5fnhcanuc_10_performance_kit_nuc10i5fnhnuc_8_compute_element_cm8pcb_firmwarenuc_9_pro_compute_element_nuc9vxqnbnuc_10_performance_kit_nuc10i7fnk_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inhnuc_11_performance_kit_nuc11pahi5_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_8_compute_element_cm8ccbnuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_11_performance_kit_nuc11paki3nuc_11_pro_kit_nuc11tnhi30pnuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_8_rugged_kit_nuc8cchkr_firmwarenuc_10_performance_kit_nuc10i5fnkp_firmwarenuc_10_performance_kit_nuc10i5fnkpnuc_11_performance_mini_pc_nuc11paqi70qanuc_10_performance_mini_pc_nuc10i7fnkpa_firmwarenuc_m15_laptop_kit_lapbc510nuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmwarenuc_10_performance_kit_nuc10i5fnknuc_10_performance_kit_nuc10i7fnkpnuc_10_performance_mini_pc_nuc10i7fnhjanuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_10_performance_kit_nuc10i3fnhf_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_10_performance_mini_pc_nuc10i3fnhfanuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmwarenuc_11_pro_kit_nuc11tnhi70lnuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_8_compute_element_cm8i5cbnuc_kit_nuc7pjyhnuc_11_enthusiast_kit_nuc11phki7cnuc_11_pro_kit_nuc11tnki3_firmwarenuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnhi3nuc_8_pro_kit_nuc8i3pnhnuc_11_performance_kit_nuc11pahi3_firmwarenuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvawnuc_10_performance_kit_nuc10i7fnhnuc_8_compute_element_cm8i3cb_firmwarenuc_8_business\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_board_nuc8cchbnuc_kit_nuc8i7hnknuc_11_pro_board_nuc11tnbi3nuc_11_compute_element_cm11ebi58wnuc_11_performance_mini_pc_nuc11paqi50wanuc_10_performance_kit_nuc10i3fnknuc_kit_nuc8i7hvknuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_board_nuc8cchb_firmwarenuc_11_performance_kit_nuc11pahi7nuc_10_performance_kit_nuc10i5fnhjnuc_kit_nuc8i7hnk_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_10_performance_mini_pc_nuc10i7fnhaanuc_8_compute_element_cm8i3cbnuc_10_performance_kit_nuc10i5fnhfnuc_11_pro_kit_nuc11tnhi5nuc_10_performance_kit_nuc10i3fnhnuc_10_performance_mini_pc_nuc10i7fnhja_firmwarenuc_kit_nuc7cjyhnuc_11_compute_element_cm11ebc4nuc_10_performance_kit_nuc10i7fnkp_firmwarenuc_8_pro_kit_nuc8i3pnh_firmwarenuc_11_pro_kit_nuc11tnki7nuc_10_performance_mini_pc_nuc10i7fnhaa_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_10_performance_kit_nuc10i3fnh_firmwarenuc_11_performance_kit_nuc11paki5nuc_10_performance_mini_pc_nuc10i5fnkpa_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_performance_kit_nuc11paki3_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc_8_pro_kit_nuc8i3pnk_firmwarenuc_11_compute_element_cm11ebc4_firmwarenuc_8_mainstream-g_kit_nuc8i7inhnuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_10_performance_kit_nuc10i7fnhc_firmwarenuc_11_compute_element_cm11ebi38wnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_10_performance_kit_nuc10i5fnk_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_performance_kit_nuc11paki7nuc_8_rugged_kit_nuc8cchkrnuc_kit_nuc7cjyh_firmwarenuc_kit_nuc7pjyh_firmwarenuc_11_performance_kit_nuc11pahi5nuc_11_performance_kit_nuc11pahi7_firmwarenuc_8_compute_element_cm8i7cb_firmwarenuc_11_compute_element_cm11ebi716wnuc_10_performance_mini_pc_nuc10i3fnhjanuc_11_pro_kit_nuc11tnki5nuc_9_pro_kit_nuc9v7qnxnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_pro_kit_nuc11tnhi30l_firmwarenuc_11_pro_kit_nuc11tnhi50w_firmwarenuc_11_pro_kit_nuc11tnki3nuc_7_essential\,_a_mini_pc_with_windows_10_nuc7cjysalnuc_8_compute_element_cm8i7cbnuc_11_pro_kit_nuc11tnhi50wnuc_m15_laptop_kit_lapbc510_firmwareIntel(R) NUCs
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-3670
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.04% / 12.35%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 15:00
Updated-17 Sep, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a buffer overflow.

Action-Not Available
Vendor-Intel Corporation
Product-intel_smart_sound_technologySmart Sound Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-8703
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 20.77%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:48
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel CorporationSiemens AG
Product-core_i7-7700kcore_i7-8705gcore_i7-8665uz270c627core_i3-8300tcore_i7-7660ucore_i7-8706gcore_i7-1068ng7core_i7-11700fcore_i7-1160g7core_i5-1035g7pentium_gold_g5420core_i7-10850hcore_i7-1185grecore_i7-11375hcore_i5-8400hcore_i7-8700core_i5-10400fc621acore_i5-8400core_i5-7y54core_i3-10300core_i3-7100tcore_i7-7700tcore_i7-10700tcore_i3-1110g4core_i7-8086kceleron_4305ucore_i5-10210usimatic_ipc547g_firmwarecore_i5-8257ucore_i7-8700kcore_i5-10200hpentium_gold_g5400tpentium_gold_g6405tq150core_i5-1035g4core_i3-8145ucore_i5-10400hceleron_4205ucore_i7-11700core_i5-7442eqcore_i3-10100ycore_i3-7020ucore_i5-10400tcore_i3-8109ucore_i7-11370hcore_i5-10310ucore_i7-7600ucore_i9-11900tcore_i9-11900kbcore_i5-10505c246core_i5-1030g7xeon_w-1270core_i3-1000ng4core_i3-7100ecore_i5-11600tcore_i3-7300pentium_gold_4417ucore_i7-11850hcore_i9-11900core_i3-1000g1core_i7-10510ycore_i3-10110ucore_i7-11800hcore_i5_l16g7simatic_field_pg_m6_firmwarec625simatic_ipc477ecore_i5-10400simatic_ipc427e_firmwarexeon_w-1270tecore_i5-8400bcore_i7-7700hqcore_i5-1155g7core_i5-10500tecore_i3-10105fcore_i7-7820hkcore_i3-8100hpentium_gold_4415ypentium_gold_g5620core_i9-11950hxeon_w-1290tcore_i5-11600h110core_i5-10300hpentium_gold_g6505tcore_i5-8350ucore_i9-10980hkcore_i5-7300uq270core_i7-11700tcore_i5-8600xeon_w-11855mcore_i5-8500tcore_i7-10510ucore_i5-7500core_i3-10100ecore_i5-1030ng7core_i3-8100core_i7-1060g7simatic_ipc527gcore_i9-11900hcore_i9-10900h410pentium_gold_g6500txeon_w-10855mcore_i5-7200ucore_i9-11900kcore_i3-10100tsimatic_ipc847e_firmwarecore_i9-8950hksimatic_ipc527g_firmwarecore_i9-10900ecore_i7-7700simatic_field_pg_m5core_i9-10850kcore_i9-10900kcore_i7-7920hqcore_i3-7102eh270core_i5-8600ksimatic_ipc477e_firmwareq470core_i9-10900fpentium_gold_g6400tcore_i5-8400tpentium_gold_g5600tsimatic_field_pg_m6xeon_w-1270pcore_i7-8750hcore_i7-10700simatic_ipc477e_procore_i5-8365ub150core_i3-10100tecore_i9-10910core_i5-7600simatic_ipc647ecore_i3-10105txeon_w-1250ecore_i7-10700fcore_i9-10885hcore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i5-1145g7core_i3-1125g4core_i7-10750hq470ecore_i3-7100hcore_i3-8300core_i3-1000g4core_i5-7400tcore_i7-10875hq370core_i3-7100core_i7-8809gcore_i3-8145uecore_i5-7260ucore_i7-8700bcore_i7-8709gsimatic_ipc627ecore_i3-10100pentium_gold_g6505core_i5-7267uxeon_w-1250pcore_i3-1115g4celeron_6305core_i3-8100tcore_i3-8121uh170core_i5-10210yh310core_i5-1140g7core_i7-8557ucore_i5-10500esimatic_ipc547gcore_i7-8700tsimatic_ipc477e_pro_firmwarecore_i5-8300hcore_i5-10600tcore_m3-7y32core_i3-10110ycore_i5-7400core_i5-10600kfcore_i7-8650ucore_i5-11400fc629acore_i7-10700ecore_i5-1145grecore_i3-7320core_i7-1180g7c242pentium_gold_4410ycore_i5-11600kfz370pentium_gold_g5500tcore_i7-11700kfcloud_backupcore_i7-10870hpentium_gold_4415uw480core_i5-1035g1core_i5-1038ng7h420ecore_i5-11500bz170c624mobile_cm246simatic_ipc647e_firmwarex299pentium_gold_6405usimatic_ipc627e_firmwarecore_i5-8500bc627acore_i7-10700kcore_i5-11500tc622core_i7-1185g7core_i7-1165g7core_i7-1195g7core_i5-8269ucore_i5-11600kcore_i7-11390hcore_i5-1030g4core_i7-10700tecore_i5-10500core_i7-11700kcore_i7-10710ucore_i5-7287ucore_i7-10700kfcore_i5-7440eqh370xeon_w-1250texeon_w-1250core_i5-8279uw480exeon_w-1290ecore_i3-7100ucore_i7-8565ucore_i3-7101tecore_i3-7350kcore_i5-11400hcore_i7-11700bcore_i5-7600kcore_i5-8250ucore_i3-10305b365core_i5-7300hqcore_i7-7560uxeon_w-1270epentium_gold_g5420tcore_i7-7820eqcore_i9-11900fcore_i5-8259ucore_i5-7360ucore_i9-11980hkpentium_gold_g5500core_i5-10600kceleron_4305uesimatic_ipc847ecore_i3-8140usimatic_ipc427ecore_m3-8100ycore_i9-10900kfcore_i3-10105core_i3-11100bq170b460simatic_itp1000_firmwarecore_i5-1130g7core_i3-1120g4core_i5-7600tcore_i7-1060ng7core_i7-7500ucore_i7-8550ucore_i5-10310yxeon_w-1290pcore_i5-10500hcore_i5-8260ucore_i5-11320hpentium_gold_4425yb250core_i7-10810upentium_gold_g6500core_i3-1115grecore_i7-8850hcore_i5-11500hcore_i3-7130ucore_i7-10610usimatic_itp1000xeon_w-11955mcore_i3-10100fcore_i3-7167upentium_gold_g6400ecore_i7-8500ycore_i7-7567uc629pentium_gold_7505b360core_i5-10600c621core_i5-11260hsimatic_field_pg_m5_firmwarecore_i3-1115g4epentium_gold_g6400core_i7-7820hqcore_i5-8210ycore_m3-7y30core_i3-7300tcore_i5-8365uecore_i7-8665uexeon_w-1290celeron_6305ecore_i5-1145g7exeon_w-10885mcore_i3-10320core_i9-10900tcore_i5-8200ypentium_gold_g5400simatic_ipc677ecore_i3-10300tcore_i3-7101ecore_i5-8310yxeon_w-1290tecore_i5-1135g7core_i5-11500core_i5-8500c626core_i5-7440hqpentium_gold_g6600core_i7-8569uq250z490core_i5-8265ucore_i5-10500tpentium_gold_g6605core_i7-1185g7econverged_security_and_manageability_enginecore_i3_l13g4pentium_gold_5405ucore_i7-7y75core_i3-1005g1pentium_gold_g6405core_i3-8100bcore_i5-7y57simatic_ipc677e_firmwarecore_i3-10305tcore_i3-8350kcore_i5-11400core_i5-8600tcore_i5-7500tcore_i5-8305gcore_i7-1065g7core_i7-8559ucore_i9-10900tepentium_gold_g6400tez390core_i3-8130uc420h470pentium_gold_6500yc628pentium_gold_g5600Intel(R) CSME versions
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-32569
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.42%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in BIOS firmware for some Intel(R) NUC M15 Laptop Kits before version BCTGL357.0074 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_lapbc710_firmwarenuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510_firmwareIntel(R) NUC M15 Laptop Kits
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-29510
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 25.55%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bps24compute_module_hns2600bpblc24rserver_board_s2600bpsserver_board_s2600bpqrcompute_module_hns2600bps_firmwarecompute_module_hns2600bpcompute_module_hns2600bpq24_firmwarecompute_module_hns2600bpb24rcompute_module_hns2600bpq_firmwarecompute_module_hns2600bpblc24_firmwareserver_board_s2600bpqr_firmwareserver_system_vrn2224bphy6compute_module_hns2600bpq24r_firmwarecompute_module_hns2600bps24rcompute_module_hns2600bpbserver_board_s2600bpb_firmwarecompute_module_hns2600bpsrserver_system_m70klp4s2uhhserver_system_vrn2224bphy6_firmwarecompute_module_hns2600bpblc_firmwarecompute_module_hns2600bpbrctcompute_module_hns2600bpblcrcompute_module_hns2600bpbr_firmwareserver_system_m20ntp1ur304server_system_vrn2224bpaf6compute_module_hns2600bpqrcompute_module_hns2600bpbrserver_system_vrn2224bpaf6_firmwarecompute_module_hns2600bpb_firmwarecompute_module_hns2600bpr_firmwareserver_board_m20ntp2sbserver_board_m10jnp2sb_firmwareserver_board_s2600bpbrserver_system_m70klp4s2uhh_firmwarecompute_module_hns2600bps24_firmwareserver_board_m70klp2sbcompute_module_hns2600bps24r_firmwareserver_system_zsb2224bpaf2compute_module_hns2600bprcompute_module_hns2600bp_firmwarecompute_module_hns2600bpsr_firmwarecompute_module_hns2600bpb24_firmwareserver_system_mcb2208wfaf5_firmwareserver_board_s2600bpbr_firmwarecompute_module_hns2600bpqcompute_module_hns2600bpblcr_firmwarecompute_module_hns2600bpblc24server_board_s2600bpbserver_system_zsb2224bphy1_firmwareserver_system_m20ntp1ur304_firmwarecompute_module_hns2600bpblc24r_firmwareserver_board_m70klp2sb_firmwareserver_board_s2600bpqserver_board_m10jnp2sbserver_system_zsb2224bpaf1server_board_s2600bpq_firmwarecompute_module_hns2600bpblcserver_system_zsb2224bpaf1_firmwareserver_board_s2600bpsrcompute_module_hns2600bpqr_firmwareserver_board_s2600bps_firmwarecompute_module_hns2600bpb24r_firmwarecompute_module_hns2600bpsserver_board_s2600bpsr_firmwarecompute_module_hns2600bpb24server_system_zsb2224bphy1compute_module_hns2600bpbrct_firmwareserver_system_zsb2224bpaf2_firmwarecompute_module_hns2600bpq24rcompute_module_hns2600bpq24server_board_m20ntp2sb_firmwareserver_system_mcb2208wfaf5Intel(R) Server Board M10JNP2SB BIOS firmware
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12199
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.15% / 36.47%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 23:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in an OS component in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel TXE version before 3.1.60 or 4.0.10 may allow a privileged user to potentially execute arbitrary code via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-5174
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.67%
||
7 Day CHG~0.00%
Published-15 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.

Action-Not Available
Vendor-n/aIntel Corporation
Product-7500_chipsetc206_chipsetmobile_intel_gm45_chipset3450_chipsetmobile_intel_qm57_chipsetx58_chipsetmobile_intel_qs67_chipsetmobile_intel_qm67_chipset5520_chipsetq35_express_chipsetmobile_intel_pm45_express_chipset5500_chipsetsinit_authenticated_code_modulec204_chipsetmobile_intel_qs57_express_chipsetc202_chipsetq67_express_chipsetq57_chipsetmobile_intel_qs57_chipsetmobile_intel_gs45_chipsetn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12214
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.18% / 39.55%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12191
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.6||HIGH
EPSS-0.25% / 47.72%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 22:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bounds check in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before versions 4.00.04.383 or SPS 4.01.02.174, or Intel(R) TXE before versions 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially execute arbitrary code via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareconverged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12201
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.33% / 54.99%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow vulnerability in Platform Sample / Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor, Intel(R) Pentium(R) Silver J5005 Processor, Intel(R) Pentium(R) Silver N5000 Processor, Intel(R) Celeron(R) J4105 Processor, Intel(R) Celeron(R) J4005 Processor, Intel Celeron(R) N4100 Processor and Intel(R) Celeron N4000 Processor may allow privileged user to potentially execute arbitrary code via local access.

Action-Not Available
Vendor-Intel Corporation
Product-core_i5platform_sample_firmwareceleronpentium_silversilicon_reference_firmwarecore_i7core_i3Intel Platform Sample / Silicon Reference firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0119
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.79%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s7200aphns2600kp_firmwarexeon_d-1627_firmwarehns2600tpnr_firmwarexeon_d-1527xeon_gold_processors_firmwarexeon_silver_processorsxeon_d-1523nserver_board_s2600kphns2600jff_firmwarexeon_d-1540xeon_d-1653nxeon_d-2163it_firmwareserver_board_s2600cw_firmwarexeon_d-1528xeon_d-1637xeon_d-1577xeon_d-1521_firmwarexeon_d-1527_firmwarexeon_d-2141ixeon_d-1557_firmwarexeon_d-1541hns2600bpq24_firmwarexeon_d-1543n_firmwarexeon_d-1518xeon_d-1633n_firmwarehns2600bpb24hns2600tpfrhns2600bpblc24xeon_d-2143ithns7200ap_firmwarexeon_d-2163itxeon_d-1653n_firmwareserver_board_s1200sphns2600kpr_firmwarexeon_d-2161i_firmwarehns2600tpfr_firmwarehns2600jf_firmwarexeon_d-1553nserver_board_s2600st_firmwarehns2600tpfxeon_d-1567_firmwaremfs5000si_firmwarexeon_d-1571_firmwarehns2600tp_firmwarexeon_d-1567server_board_s2600tpxeon_d-1633nhns2600bpbxeon_d-1548xeon_d-2173it_firmwarexeon_d-1649nxeon_d-1529hns7200aprlhns2600tp24str_firmwarehns2600wpq_firmwarexeon_bronze_processorsxeon_d-2191xeon_d-1531_firmwarexeon_d-1518_firmwarexeon_d-2123it_firmwarexeon_platinum_processorsxeon_silver_processors_firmwarehns2600kphns2600kpfxeon_platinum_processors_firmwarehns7200aplhns2400lpxeon_d-1520xeon_d-1571mfs5000sixeon_d-2146nt_firmwareserver_board_s2600sthns2600bpb24_firmwarexeon_d-2173itserver_board_s1200sp_firmwaremfs2600kixeon_d-2123ithns2600tp24strxeon_d-2177nt_firmwarexeon_gold_processorsxeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwareserver_board_s2600wt_firmwarehns2600bpblc24_firmwarexeon_d-1623nxeon_d-1531xeon_d-1602hns7200aphns2600tprserver_board_s2600tp_firmwaremfs5520vir_firmwarehns2600wp_firmwarexeon_d-1539xeon_d-1533nhns2600tpf_firmwareserver_board_s2600cwhns2600bpq_firmwarehns2600bpqmfs5520virxeon_d-2142itserver_board_s2600wthns2600bps_firmwarexeon_d-1622_firmwarexeon_d-1649n_firmwarehns2600bpblcxeon_d-2146ntxeon_d-1577_firmwarexeon_d-2145nt_firmwarehns2600jffhns2600wpqxeon_d-2161ixeon_d-2141i_firmwarehns2600wpxeon_d-2187nthns2600kpfrhns2600kprhns7200apl_firmwarexeon_d-1537_firmwarexeon_bronze_processors_firmwareserver_board_s2600bpxeon_d-1541_firmwarehns2600bpsserver_board_s2600bp_firmwarehns2600bpblc_firmwarexeon_d-2166nt_firmwarehns2600bps24xeon_d-2166nthns2600bpq24xeon_d-1623n_firmwarehns2600tpxeon_d-1548_firmwarehns7200apr_firmwarehns2600tpnrxeon_d-2183ithns2600tpr_firmwarehns2600jfq_firmwarexeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-1622xeon_d-1559_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_d-1539_firmwaremfs2600ki_firmwarexeon_d-1559xeon_d-1521hns2600kpfr_firmwareserver_board_s2600wfxeon_d-2145ntxeon_d-2191_firmwarehns7200aprl_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_d-1637_firmwarehns2600jfserver_board_s7200ap_firmwarehns7200aprhns2600tp24srserver_board_s2600kp_firmwarehns2400lp_firmwarehns2600wpf_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwarehns2600bpb_firmwarehns2600jfqxeon_d-2143it_firmwareserver_system_s9200wkxeon_d-1557server_system_s9200wk_firmwarehns2600tp24rhns2600kpf_firmwarehns2600wpfxeon_d-1513n_firmwarexeon_d-1602_firmwarexeon_d-1523n_firmwareserver_board_s2600wf_firmwarehns2600bps24_firmwarexeon_d-2177ntxeon_d-1553n_firmwarehns2600tp24sr_firmwarehns2600tp24r_firmwareIntel(R) Unified Extensible Firmware Interface (UEFI)
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0152
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.62%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:06
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8276lxeon_platinum_8153xeon_platinum_8170_firmwarexeon_bronze_3104_firmwarexeon_gold_6146xeon_gold_6126txeon_gold_6126f_firmwarexeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_w-2125xeon_w-2155_firmwarexeon_gold_5217_firmwarexeon_gold_6138xeon_gold_6246xeon_d-2163it_firmwarexeon_platinum_8164xeon_gold_6240_firmwarexeon_gold_5215mxeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_d-2143itxeon_d-2163itxeon_platinum_8168xeon_gold_6244_firmwarexeon_d-2161i_firmwarexeon_gold_5218xeon_gold_6238m_firmwarexeon_platinum_8284xeon_silver_4109txeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_5122_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6212u_firmwarexeon_gold_6212uxeon_gold_6126_firmwarexeon_platinum_8280mxeon_gold_6240l_firmwarexeon_silver_4114xeon_d-2123it_firmwarexeon_platinum_8276_firmwarexeon_bronze_3104xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6150_firmwarexeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5220s_firmwarexeon_gold_5215_firmwarexeon_platinum_8260y_firmwarexeon_gold_6144_firmwarexeon_platinum_8274xeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_5218txeon_gold_6240y_firmwarexeon_gold_6150xeon_gold_6242_firmwarexeon_gold_6140xeon_silver_4114_firmwarexeon_gold_6230_firmwarexeon_d-2146ntxeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_gold_6210uxeon_d-2187ntxeon_gold_6126xeon_platinum_8158_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_gold_6140m_firmwarexeon_silver_4216xeon_platinum_8253xeon_gold_6230xeon_w-2195xeon_gold_6134_firmwarexeon_gold_6130t_firmwarexeon_gold_6130f_firmwarexeon_d-2183itxeon_gold_6142fxeon_w-2145_firmwarexeon_d-2145ntxeon_platinum_8153_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_gold_6130xeon_platinum_8260mxeon_silver_4214y_firmwarexeon_silver_4208xeon_platinum_8260xeon_platinum_8160t_firmwarexeon_bronze_3204_firmwarexeon_silver_4214_firmwarexeon_d-2142it_firmwarexeon_w-2123xeon_gold_5220sxeon_platinum_8280m_firmwarexeon_d-2143it_firmwarexeon_platinum_9242xeon_platinum_9282xeon_platinum_8280lxeon_silver_4110xeon_platinum_9242_firmwarexeon_bronze_3204xeon_platinum_8280_firmwarexeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_5217xeon_platinum_8276mxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_gold_6138txeon_bronze_3106xeon_gold_6238mxeon_gold_5120xeon_gold_5220xeon_gold_6154_firmwarexeon_platinum_8160txeon_gold_6254xeon_silver_4209t_firmwarexeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_d-2141ixeon_gold_5215l_firmwarexeon_silver_4208_firmwarexeon_w-2195_firmwarexeon_platinum_8268xeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_silver_4209txeon_w-2133_firmwarexeon_silver_4116xeon_gold_6240mxeon_gold_6210u_firmwarexeon_gold_6252nxeon_gold_6244xeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_platinum_8274_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_w-2135_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_5218_firmwarexeon_gold_6132xeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_d-2146nt_firmwarexeon_platinum_8158xeon_gold_6238l_firmwarexeon_w-2155xeon_gold_5218b_firmwarexeon_w-2135xeon_gold_6222vxeon_w-2125_firmwarexeon_platinum_8176xeon_platinum_8160_firmwarexeon_gold_6242xeon_w-2175_firmwarexeon_silver_4112_firmwarexeon_w-2145xeon_gold_6262v_firmwarexeon_platinum_8260yxeon_platinum_8270xeon_platinum_8260m_firmwarexeon_gold_6148_firmwarexeon_gold_6128xeon_w-3175x_firmwarexeon_silver_4215xeon_gold_5220t_firmwarexeon_d-2142itxeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_gold_5220_firmwarexeon_gold_6240m_firmwarexeon_gold_5215m_firmwarexeon_silver_4214xeon_platinum_8276xeon_gold_6142f_firmwarexeon_gold_6238txeon_d-2161ixeon_platinum_8164_firmwarexeon_silver_4214yxeon_d-2141i_firmwarexeon_gold_5218bxeon_silver_4216_firmwarexeon_gold_6254_firmwarexeon_platinum_8276m_firmwarexeon_platinum_8176fxeon_platinum_8284_firmwarexeon_d-2187nt_firmwarexeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_5120txeon_w-3175xxeon_gold_6252xeon_gold_6134xeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_platinum_8260_firmwarexeon_w-2133xeon_gold_6252_firmwarexeon_d-2183it_firmwarexeon_gold_6148xeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6140mxeon_platinum_9282_firmwarexeon_platinum_8180xeon_d-2177ntxeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_w-2175xeon_gold_5220t2019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-21237
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.97%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_11_pro_kit_nuc11tnhi30l_firmwarenuc11dbbi7_firmwarenuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_11_pro_kit_nuc11tnki7nuc11pa_firmwarenuc8i3cysnnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_pro_board_nuc11tnbi50znuc_11_pro_kit_nuc11tnki30z_firmwarenuc_8_compute_element_cm8pcbnuc_8_compute_element_cm8pcb_firmwarelapkc71fnuc_11_pro_board_nuc11tnbi70z_firmwarenuc_11_pro_board_nuc11tnbi7nuc_11_compute_element_cm11ebc4w_firmwarenuc_11_pro_kit_nuc11tnki50znuc_11_pro_kit_nuc11tnki5nuc_kit_nuc8i5benuc8i3cysmlapbc710nuc_11_pro_kit_nuc11tnhi50znuc_8_compute_element_cm8i3cbnuc8i3cysn_firmwarenuc_kit_nuc8i5be_firmwarenuc11pahnuc_11_pro_board_nuc11tnbi30z_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_8_compute_element_cm8ccbnuc11dbbi9_firmwarenuc_11_pro_board_nuc11tnbi5nuc_9_pro_compute_element_nuc9v7qnblapbc710_firmwarelapkc51enuc_11_pro_kit_nuc11tnki3nuc_11_pro_kit_nuc11tnki70znuc_8_compute_element_cm8i7cblapkc71f_firmwarenuc_11_enthusiast_kit_nuc11phki7cnuc11panuc_11_pro_kit_nuc11tnhi70lnuc_11_pro_kit_nuc11tnhi50lnuc_8_compute_element_cm8i7cb_firmwarenuc9i9qnnuc_11_pro_board_nuc11tnbi70znuc_11_pro_kit_nuc11tnhi30znuc_11_pro_kit_nuc11tnhi50w_firmwarelapbc510_firmwarenuc_11_compute_element_cm11ebi716wnuc_11_pro_kit_nuc11tnki30znuc_kit_nuc8i3b_firmwarenuc11btmi9nuc11btmi7nuc9i7qnnuc9i7qn_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_11_pro_kit_nuc11tnhi70qnuc_11_pro_kit_nuc11tnhi70znuc9i5qn_firmwarenuc_kit_nuc8i7be_firmwarenuc_11_pro_kit_nuc11tnhi30lnuc8i3cysm_firmwarelapkc71e_firmwarenuc_11_pro_kit_nuc11tnhi30z_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnki50z_firmwarenuc11paq_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_kit_nuc8i3bnuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc11btmi9_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_11_pro_board_nuc11tnbi30znuc_11_pro_kit_nuc11tnhi3nuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_11_pro_board_nuc11tnbi3nuc_11_pro_kit_nuc11tnhi7nuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarelapbc510nuc_11_pro_kit_nuc11tnki3_firmwarenuc_8_compute_element_cm8i5cbnuc_11_pro_kit_nuc11tnhi70q_firmwarenuc11pah_firmwarenuc_8_compute_element_cm8i3cb_firmwarelapkc51e_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc11paqnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_11_pro_kit_nuc11tnki70z_firmwarenuc_9_pro_kit_nuc9v7qnxnuc_11_compute_element_cm11ebi58wnuc_11_pro_kit_nuc11tnhi5nuc_11_pro_kit_nuc11tnhi3_firmwarenuc_11_pro_board_nuc11tnbi50z_firmwarenuc_11_compute_element_cm11ebc4wnuc11dbbi9nuc11btmi7_firmwarenuc_11_pro_kit_nuc11tnhi50wnuc_kit_nuc8i7benuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_11_pro_kit_nuc11tnhi30pnuc_11_pro_kit_nuc11tnhi70z_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc9i5qnnuc11dbbi7nuc9i9qn_firmwarenuc_11_pro_kit_nuc11tnhi50z_firmwarenuc_9_pro_compute_element_nuc9vxqnblapkc71enuc_11_compute_element_cm11ebi38wIntel(R) NUCs
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-41837
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.2||HIGH
EPSS-0.07% / 20.80%
||
7 Day CHG~0.00%
Published-03 Feb, 2022 | 01:23
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)Siemens AG
Product-simatic_ipc127e_firmwaresimatic_ipc477e_firmwaresimatic_ipc427e_firmwaresimatic_ipc847esimatic_ipc377gsimatic_ipc427esimatic_field_pg_m6insydeh2osimatic_ipc227gsimatic_ipc677esimatic_field_pg_m5_firmwaresimatic_ipc677e_firmwaresimatic_ipc277g_firmwaresimatic_ipc227g_firmwaresimatic_ipc127esimatic_ipc647e_firmwaresimatic_ipc277gsimatic_itp1000_firmwaresimatic_ipc627e_firmwaresimatic_ipc477esimatic_field_pg_m6_firmwaresimatic_ipc627esimatic_ipc847e_firmwaresimatic_ipc647esimatic_field_pg_m5simatic_itp1000simatic_ipc327gsimatic_ipc377g_firmwaresimatic_ipc327g_firmwaren/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-12373
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.40%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:54
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hns2600bpb24rr1304wftysrr2208wf0zsrr1208wftysr2208wftzsrr1304wf0ysr2312wf0nprhns2600bpbr1304wftyshns2600bpqr2224wfqzsr1000wfhns2600bpblc24rs2600bpqrhns2600bpbrs2600stqhns2600bpblcr2308wftzshns2600bpsrr1208wftysrr2208wf0zsr2208wftzsr2312wf0npr1208wfqysrr2224wftzsrr2208wfqzsrs2600stbr2224wftzsr2312wftzsrr2308wftzsrs2600wf0bmc_firmwarehns2600bps24rhns2600bpqrs2600wfqr2208wfqzshns2600bpshns2600bpq24rhns2600bpb24hns2600bps24r1304wf0ysrhns2600bpq24s2600wfts2600bpbrhns2600bpblc24s2600bpsrr2312wfqzsr2312wftzsIntel(R) Graphics Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-25545
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.09% / 26.20%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_m50cyp2ur208server_system_d50tnp2mfalacserver_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5705
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-manageability_engine_firmwareManageability Engine
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5706
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.53%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareServer Platform Services
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5711
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.97%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)Siemens AGIntel Corporation
Product-rog_strix_z270g_gaming_firmwareh110-plus_firmwareh170m-plus\/brsimatic_ipc627dprime_h110m-ptuf_z270_mark_2rog_strix_z270h_gaming\/k1prime_j3355i-cb150i_pro_gaming\/aurasimatic_ipc827ch110m-a\/dp_firmwaresimatic_ipc477d_firmwareq170t_firmwareb250m-f_plush110m-ksh110m-a_d3ex-b150m-v5rog_strix_b250i_gaming_firmwareh170_pro_gamingsimotion_p320-4strooper_b150_d3_firmwareh110s2b150m-dtuf_z370-plus_gaming_firmwareh110m-ts_firmwaresimatic_ipc647d_firmwareb150-asimatic_ipc477db150m-plus_d3_firmwarerog_maximus_viii_hero_firmwarerog_strix_z270f_gamingrog_maximus_viii_ranger_firmwareb150m-v_plus_firmwareprime_q270m-ch110-plush110s2_firmwareh110m-e_firmwareprime_h110m2\/fpt_firmwaresabertooth_z170_mark_1h110m-c\/hdmi_firmwaresinumerik_pcu50.5-p_firmwaretuf_z370-pro_gaming_firmwarerog_maximus_viii_hero_alpha_firmwarerog_maximus_ix_hero_firmwarez170-krog_strix_b250g_gaming_firmwarerog_strix_z370-f_gamingb150m-ah110m-aex-b250m-v5z170-prosimatic_ipc477eb150m-k_d3prime_h110m2_firmwarerog_maximus_viii_formulaprime_b250m-dsimatic_field_pg_m3_firmwarerog_maximus_ix_extremesimatic_ipc677cb150m-k_firmwareq170s1_firmwareex-b150m-v3_firmwareprime_b250m-jb150m-a_d3_firmwarez170m-e_d3z170-k_firmwarepio-b150m_firmwarerog_strix_h270i_gaming_firmwareh170m-plush110m-ks_r1_firmwareex-b250-v7b150m-plusz170-ar_firmwareh110m-plusb150m-v_plush110m-kex-b150-v7_firmwareh110m-a_d3_firmwarerog_strix_b250h_gaming_firmwareh110m-c\/br_firmwarez170m-plus\/brprime_h270-plus_firmwareprime_h110m2\/fptprime_z270m-plus\/br_firmwareh110t-a_firmwareh110i-plus_firmwaresimatic_ipc627d_firmwaresimatic_field_pg_m3prime_z270-kh170i-pro_firmwaresimatic_field_pg_m4simatic_ipc627ch170i-prob150m-plus_d3z170-premium_firmwaresabertooth_z170_mark_1_firmwareb150m-f_plush170m-e_d3z170-eb150-pro_firmwarepio-b150mrog_maximus_ix_codeprime_b250-plus_firmwareh110m-c_firmwarerog_maximus_x_hero_firmwaresimatic_itp1000simatic_ipc427d_firmwareh110m-e\/m.2_firmwareprime_h110m2rog_maximus_x_formularog_maximus_x_formula_firmwareh110m-d\/exper\/sib150_pro_gaming\/aura_firmwaremanageability_engine_firmwarerog_maximus_ix_herorog_strix_z270i_gamingh170-plus_d3_firmwareex-b150m-v_firmwareq170m-cm-brog_strix_z370-g_gamingprime_z270-arb150-pro_d3rog_strix_z270h_gamingh110m-cs\/br_firmwarerog_strix_z370-i_gamingrog_strix_z370-h_gaming_firmwareh110m-d_firmwaresabertooth_z170_sb150_pro_gamingh110m-a\/m.2q270m-cm-asimatic_ipc847c_firmwareh110m-rh170-pro\/usb_3.1_firmwareq170m2_firmwareb150m-kprime_z270m-plus_firmwareh110m-a_firmwareex-h110m-v3_firmwareh110m-k_x_firmwarez170m-e_d3_firmwareh170_pro_gaming_firmwareb150m-k_d3_firmwarerog_strix_z270f_gaming_firmwarerog_strix_b250f_gamingh110m-cs\/brq170s1ex-b250-v7_firmwaresabertooth_z170_s_firmwarerog_strix_b250h_gamingh110m-d\/exper\/si_firmwareex-b150m-v5_firmwareprime_b250m-d_firmwareh110m-p\/dvib150i_pro_gaming\/aura_firmwaresimatic_ipc647db150m-f_plus_firmwareh110m-ks_r1h110m-c\/ps_firmwareb150-proprime_h270-proex-h110m-v_firmwareex-b250m-v3rog_strix_z270g_gamingrog_maximus_ix_formula_firmwarerog_maximus_viii_gene_firmwareprime_z270-p_firmwareex-h110m-v3h110m-c2\/tf_firmwarez170-p_firmwareq270-sactive_management_technology_firmwaresimatic_ipc427e_firmwarez170m-plustrooper_h110_d3z170-deluxe_firmwaresimatic_ipc547d_firmwaresimatic_ipc847cprime_q270m-c_firmwaresimatic_ipc547dh170m-plus_firmwareb250_mining_expert_firmwarerog_strix_h270i_gamingrog_strix_z270h_gaming\/k1_firmwareprime_z370-pz170-e_firmwarerog_maximus_viii_extreme_firmwareb250_mining_expertb150m-a_d3simatic_ipc677dh110m-c2prime_b250m-a_firmwaresimatic_ipc627c_firmwareprime_b250m-plus\/br_firmwarez170-ah110m-k_firmwaretuf_z270_mark_1_firmwareb150_pro_gaming_d3q170m-c_firmwarez170_pro_gaming\/auraex-b250m-vh110m-a\/m.2_firmwareb150m-d_firmwarerog_strix_b250f_gaming_firmwareprime_z370-a_firmwaresinumerik_pcu50.5-crog_maximus_x_code_firmwarerog_maximus_viii_impactsimatic_ipc827d_firmwareprime_b250m-plus_firmwarez170-deluxeb150m-cprime_b250m-plush110m-cs_xb150-pro_d3_firmwareprime_b250-proz170-a_firmwareb150_pro_gaming_d3_firmwareb150-plusprime_z270-a_firmwareprime_z270-k_firmwareh110m-c\/hdmisimatic_itp1000_firmwareprime_b250-a_firmwareprime_b250-arog_maximus_viii_geneh110t-aex-b250m-v5_firmwaresimatic_ipc647c_firmwareb150-a_firmwaresimatic_ipc427drog_maximus_viii_impact_firmwareq170th110m-r_firmwareh110m-crog_maximus_ix_apex_firmwareprime_z270-ar_firmwarez170_pro_gaming\/aura_firmwareh110m-fprime_b250m-k_firmwareprime_b250m-j_firmwarerog_strix_z370-e_gamingprime_b250m-c_firmwarerog_strix_z270i_gaming_firmwareprime_b250m-ah110m-p\/dvi_firmwareb150m-a_firmwareh170-plus_d3h110m-c\/brrog_strix_b250g_gamingb250-srog_maximus_ix_extreme_firmwareprime_z270m-plusb150_pro_gaming_firmwareex-b150-v7prime_j3355i-c_firmwareb150m-c_d3_firmwaresimatic_ipc427eprime_b250-pro_firmwareh110tq170m2\/cdm\/sib150m-a\/m.2z170_pro_gaming_firmwarerog_strix_z270e_gaming_firmwareb150m-c_firmwarerog_strix_z370-e_gaming_firmwareb150_pro_gaming\/auraq170m2prime_b250m-kprime_z370-aex-h110m-vh110m-dq170t_v2b150m-plus_firmwaresimatic_ipc647csinumerik_pcu50.5-c_firmwareb150m-a\/m.2_firmwareprime_h110m-p_firmwarez170-pro_firmwaresimatic_ipc847dh110m-k_d3z170-premiumex-b250m-v_firmwarerog_strix_z370-g_gaming_firmwareh110i-plussimatic_ipc477d_pro_firmwareb250m-f_plus_firmwarerog_maximus_viii_rangerh110m-plus_firmwareh110m-f_firmwareex-b150m-vtrooper_h110_d3_firmwarerog_maximus_x_apex_firmwarez170i_pro_gamingsimatic_field_pg_m5_firmwaretrooper_b150_d3simatic_ipc677d_firmwarerog_maximus_ix_apexh110m-a\/dpb150m-c\/brrog_strix_z370-i_gaming_firmwareh170-pro_firmwareb150i_pro_gaming\/wifi\/aura_firmwareh110m-erog_maximus_x_heroh110m-cs_firmwareh110m-cssimatic_field_pg_m4_firmwareh110m-cs_x_firmwareb150m-c_d3rog_maximus_viii_extremeh110s1_firmwaretuf_z270_mark_1z170m-plus\/br_firmwareex-b150m-v3prime_z270-pb150-plus_firmwareprime_z370-p_firmwareq170m2\/cdm\/si_firmwarerog_maximus_ix_formulatuf_z370-pro_gamingh170m-e_d3_firmwareb250m-c_prorog_strix_b250i_gamingrog_strix_z370-h_gamingprime_z270m-plus\/brh110m-ks_firmwareb250-mr_firmwareq170m-cm-b_firmwaresimatic_ipc477e_firmwarerog_strix_h270f_gamingrog_strix_z370-f_gaming_firmwareh110s1prime_h270m-plusz170-p_d3prime_b250m-cz170i_pro_gaming_firmwarerog_maximus_viii_heroh110m-tssimatic_ipc477d_propio-b250i_firmwareq170t_v2_firmwareprime_h270m-plus_firmwareb150m-c\/br_firmwareq170m-crog_maximus_x_codetuf_z370-plus_gamingb250-mrh170-prosimatic_ipc547erog_maximus_viii_formula_firmwareb250m-c_pro_firmwarerog_strix_h270f_gaming_firmwareh170-pro\/usb_3.1z170-p_d3_firmwarerog_maximus_x_apexpio-b250ib150m_pro_gaming_firmwarez170m-plus_firmwaresimatic_ipc547e_firmwaresimatic_ipc827dh110m-c\/psh110m-k_d3_firmwarerog_maximus_viii_hero_alphasimatic_field_pg_m5b150i_pro_gaming\/wifi\/aurarog_strix_z270h_gaming_firmwarerog_maximus_ix_code_firmwareprime_h270-pro_firmwareb150m_pro_gamingh110m-c2\/tfq270m-cm-a_firmwareh110m-c2_firmwarerog_strix_z270e_gamingtuf_z270_mark_2_firmwaresimatic_ipc677c_firmwareprime_b250m-plus\/brq270-s_firmwareh110t_firmwareex-b250m-v3_firmwarez170-ph110m-e\/m.2z170-arh110m-k_xsinumerik_pcu50.5-pb250-s_firmwareprime_z270-asimotion_p320-4s_firmwareprime_b250-plusprime_h270-plussimatic_ipc847d_firmwareh170m-plus\/br_firmwarez170_pro_gamingsimatic_ipc827c_firmwareActive Management Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-5707
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.39%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in kernel in Intel Trusted Execution Engine Firmware 3.0 allow attacker with local access to the system to execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-trusted_execution_engine_firmwareTrusted Execution Engine
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-41838
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.2||HIGH
EPSS-0.06% / 17.73%
||
7 Day CHG~0.00%
Published-03 Feb, 2022 | 01:43
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)Siemens AG
Product-simatic_ipc127e_firmwaresimatic_ipc477e_firmwaresimatic_ipc427e_firmwaresimatic_ipc847esimatic_ipc377gsimatic_ipc427esimatic_field_pg_m6insydeh2osimatic_ipc227gsimatic_ipc677esimatic_field_pg_m5_firmwaresimatic_ipc677e_firmwaresimatic_ipc277g_firmwaresimatic_ipc227g_firmwaresimatic_ipc127esimatic_ipc647e_firmwaresimatic_ipc277gsimatic_itp1000_firmwaresimatic_ipc627e_firmwaresimatic_ipc477esimatic_field_pg_m6_firmwaresimatic_ipc627esimatic_ipc847e_firmwaresimatic_ipc647esimatic_field_pg_m5simatic_itp1000simatic_ipc327gsimatic_ipc377g_firmwaresimatic_ipc327g_firmwaren/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-33627
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.2||HIGH
EPSS-0.15% / 35.99%
||
7 Day CHG~0.00%
Published-03 Feb, 2022 | 01:30
Updated-03 Aug, 2024 | 23:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)Siemens AG
Product-simatic_ipc127e_firmwaresimatic_ipc477e_firmwaresimatic_ipc427e_firmwaresimatic_ipc847esimatic_ipc377gsimatic_ipc427esimatic_field_pg_m6insydeh2osimatic_ipc227gsimatic_ipc677esimatic_field_pg_m5_firmwaresimatic_ipc677e_firmwaresimatic_ipc277g_firmwaresimatic_ipc227g_firmwaresimatic_ipc127esimatic_ipc647e_firmwaresimatic_ipc277gsimatic_itp1000_firmwaresimatic_ipc627e_firmwaresimatic_ipc477esimatic_field_pg_m6_firmwaresimatic_ipc627esimatic_ipc847e_firmwaresimatic_ipc647esimatic_field_pg_m5simatic_itp1000simatic_ipc327gsimatic_ipc377g_firmwaresimatic_ipc327g_firmwaren/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-37731
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.2||MEDIUM
EPSS-0.18% / 39.47%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 12:41
Updated-04 Aug, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local path traversal vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.0-2.2.0.4; Prior to 8.7.1.1, 8.6.0.7, 8.5.0.12, 8.3.0.16. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.

Action-Not Available
Vendor-n/aSiemens AGAruba Networks
Product-7240xm9012703070107205arubaos7210scalance_w1750d_firmware9004scalance_w1750dsd-wan9004-lte70057008702472807220Aruba SD-WAN Software and Gateways; Aruba Operating System Software
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-37207
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.96%
||
7 Day CHG~0.00%
Published-09 Nov, 2021 | 11:32
Updated-04 Aug, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to a specific folder containing configuration files. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.

Action-Not Available
Vendor-Siemens AG
Product-sentron_powermanager_3SENTRON powermanager V3
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-33108
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.18%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) In-Band Manageability software before version 2.13.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-in-band_manageabilityIntel(R) In-Band Manageability software
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33122
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 26.27%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i3-9100ecore_i7-12800h_firmwarecore_i3-10100core_i5-11600_firmwarecore_i5-1038ng7core_i5-10400t_firmwarecore_i5-11400core_i9-9900kscore_i7-10510ycore_i7-12650hcore_i7-10710u_firmwarecore_i9-11900_firmwareceleron_n4020_firmwareceleron_n4120core_i3-10100_firmwarecore_i9-10900_firmwarecore_i5-11600kcore_i5-1155g7_firmwarexeon_e-2374gcore_i9-10900tecore_i5-1030g4_firmwarecore_i7-9700k_firmwarecore_i5-1235ucore_i5-9500fcore_i3-10100ycore_i3-9300t_firmwarecore_i5-11260hcore_i5-9500t_firmwarexeon_e-2378core_i3-1115g4ecore_i5-10600tcore_i5-10600kf_firmwarexeon_e-2374g_firmwarecore_i5-9500te_firmwarecore_i7-10875h_firmwarexeon_e-2386g_firmwarecore_i5-9400hcore_i9-10900e_firmwareceleron_n4505core_i9-9900kf_firmwarecore_i3-9320core_i9-11900kfcore_i5-10600t_firmwarecore_i7-11700k_firmwarecore_i5-10300h_firmwarecore_i3-1120g4_firmwarecore_i9-10900tcore_i5-1230ucore_i3-10100t_firmwarecore_i7-10700f_firmwarecore_i5-10500t_firmwarecore_i7-10700tecore_i5-10600_firmwarecore_i9-10900kcore_i3-10105core_i5-9400t_firmwarecore_i5-1140g7_firmwarecore_i5-11400tcore_i3-1215uceleron_n4020core_i7-11700kcore_i5-11400fcore_i9-10900kf_firmwarecore_i5-10400tcore_i5-12600h_firmwarexeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i7-1185g7core_i7-9700kfcore_i9-9880h_firmwarecore_i7-9700xeon_e-2334_firmwarecore_i7-9850hecore_i7-1260ucore_i9-11980hk_firmwarecore_i7-10700kfcore_i7-9850hl_firmwarecore_i7-12850hx_firmwarecore_i7-12800hx_firmwarecore_i9-10900te_firmwareceleron_n4100_firmwarexeon_w-1370p_firmwarecore_i9-11900kcore_i5-10500hcore_i5-11600kf_firmwarecore_i9-12900hkcore_i7-1065g7core_i5-12450hcore_i5-10600kfcore_i3-1000g1core_i5-1130g7_firmwarecore_i7-10700_firmwarecore_i5-1035g1_firmwarecore_i3-1005g1core_i7-1068ng7core_i5-1038ng7_firmwarecore_i9-11900h_firmwarecore_i7-1185gre_firmwarexeon_e-2356g_firmwarecore_i5-9400f_firmwarecore_i3-10305t_firmwarecore_i5-11500he_firmwarecore_i3-1220pcore_i5-9400fcore_i3-10100ecore_i5-11320h_firmwarecore_i9-12900hxcore_i7-10700kf_firmwarecore_i9-10850k_firmwarecore_i5-9500f_firmwarecore_i7-12650h_firmwarecore_i7-11600hcore_i7-9700tcore_i7-10700core_i7-1270p_firmwarecore_i5-1135g7_firmwarecore_i5-11600kfcore_i5-9600t_firmwarecore_i9-11950h_firmwarecore_i7-1265u_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i3-1115g4_firmwarecore_i5-10500e_firmwarecore_i5-1145grecore_i5-11600k_firmwarecore_i5-1135g7core_i5-9300hfxeon_e-2378_firmwarecore_i3-1115g4core_i5-9600kfcore_i5-10400core_i3-9300core_i3-11100he_firmwarecore_i7-10870h_firmwarecore_i3-1120g4core_i5-1155g7core_i3-9300tcore_i7-9700kcore_i5-12500h_firmwarecore_i5-1245u_firmwarecore_i5-11400hcore_i7-11700kf_firmwarecore_i9-11900hcore_i7-12650hx_firmwarecore_i9-12900hk_firmwarecore_i7-9700t_firmwarecore_i7-1185g7ecore_i3-1110g4core_i7-1250u_firmwarecore_i7-10810ucore_i3-10300tpentium_silver_n6000_firmwarecore_i5-1235u_firmwarecore_i5-1130g7core_i7-10700te_firmwarecore_i7-10700exeon_e-2378g_firmwarecore_i9-11900core_i5-9600kcore_i3-10100tecore_i7-10700tcore_i9-9900kfceleron_n4000_firmwarexeon_e-2388gcore_i5-10210u_firmwarecore_i5-1240p_firmwarecore_i7-11390hcore_i7-9700te_firmwarecore_i9-12900hx_firmwarecore_i7-9700kf_firmwarecore_i5-1145g7core_i3-9300_firmwarecore_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kcore_i3-10100te_firmwarexeon_w-1390_firmwarecore_i7-1160g7_firmwarecore_i5-10600k_firmwarecore_i9-10900ecore_i3-9100core_i7-9750hcore_i3-10110y_firmwarepentium_silver_n6005core_i7-11850h_firmwarecore_i7-12850hxcore_i9-11980hkcore_i7-9700f_firmwarecore_i9-11900fcore_i5-10500tecore_i5-10210y_firmwarecore_i5-11500core_i9-11950hcore_i7-11700core_i7-12800hxcore_i5-10500tcore_i5-10600core_i7-1195g7core_i5-10310ucore_i9-10885hcore_i5-12450hxceleron_n4500core_i5-10500_firmwarecore_i7-1265ucore_i5-10310ycore_i5-9500_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_i7-1165g7core_i5-11400_firmwarecore_i7-11850heceleron_n5105_firmwarecore_i3-1215u_firmwarecore_i3-9100tecore_i5-10310y_firmwarecore_i5-12450hx_firmwarecore_i7-10750h_firmwarecore_i5-9300hf_firmwarecore_i5-11500t_firmwarexeon_e-2388g_firmwarecore_i3-1115gre_firmwarecore_i5-1145g7ecore_i7-10700kxeon_e-2336core_i5-1030g7core_i5-1230u_firmwarecore_i5-12450h_firmwarecore_i9-10980hkcore_i7-12650hxcore_i5-11600t_firmwarecore_i9-9880hcore_i3-1000g1_firmwarecore_i5-1240ucore_i7-10700k_firmwarecore_i9-10900t_firmwarecore_i3-9350k_firmwarecore_i7-11370hcore_i5-11400f_firmwarecore_i3-10305_firmwareceleron_n4100core_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i5-11500hcore_i7-1185g7_firmwarecore_i5-1035g4core_i5-11600tcore_i7-11800h_firmwarecore_i7-1180g7_firmwarecore_i7-1280pcore_i9-12950hx_firmwarecore_i7-1060g7_firmwarecore_i7-1068ng7_firmwarecore_i5-9600tcore_i9-11900t_firmwarecore_i5-10200hcore_i9-9900kcore_i3-1110g4_firmwarecore_i3-1210u_firmwareceleron_n4000core_i5-10400fxeon_e-2324g_firmwarecore_i7-1160g7xeon_w-1370core_i5-9600core_i5-1035g7_firmwarecore_i5-9400_firmwarecore_i5-9500core_i9-9900core_i9-12950hxcore_i7-9850hlcore_i3-10320_firmwarecore_i7-1260u_firmwarecore_i7-11850he_firmwarecore_i7-9750hfcore_i7-1180g7xeon_w-1370pcore_i3-10320core_i3-10110ycore_i5-1245ucore_i5-1035g7core_i5-9300h_firmwarecore_i3-10105fcore_i7-1255u_firmwarexeon_w-1390t_firmwarecore_i3-9350kxeon_w-1390core_i7-11700t_firmwarecore_i7-10875hcore_i3-1115grecore_i5-11600core_i7-11700fcore_i7-1195g7_firmwarecore_i3-11100hecore_i5-10400hceleron_n5105core_i7-1270pcore_i5-9600kf_firmwarecore_i3-10100e_firmwarecore_i3-10305tcore_i5-10505_firmwarecore_i3-9350kf_firmwarexeon_w-1370_firmwarepentium_silver_n6005_firmwarecore_i5-1240u_firmwarecore_i5-10600kcore_i9-9900t_firmwarecore_i5-9500e_firmwarecore_i5-9600_firmwarecore_i7-9700e_firmwarecore_i7-1255ucore_i7-9700ecore_i9-11900kf_firmwarecore_i5-12600hcore_i7-10850hcore_i5-10500core_i7-9700tecore_i3-1005g1_firmwarecore_i5-9500tecore_i3-9100hl_firmwarecore_i5-10500te_firmwarecore_i7-12700hcore_i3-10300t_firmwarecore_i5-1145g7e_firmwarecore_i3-10105tcore_i9-9900k_firmwarecore_i5-11300hcore_i7-10510u_firmwarexeon_w-1390p_firmwarecore_i3-1000g4core_i3-10105t_firmwarecore_i5-10400h_firmwarepentium_silver_n6000core_i3-10100f_firmwarecore_i9-10900f_firmwarecore_i3-9100hlcore_i7-11390h_firmwarecore_i9-10900kfcore_i5-12600hxcore_i3-10100tcore_i9-9980hk_firmwarecore_i3-9100f_firmwarecore_i7-12700h_firmwarecore_i7-1280p_firmwarecore_i3-9320_firmwarecore_i9-9980hkcore_i5-11500hecore_i5-12500hcore_i7-11700txeon_w-1390tcore_i5-1035g4_firmwarecore_i7-10700e_firmwarecore_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i3-1220p_firmwarecore_i7-9850h_firmwarecore_i3-9100te_firmwarecore_i5-1030g7_firmwarecore_i7-11700_firmwarecore_i7-11375hcore_i5-9500ecore_i7-1185g7e_firmwarecore_i5-11500tcore_i9-11900tcore_i5-11260h_firmwarecore_i5-9400h_firmwarecore_i9-12900h_firmwarecore_i5-10400f_firmwareceleron_n4120_firmwarecore_i7-11600h_firmwarecore_i7-1060g7core_i5-11400h_firmwarecore_i5-9400core_i7-1185grecore_i5-11400t_firmwarecore_i7-9750h_firmwarecore_i3-10325core_i7-10700t_firmwarexeon_e-2356gcore_i9-9900tcore_i7-9700_firmwarexeon_e-2336_firmwarecore_i5-1145gre_firmwarecore_i3-9350kfceleron_n5100core_i3-10105f_firmwarecore_i3-1210ucore_i3-10105_firmwarecore_i5-11320hxeon_e-2334core_i7-9850hxeon_w-1350core_i3-10110u_firmwarecore_i7-10850h_firmwarexeon_e-2314core_i3-10305core_i5-1035g1celeron_n4505_firmwarecore_i7-11850hcore_i7-9850he_firmwarecore_i9-11900f_firmwarexeon_e-2314_firmwarexeon_w-1390pcore_i3-10110ucore_i7-1250ucore_i3-9100_firmwarecore_i9-10885h_firmwarecore_i5-10505core_i5-1250p_firmwareceleron_n4500_firmwarecore_i3-10100y_firmwarecore_i3-9100e_firmwarecore_i5-11500_firmwarecore_i5-12600hx_firmwarecore_i7-10710uxeon_w-1350pcore_i5-10210ycore_i9-10900core_i3-1000g4_firmwarecore_i5-9400tcore_i7-1065g7_firmwareceleron_n5100_firmwarecore_i5-10300hcore_i7-1165g7_firmwarecore_i9-12900hcore_i5-1145g7_firmwarecore_i9-9900ks_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i3-10300core_i7-11375h_firmwarecore_i3-9100fcore_i7-11700f_firmwarecore_i3-1125g4_firmwarecore_i9-10900fcore_i3-1125g4core_i5-10310u_firmwarecore_i5-1030g4xeon_e-2378gcore_i5-10200h_firmwarecore_i9-10980hk_firmwarecore_i5-11500h_firmwarecore_i7-10870hcore_i5-1240pcore_i5-9500tcore_i3-10100fcore_i7-10510ucore_i5-10400_firmwarecore_i9-9900_firmwarecore_i7-12800hcore_i3-10300_firmwarecore_i5-10500h_firmwarecore_i7-9750hf_firmwarexeon_e-2324gcore_i5-1250pcore_i7-9700fcore_i7-10700fcore_i3-1115g4e_firmwarecore_i5-10210ucore_i5-9600k_firmwarecore_i9-10900k_firmwarecore_i3-9100tcore_i5-11300h_firmwareIntel(R) Processors
CVE-2021-33164
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 12.41%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in BIOS firmware for some Intel(R) NUCs before version INWHL357.0046 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/abios_firmwareIntel Corporation
Product-nuc_8_mainstream-g_kit_nuc8i7inhnuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_8_mainstream-g_kit_nuc8i5inhnuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_8_mainstream-g_mini_pc_nuc8i5inh_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inhnuc_8_mainstream-g_kit_nuc8i7inh_firmwareIntel(R) NUCsintel_r_nucs
CVE-2021-33092
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.35%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:47
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit HID Event Filter driver pack before version 2.2.1.383 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_hid_event_filter_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit HID Event Filter driver pack
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33094
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.35%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:50
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_keyboard_led_service_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-31894
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.35%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 11:02
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.X (All versions < V9.1 SP2), SIMATIC PDM (All versions < V9.2 SP2), SIMATIC STEP 7 V5.X (All versions < V5.7), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 SP2 HF1). A directory containing metafiles relevant to devices' configurations has write permissions. An attacker could leverage this vulnerability by changing the content of certain metafiles and subsequently manipulate parameters or behavior of devices that would be later configured by the affected software.

Action-Not Available
Vendor-Siemens AG
Product-simatic_step_7simatic_pdmsimatic_pcs_7sinamics_startersimatic_pcs_7_firmwaresimatic_step_7_firmwaresinamics_starter_firmwaresimatic_pdm_firmwareSIMATIC STEP 7 V5.XSIMATIC PCS 7 V9.XSIMATIC PCS 7 V8.2 and earlierSINAMICS STARTER (containing STEP 7 OEM version)SIMATIC PDM
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2022-46329
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 6.27%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-debian_linuxfedorakillerwi-fi_6_ax201uefi_firmwareproset\/wireless_wifiIntel(R) PROSet/Wireless WiFi software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-42465
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 20.59%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in kernel mode driver for the Intel(R) OFU software before version 14.1.30 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-one_boot_flash_updateIntel(R) OFU software
CWE ID-CWE-284
Improper Access Control
CVE-2022-32231
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.79%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276lxeon_silver_4210r_firmwarexeon_platinum_8170_firmwarexeon_platinum_9222xeon_bronze_3104_firmwarexeon_gold_6230txeon_gold_6146xeon_gold_6126f_firmwarexeon_gold_6126txeon_platinum_8362xeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_6338xeon_gold_6338t_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_silver_4309yxeon_platinum_8352yxeon_gold_5217_firmwarexeon_platinum_8380h_firmwarexeon_gold_6138xeon_platinum_8360hl_firmwarexeon_gold_6354_firmwarexeon_gold_6246xeon_gold_6326xeon_platinum_8164xeon_gold_5317_firmwarexeon_gold_6240_firmwarexeon_gold_6234xeon_silver_4116t_firmwarexeon_gold_6238rxeon_silver_4316xeon_gold_5318y_firmwarexeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_gold_6348_firmwarexeon_platinum_8168xeon_gold_5318s_firmwarexeon_gold_6244_firmwarexeon_gold_5218xeon_silver_4109txeon_bronze_3206r_firmwarexeon_platinum_8380hxeon_gold_5215lxeon_silver_4215rxeon_gold_6138t_firmwarexeon_gold_5220r_firmwarexeon_silver_4116_firmwarexeon_gold_5122_firmwarexeon_silver_4215_firmwarexeon_platinum_8368q_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_platinum_8376hxeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_silver_4210txeon_platinum_8362_firmwarexeon_gold_6212u_firmwarexeon_gold_6126_firmwarexeon_silver_4310t_firmwarexeon_gold_6212uxeon_silver_4114xeon_gold_6240l_firmwarexeon_gold_6314uxeon_gold_6248rxeon_gold_6250l_firmwarexeon_silver_4214r_firmwarexeon_platinum_8276_firmwarexeon_gold_6258rxeon_bronze_3104xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6150_firmwarexeon_gold_6250xeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwarexeon_platinum_8156xeon_bronze_3106_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8260y_firmwarexeon_platinum_8358p_firmwarexeon_gold_5320xeon_gold_6144_firmwarexeon_platinum_8360yxeon_gold_6330h_firmwarexeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_6338txeon_gold_5218txeon_gold_6150xeon_gold_6240y_firmwarexeon_gold_6242_firmwarexeon_gold_5220rxeon_silver_4114_firmwarexeon_gold_5318sxeon_gold_6140xeon_gold_6230_firmwarexeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_platinum_8356h_firmwarexeon_gold_6250lxeon_gold_6210uxeon_gold_6126xeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8158_firmwarexeon_platinum_8358pxeon_gold_5120_firmwarexeon_gold_6328h_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6134_firmwarexeon_gold_6328hl_firmwarexeon_gold_6130t_firmwarexeon_gold_6242r_firmwarexeon_gold_6342_firmwarexeon_gold_5218r_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4116txeon_gold_6130f_firmwarexeon_gold_6348h_firmwarexeon_platinum_8356hxeon_gold_6246r_firmwarexeon_gold_6142fxeon_platinum_8360y_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_platinum_8153_firmwarexeon_gold_6130xeon_gold_5318h_firmwarexeon_silver_4214y_firmwarexeon_gold_5320txeon_silver_4208xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_gold_6312uxeon_silver_4214_firmwarexeon_gold_5320h_firmwarexeon_gold_5220sxeon_platinum_9242xeon_platinum_9282xeon_gold_5119t_firmwarexeon_platinum_8280lxeon_silver_4110xeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_bronze_3204xeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarexeon_platinum_8280_firmwarexeon_gold_6240r_firmwarexeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_6246rxeon_platinum_8358xeon_gold_5315yxeon_gold_5217xeon_platinum_8352s_firmwarexeon_gold_6230nxeon_silver_4215r_firmwarexeon_platinum_8354hxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_bronze_3106xeon_gold_6138txeon_silver_4310_firmwarexeon_gold_6338n_firmwarexeon_gold_6248r_firmwarexeon_gold_6256_firmwarexeon_platinum_9221_firmwarexeon_gold_5120xeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_platinum_8368xeon_gold_6154_firmwarexeon_gold_5220xeon_platinum_8160txeon_silver_4214rxeon_gold_6254xeon_silver_4209t_firmwarexeon_silver_4310txeon_silver_4114txeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_gold_6230t_firmwarexeon_platinum_8380xeon_gold_6314u_firmwarexeon_gold_5215l_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_silver_4208_firmwarexeon_gold_6208uxeon_gold_6330n_firmwarexeon_platinum_8268xeon_platinum_8352vxeon_gold_6336yxeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_6230n_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_gold_6230r_firmwarexeon_silver_4209txeon_silver_4116xeon_gold_6234_firmwarexeon_gold_6210u_firmwarexeon_platinum_8360hlxeon_gold_6252nxeon_platinum_8380_firmwarexeon_platinum_9221xeon_gold_6244xeon_gold_6330_firmwarexeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_gold_5320_firmwarexeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_gold_6354xeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_6336y_firmwarexeon_gold_5218_firmwarexeon_gold_6132xeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_platinum_8158xeon_gold_6238l_firmwarexeon_gold_6330hxeon_gold_5218b_firmwarexeon_gold_6222vxeon_gold_5318hxeon_platinum_8176xeon_platinum_8160_firmwarexeon_silver_4316_firmwarexeon_platinum_8376hlxeon_gold_6242xeon_silver_4112_firmwarexeon_gold_6262v_firmwarexeon_gold_6142xeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_6148_firmwarexeon_gold_6128xeon_gold_6346xeon_silver_4215xeon_gold_5220t_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_silver_4210t_firmwarexeon_gold_5220_firmwarexeon_gold_6338nxeon_gold_6208u_firmwarexeon_silver_4214xeon_gold_6142f_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarexeon_platinum_8276xeon_gold_6250_firmwarexeon_gold_6238txeon_silver_4210rxeon_platinum_8164_firmwarexeon_silver_4214yxeon_gold_6348xeon_gold_5218bxeon_gold_6330nxeon_platinum_8368_firmwarexeon_silver_4216_firmwarexeon_gold_6138pxeon_gold_6254_firmwarexeon_gold_6138p_firmwarexeon_platinum_8176fxeon_platinum_8352v_firmwarexeon_platinum_8368qxeon_gold_5320t_firmwarexeon_gold_6240rxeon_silver_4310xeon_gold_6258r_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_6256xeon_gold_6238r_firmwarexeon_gold_6342xeon_gold_5120txeon_gold_6230rxeon_gold_6252xeon_gold_6134xeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_5218rxeon_bronze_3206rxeon_gold_6226rxeon_gold_6328hxeon_gold_6252_firmwarexeon_gold_6334_firmwarexeon_gold_6148xeon_silver_4110_firmwarexeon_gold_6209u_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6328hlxeon_platinum_9282_firmwarexeon_platinum_8180xeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_gold_5220tIntel(R) Processors
CWE ID-CWE-665
Improper Initialization
CVE-2022-41804
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.01% / 2.04%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-xeon_d-2796texeon_platinum_8480\+xeon_gold_6403nxeon_d-1627_firmwarexeon_d-2738xeon_platinum_8470xeon_platinum_8362xeon_platinum_8444hxeon_gold_5412uxeon_platinum_8454h_firmwarexeon_gold_5433nxeon_gold_6338xeon_d-2777nxxeon_d-1527xeon_gold_6338t_firmwarexeon_d-2766ntxeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_gold_6414u_firmwarexeon_gold_6434hxeon_gold_6434_firmwarexeon_platinum_8360hl_firmwarexeon_d-1746ter_firmwarexeon_gold_5418y_firmwarexeon_gold_6354_firmwarexeon_d-2163it_firmwarexeon_gold_6433n_firmwarexeon_gold_5416sxeon_gold_6326xeon_d-2776ntxeon_d-1527_firmwarexeon_d-1521_firmwarexeon_d-2798ntxeon_d-1733ntxeon_gold_5317_firmwarexeon_platinum_8480\+_firmwarexeon_d-1557_firmwarexeon_d-2775te_firmwarexeon_d-2766nt_firmwarexeon_gold_6438nxeon_silver_4316xeon_gold_5418nxeon_d-1518xeon_gold_5318y_firmwarexeon_platinum_8468xeon_d-1714xeon_d-2799_firmwarexeon_gold_6434h_firmwarexeon_platinum_8470_firmwarexeon_d-2745nx_firmwarexeon_d-2143itxeon_platinum_8444h_firmwarexeon_gold_6348_firmwarexeon_d-2163itxeon_gold_5318s_firmwarexeon_d-1734nt_firmwarexeon_platinum_8468v_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_d-1567_firmwarexeon_d-1567xeon_d-2777nx_firmwarexeon_platinum_8380hxeon_platinum_8460hxeon_bronze_3408u_firmwarexeon_d-2173it_firmwarexeon_gold_5420\+xeon_platinum_8368q_firmwarexeon_platinum_8376hxeon_d-1746terxeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8362_firmwarexeon_silver_4310t_firmwarexeon_d-1531_firmwarexeon_gold_6314uxeon_d-2123it_firmwarexeon_platinum_8490h_firmwarexeon_gold_5416s_firmwarexeon_d-1715terxeon_d-1571xeon_platinum_8468_firmwarexeon_d-1736_firmwarexeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwarexeon_gold_6438y\+xeon_gold_6448h_firmwarexeon_d-2173itxeon_d-2123itxeon_d-2177nt_firmwarexeon_gold_5418n_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_d-2796ntxeon_platinum_8470qxeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8358p_firmwarexeon_gold_5320xeon_d-2779xeon_platinum_8360yxeon_gold_6330h_firmwarexeon_d-1602xeon_gold_6443nxeon_d-1712trxeon_d-1539xeon_platinum_8461vxeon_d-2796te_firmwarefedoraxeon_gold_6338txeon_gold_6448y_firmwarexeon_d-1713ntexeon_d-2752ter_firmwarexeon_gold_5318sxeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_gold_6414uxeon_d-2146ntxeon_d-1577_firmwarexeon_platinum_8356h_firmwarexeon_d-2145nt_firmwarexeon_platinum_8450h_firmwarexeon_d-1726_firmwarexeon_d-2187ntxeon_d-1732texeon_gold_6448yxeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8358pxeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2776nt_firmwarexeon_d-1732te_firmwarexeon_gold_5433n_firmwarexeon_d-2712t_firmwarexeon_gold_6328h_firmwarexeon_d-1623n_firmwarexeon_gold_6426yxeon_d-1548_firmwarexeon_gold_6328hl_firmwarexeon_d-1713nte_firmwarexeon_gold_6418hxeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_d-2183itxeon_d-1622xeon_d-1559_firmwarexeon_gold_6348h_firmwarexeon_platinum_8356hxeon_gold_6418h_firmwarexeon_platinum_8450hxeon_gold_6433nexeon_d-2145ntxeon_platinum_8360y_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_gold_5318h_firmwarexeon_d-1637_firmwarexeon_gold_6443n_firmwarexeon_gold_6416hxeon_d-1733nt_firmwarexeon_d-2733ntxeon_gold_5320txeon_gold_6430_firmwarexeon_gold_6458q_firmwarexeon_gold_6312uxeon_gold_5320h_firmwarexeon_d-2142it_firmwarexeon_d-2143it_firmwarexeon_d-1736xeon_gold_6428n_firmwarexeon_d-1735trxeon_d-1513n_firmwarexeon_d-2795nt_firmwarexeon_silver_4410txeon_d-2752ntexeon_d-1523n_firmwarexeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarexeon_d-2753nt_firmwarexeon_platinum_8471nxeon_platinum_8358xeon_gold_5420\+_firmwarexeon_gold_5315yxeon_gold_5411n_firmwarexeon_gold_6430xeon_platinum_8352s_firmwarexeon_platinum_8452y_firmwarexeon_platinum_8354hxeon_silver_4416\+xeon_gold_6438mxeon_silver_4310_firmwarexeon_gold_6423nxeon_gold_6421n_firmwarexeon_platinum_8462y\+xeon_gold_6338n_firmwarexeon_platinum_8470q_firmwarexeon_d-1718txeon_gold_6416h_firmwarexeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_d-1523nxeon_d-2786nte_firmwarexeon_d-2786ntexeon_gold_6434xeon_d-1540xeon_platinum_8368xeon_d-1653nxeon_gold_5415\+_firmwarexeon_platinum_8471n_firmwarexeon_d-1528xeon_platinum_8454hxeon_d-1637xeon_d-1577xeon_silver_4310txeon_d-1715ter_firmwarexeon_platinum_8380xeon_d-2141ixeon_gold_6442yxeon_d-1541xeon_gold_6314u_firmwaredebian_linuxxeon_platinum_8458p_firmwarexeon_gold_6438y\+_firmwarexeon_d-1543n_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_d-1633n_firmwarexeon_gold_6330n_firmwarexeon_platinum_8458pxeon_platinum_8352vxeon_gold_6336yxeon_d-1722ne_firmwarexeon_platinum_8470n_firmwarexeon_d-1747ntexeon_gold_5423nxeon_d-2757nx_firmwarexeon_platinum_8460y\+_firmwarexeon_d-1653n_firmwarexeon_gold_6421nxeon_d-1734ntxeon_gold_6433ne_firmwarexeon_d-1735tr_firmwarexeon_platinum_8468h_firmwarexeon_d-1747nte_firmwarexeon_gold_5415\+xeon_d-1553nxeon_gold_6448hxeon_d-1571_firmwarexeon_d-1633nxeon_platinum_8360hlxeon_d-1548xeon_platinum_8380_firmwarexeon_d-1649nxeon_d-1529xeon_platinum_8470nxeon_gold_6330_firmwarexeon_gold_6454s_firmwarexeon_silver_4416\+_firmwarexeon_silver_4410t_firmwarexeon_d-1518_firmwarexeon_platinum_8462y\+_firmwarexeon_gold_5320_firmwarexeon_d-2738_firmwarexeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_d-2757nxxeon_d-1713ntxeon_gold_6438m_firmwarexeon_gold_6354xeon_gold_6336y_firmwarexeon_d-1520xeon_gold_5423n_firmwarexeon_platinum_8490hxeon_d-2752terxeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_d-2799xeon_gold_6444y_firmwarexeon_d-2146nt_firmwarexeon_d-2795ntxeon_platinum_8468hxeon_gold_6330hxeon_d-1739_firmwarexeon_d-1736ntxeon_gold_6428nxeon_gold_5318hxeon_d-1713nt_firmwarexeon_d-1520_firmwarexeon_platinum_8376hlxeon_silver_4316_firmwarexeon_d-2798nt_firmwarexeon_d-1623nxeon_d-1531xeon_d-1533nxeon_silver_4410y_firmwarexeon_d-1722nexeon_gold_6346xeon_d-2142itxeon_gold_6423n_firmwarexeon_d-1718t_firmwarexeon_silver_4410yxeon_platinum_8461v_firmwarexeon_d-1622_firmwarexeon_gold_6338nxeon_d-2796nt_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarexeon_d-1702_firmwarexeon_d-1749nt_firmwarexeon_d-2161ixeon_d-2141i_firmwarexeon_platinum_8460y\+xeon_gold_5418yxeon_gold_6348xeon_gold_6330nxeon_gold_6403n_firmwarexeon_gold_6442y_firmwarexeon_platinum_8368_firmwarexeon_gold_6454sxeon_d-2798nxxeon_platinum_8352v_firmwarexeon_d-2745nxxeon_platinum_8368qxeon_gold_5412u_firmwarexeon_gold_5320t_firmwarexeon_d-1748texeon_silver_4310xeon_gold_6433nxeon_silver_4314_firmwarexeon_d-1513nxeon_d-1537xeon_gold_6334xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1739xeon_d-1543nxeon_d-1528_firmwarexeon_d-1539_firmwarexeon_gold_5411nxeon_d-1559xeon_bronze_3408uxeon_d-1702xeon_d-1521xeon_gold_6444yxeon_gold_6342xeon_gold_6438n_firmwarexeon_gold_6426y_firmwarexeon_d-1748te_firmwarexeon_d-1749ntxeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_d-1712tr_firmwarexeon_d-2798nx_firmwarexeon_platinum_8352sxeon_platinum_8468vxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_6458qxeon_gold_6328hxeon_d-2183it_firmwarexeon_d-2753ntxeon_d-1557xeon_platinum_8452yxeon_gold_6334_firmwarexeon_d-2775texeon_d-1714_firmwarexeon_d-1736nt_firmwarexeon_platinum_8460h_firmwarexeon_d-1602_firmwarexeon_gold_6328hlxeon_d-1726xeon_d-2177ntxeon_d-1553n_firmwareIntel(R) Xeon(R) Processors
CWE ID-CWE-1334
Unauthorized Error Injection Can Degrade Hardware Redundancy
CVE-2022-40964
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.03% / 5.94%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-wireless-ac_9560killer_wireless-ac_1550i\/skillerwi-fi_6e_ax211wi-fi_6e_ax210wireless-ac_9462killer_wi-fi_6e_ax1675x\/wuefi_firmwarewireless-ac_9461killer_wi-fi_6e_ax1675i\/sdebian_linuxkiller_wi-fi_6_ax1650i\/sfedorawi-fi_6_ax201killer_wi-fi_6e_ax1690i\/swi-fi_6e_ax411proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-284
Improper Access Control
CVE-2015-2291
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.25% / 83.93%
||
7 Day CHG-0.24%
Published-09 Aug, 2017 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-03-03||Apply updates per vendor instructions.

(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.

Action-Not Available
Vendor-n/aIntel CorporationMicrosoft Corporation
Product-ethernet_diagnostics_driver_iqvw32.sysethernet_diagnostics_driver_iqvw64.syswindowsn/aEthernet Diagnostics Driver for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2006-6385
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 39.91%
||
7 Day CHG~0.00%
Published-08 Dec, 2006 | 01:00
Updated-07 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.

Action-Not Available
Vendor-n/aIntel Corporation
Product-pro_10gbe_adapterspro_1000_pcie_adapterspro_10_100_adapterspro_1000_adaptersn/a
CVE-2021-0161
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.65%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwareamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0185
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 9.52%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 22:00
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for some Intel(R) Server Board M10JNP Family before version 7.216 may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-m10jnp2sb_firmwarem10jnp2sbIntel(R) Server Board M10JNP Family
CWE ID-CWE-20
Improper Input Validation
CVE-2020-0587
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 36.52%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:55
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lcore_i7-9800xxeon_gold_6222vxeon_platinum_9222core_i7-3930kxeon_gold_5217xeon_gold_6230txeon_gold_6242core_i7-6950xxeon_gold_6230ncore_i7-4960xxeon_gold_5218nxeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_5218txeon_silver_4215core_i9-9980xecore_i9-10940xxeon_gold_5220rcore_i7-6800kxeon_gold_5220xeon_gold_6246core_i9-10900xxeon_silver_4214core_i7-7740xxeon_silver_4214rcore_i7-5820kxeon_platinum_8276xeon_gold_6254xeon_gold_6238tcore_i7-3960xxeon_silver_4210rxeon_gold_6240yxeon_gold_6250lxeon_silver_4214yxeon_gold_6210ucore_i9-10920xxeon_gold_6234core_i9-10980xecore_i7-3940xmxeon_gold_5218bxeon_gold_6238rcore_i7-6850kcore_i7-3970xcore_i9-7940xxeon_gold_6208ucore_i7-4940mxxeon_platinum_8268xeon_gold_5215core_i9-9960xcore_i7-3920xmxeon_gold_6262vcore_i7-4930kxeon_silver_4216core_i9-7920xxeon_gold_6230xeon_platinum_8253xeon_gold_5222xeon_gold_6240rxeon_gold_5218xeon_silver_4209tcore_i5-7640xcore_i9-7900xxeon_gold_6209uxeon_gold_5215lxeon_silver_4215rxeon_gold_6252nxeon_gold_6226xeon_gold_6256core_i7-4820kxeon_platinum_9221core_i7-5960xxeon_gold_6244xeon_gold_6230rxeon_gold_6238xeon_gold_6252xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_gold_6248core_i7-7800xcore_i9-9920xxeon_gold_6212ucore_i7-4930mxxeon_silver_4208core_i9-7980xecore_i7-5930kxeon_gold_5218rxeon_platinum_8280xeon_gold_6248rxeon_gold_6226rxeon_bronze_3206rxeon_gold_5220score_i7-6900kxeon_platinum_9242xeon_platinum_9282core_i7-3820core_i9-9940xxeon_gold_6258rxeon_platinum_8260lxeon_platinum_8280lxeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_bronze_3204xeon_gold_6250biosxeon_platinum_8256core_i9-9820xxeon_gold_5220tcore_i9-9900xxeon_silver_4210Intel(R) Processors
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-0592
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 30.89%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:56
Updated-04 Aug, 2024 | 06:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lxeon_w-2223core_i7-9800xxeon_platinum_9222xeon_e7-4860_v2xeon_w-3245mxeon_gold_5217xeon_gold_6230txeon_e7-8894_v4xeon_e7-8867_v4core_i7-6950xxeon_gold_6230ncore_i7-4960xxeon_w-3225xeon_w-3265xeon_e7-8880l_v2xeon_gold_5218nxeon_e7-2850_v2xeon_w-3245xeon_d-1527xeon_w-2125core_i9-10940xxeon_d-1523nxeon_d-1540xeon_e7-8880_v4xeon_e7-8880_v2xeon_gold_5220xeon_gold_6246xeon_d-1653ncore_i7-7740xxeon_d-1528xeon_silver_4214rcore_i7-5820kxeon_d-1577xeon_gold_6254xeon_d-1637xeon_w-2295xeon_e7-8891_v4core_i7-3960xxeon_gold_6240yxeon_gold_6234xeon_d-2141ixeon_d-1541xeon_e7-4830_v4core_i7-3940xmxeon_e7-4809_v2xeon_gold_6238rxeon_w-1250xeon_d-1518xeon_w-1250texeon_w-2255xeon_gold_6208ucore_i7-4940mxxeon_platinum_8268xeon_gold_5215xeon_e7-4830_v2xeon_e7-8893_v4xeon_w-1290exeon_d-2143itxeon_gold_6262vcore_i7-4930kxeon_d-2163itcore_i9-7920xxeon_gold_5222xeon_w-3275xeon_gold_5218xeon_d-1553nxeon_w-1270xeon_silver_4209txeon_d-1567xeon_w-1270exeon_d-1633nxeon_gold_5215lxeon_silver_4215rxeon_gold_6252nxeon_d-1548core_i7-4820kxeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_w-2245xeon_e7-4820_v4xeon_gold_6244xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_gold_6248xeon_gold_6212uxeon_w-1270tecore_i9-7980xexeon_platinum_8280xeon_gold_6248rxeon_e7-4809_v4core_i7-6900kcore_i9-9940xxeon_gold_6258rxeon_d-1520xeon_e7-8870_v4xeon_w-1290txeon_d-1571xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6250biosxeon_platinum_8256core_i9-9820xxeon_d-2173itxeon_w-2155core_i9-9900xxeon_d-2123itxeon_w-1290pxeon_w-3265mxeon_e7-8857_v2xeon_w-2135xeon_gold_6222vxeon_d-1627xeon_e7-2890_v2core_i7-3930kxeon_gold_6242xeon_e7-8893_v2xeon_w-2265xeon_d-1623nxeon_w-2145xeon_d-1531xeon_e7-4820_v2xeon_d-1602xeon_w-10855mxeon_platinum_8260yxeon_platinum_8270xeon_e7-8890_v4xeon_d-1539xeon_d-1533nxeon_e7-8870_v2xeon_gold_6242rxeon_gold_5218txeon_silver_4215core_i9-9980xexeon_d-2142itxeon_w-2235xeon_gold_5220rcore_i7-6800kxeon_e7-8891_v2xeon_d-2146ntxeon_e7-4850_v2core_i9-10900xxeon_silver_4214xeon_e7-8890_v2xeon_platinum_8276xeon_gold_6238txeon_w-1270pxeon_silver_4210rxeon_gold_6250lxeon_d-2161ixeon_silver_4214yxeon_gold_6210ucore_i9-10920xcore_i9-10980xexeon_d-2187ntxeon_e7-4870_v2xeon_gold_5218bxeon_e7-8860_v4core_i7-6850kcore_i7-3970xcore_i9-7940xcore_i9-9960xxeon_d-2166ntxeon_w-1250exeon_w-1290core_i7-3920xmxeon_e7-4880_v2xeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6240rxeon_w-10885mxeon_w-2195xeon_d-2183itxeon_e7-2870_v2xeon_d-1513nxeon_d-1537xeon_w-2275xeon_d-1622xeon_w-1290tecore_i5-7640xcore_i9-7900xxeon_d-1543nxeon_gold_6209uxeon_w-3223xeon_gold_6226xeon_d-1559xeon_gold_6256xeon_d-1521core_i7-5960xxeon_e7-4890_v2xeon_d-2145ntxeon_gold_6230rxeon_w-3175xxeon_gold_6238xeon_gold_6252xeon_w-1250pcore_i7-7800xcore_i9-9920xcore_i7-4930mxxeon_w-3235xeon_silver_4208xeon_e7-8850_v2core_i7-5930kxeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_w-2225xeon_w-2123xeon_gold_5220sxeon_w-2133xeon_w-3275mxeon_platinum_9242xeon_platinum_9282core_i7-3820xeon_d-1557xeon_e7-4850_v4xeon_platinum_8260lxeon_platinum_8280lxeon_bronze_3204xeon_d-2177ntxeon_w-2175xeon_gold_5220txeon_e7-2880_v2xeon_silver_4210Intel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-18297
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.53%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and low privileges could gain root privileges by sending specifically crafted packets to a named pipe. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_ms3000_migration_serverSPPA-T3000 MS3000 Migration Server
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-14609
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 36.19%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:11
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc7i7dnke_firmwarenuc8i3cysmnuc7i5dnke_firmwarenuc6i5syh_firmwarestk2mv64cc_firmwarestk2m3w64ccd34010wybnuc7cjyhnuc_8_mainstream_game_kitstk2m3w64cc_firmwarenuc8i7hnknuc_8_mainstream_game_mini_computer_firmwarenuc6i5syhcd1iv128mknuc8i7bek_firmwarenuc7i3dnhenuc8i7hnk_firmwarecd1iv128mk_firmwarenuc6i7kykcd1m3128mk_firmwared34010wyb_firmwarecd1m3128mknuc7cjyh_firmwarecd1p64gknuc7i3dnhe_firmwarenuc_8_mainstream_game_mini_computerde3815tybe_firmwarenuc7i5dnkenuc6cayscd1p64gk_firmwarenuc_8_mainstream_game_kit_firmwarede3815tybenuc7i7dnkestk2mv64ccnuc6i7kyk_firmwarenuc6cays_firmwarenuc8i7beknuc8i3cysm_firmwareIntel(R) NUC(R)
CWE ID-CWE-20
Improper Input Validation
CVE-2022-37343
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 8.49%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-atom_c3750xeon_d-2796teatom_c3858_firmwareatom_c3338ratom_c3758_firmwarexeon_d-1627_firmwarexeon_d-2738atom_p5322_firmwareatom_c3830_firmwareatom_c3558r_firmwareatom_c3758rxeon_d-2777nxxeon_d-1718txeon_d-1527xeon_d-2766ntatom_c3950_firmwareatom_c3708xeon_d-1523nxeon_d-2786nte_firmwareatom_p5752_firmwarexeon_d-2786ntexeon_d-1540xeon_d-1746ter_firmwareatom_c3336_firmwareatom_c3955_firmwareatom_p5322xeon_d-1653nxeon_d-2163it_firmwarexeon_d-1528atom_p5742xeon_d-2776ntxeon_d-1637xeon_d-2798ntatom_p5362xeon_d-1715ter_firmwarexeon_d-1733ntxeon_d-1577xeon_d-1521_firmwareatom_c3758r_firmwarexeon_d-1527_firmwareatom_p5742_firmwarexeon_d-2775te_firmwarexeon_d-2141ixeon_d-2766nt_firmwarexeon_d-1557_firmwarexeon_d-1541atom_c3708_firmwarexeon_d-1543n_firmwarexeon_d-1518xeon_d-1633n_firmwarexeon_d-1714xeon_d-1722ne_firmwarexeon_d-2799_firmwarexeon_d-2745nx_firmwarexeon_d-1747ntexeon_d-2143itxeon_d-2757nx_firmwarexeon_d-2163itxeon_d-1653n_firmwarexeon_d-1734ntxeon_d-1734nt_firmwarexeon_d-1735tr_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_d-1747nte_firmwarexeon_d-1553natom_c3538xeon_d-1567_firmwareatom_c3808_firmwarexeon_d-1571_firmwareatom_c3955xeon_d-1567xeon_d-2777nx_firmwarexeon_d-1633natom_c3850xeon_d-1548xeon_d-2173it_firmwareatom_p5332xeon_d-1649nxeon_d-1529atom_c3308_firmwarexeon_d-1746teratom_p5731atom_c3436l_firmwarexeon_d-1531_firmwarexeon_d-1518_firmwareatom_c3338r_firmwareatom_c3750_firmwareatom_p5752xeon_d-2123it_firmwareatom_p5332_firmwarexeon_d-2738_firmwareatom_p5721xeon_d-2757nxxeon_d-1713ntxeon_d-1715teratom_c3508xeon_d-1520xeon_d-1571xeon_d-2752terxeon_d-1736_firmwarexeon_d-2799atom_c3338xeon_d-2146nt_firmwareatom_p5352xeon_d-2795ntxeon_d-2173itatom_c3508_firmwarexeon_d-1739_firmwarexeon_d-2123itxeon_d-1736ntxeon_d-2177nt_firmwarexeon_d-1713nt_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwarexeon_d-2796ntxeon_d-2798nt_firmwarexeon_d-1623nxeon_d-2779xeon_d-1531xeon_d-1602xeon_d-1712tratom_p5731_firmwarexeon_d-1533nxeon_d-2796te_firmwarexeon_d-1539xeon_d-1722nexeon_d-1713ntexeon_d-2142itxeon_d-1718t_firmwarexeon_d-2752ter_firmwarexeon_d-1622_firmwarexeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_d-2146ntatom_p5342_firmwareatom_c3436lxeon_d-1577_firmwarexeon_d-2796nt_firmwareatom_p5931bxeon_d-2145nt_firmwarexeon_d-1702_firmwarexeon_d-1749nt_firmwareatom_c3538_firmwareatom_p5342atom_c3858xeon_d-2161ixeon_d-2141i_firmwarexeon_d-1726_firmwareatom_c3558_firmwarexeon_d-2187ntatom_p5352_firmwarexeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2798nxatom_c3338_firmwarexeon_d-1732te_firmwarexeon_d-2776nt_firmwarexeon_d-2712t_firmwarexeon_d-2745nxxeon_d-1623n_firmwareatom_p5931b_firmwarexeon_d-1748teatom_c3336atom_c3958xeon_d-1548_firmwareatom_c3850_firmwarexeon_d-1713nte_firmwareatom_c3808xeon_d-2183itxeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1622xeon_d-1739atom_p5962b_firmwarexeon_d-1543nxeon_d-1559_firmwarexeon_d-1528_firmwarexeon_d-1539_firmwarexeon_d-1559xeon_d-1702xeon_d-1521xeon_d-2145ntatom_c3950xeon_d-1748te_firmwarexeon_d-1749ntxeon_d-1637_firmwarexeon_d-1529_firmwarexeon_d-1712tr_firmwarexeon_d-1540_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_d-2798nx_firmwareatom_c3558atom_p5362_firmwareatom_p5721_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwareatom_c3308xeon_d-2143it_firmwarexeon_d-2753ntxeon_d-1736xeon_d-2775texeon_d-1557atom_p5962bxeon_d-1735trxeon_d-1513n_firmwarexeon_d-1714_firmwarexeon_d-2795nt_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_d-2752ntexeon_d-1523n_firmwarexeon_d-1726xeon_d-2753nt_firmwarexeon_d-2177ntatom_c3758atom_c3958_firmwarexeon_d-1553n_firmwareatom_c3558ratom_c3830Intel(R) Processors
CWE ID-CWE-284
Improper Access Control
CVE-2019-14598
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.26% / 48.71%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 18:21
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Authentication in subsystem in Intel(R) CSME versions 12.0 through 12.0.48 (IOT only: 12.0.56), versions 13.0 through 13.0.20, versions 14.0 through 14.0.10 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-converged_security_management_engine_firmwaresteelstore_cloud_integrated_storageIntel(R) CSME
CWE ID-CWE-287
Improper Authentication
CVE-2022-37336
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.02% / 4.37%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-02 Oct, 2024 | 13:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in BIOS firmware for some Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_10_performance_kit_nuc10i3fnhfnuc_10_performance_kit_nuc10i5fnhj_firmwarenuc_10_performance_kit_nuc10i3fnk_firmwarenuc_10_performance_kit_nuc10i7fnh_firmwarenuc_10_performance_kit_nuc10i7fnkn_firmwarenuc_10_performance_kit_nuc10i7fnhc_firmwarenuc_10_performance_mini_pc_nuc10i3fnhja_firmwarenuc_10_performance_kit_nuc10i7fnhnuc_10_performance_kit_nuc10i5fnhf_firmwarenuc_10_performance_mini_pc_nuc10i5fnhcanuc_10_performance_kit_nuc10i5fnhnuc_10_performance_kit_nuc10i7fnk_firmwarenuc_10_performance_kit_nuc10i5fnk_firmwarenuc_10_performance_kit_nuc10i3fnknuc_10_performance_kit_nuc10i7fnhnnuc_10_performance_mini_pc_nuc10i5fnkpanuc_10_performance_kit_nuc10i7fnknnuc_10_performance_kit_nuc10i5fnhjnuc_10_performance_mini_pc_nuc10i7fnhaanuc_10_performance_kit_nuc10i5fnh_firmwarenuc_10_performance_kit_nuc10i5fnhfnuc_10_performance_kit_nuc10i5fnkp_firmwarenuc_10_performance_kit_nuc10i5fnkpnuc_10_performance_kit_nuc10i5fnhnnuc_10_performance_mini_pc_nuc10i7fnkpa_firmwarenuc_10_performance_kit_nuc10i3fnhnuc_10_performance_mini_pc_nuc10i7fnhja_firmwarenuc_10_performance_mini_pc_nuc10i7fnkpanuc_10_performance_kit_nuc10i3fnhn_firmwarenuc_10_performance_mini_pc_nuc10i5fnhca_firmwarenuc_10_performance_mini_pc_nuc10i3fnhjanuc_10_performance_kit_nuc10i5fnknuc_10_performance_kit_nuc10i7fnkpnuc_10_performance_kit_nuc10i3fnhnnuc_10_performance_mini_pc_nuc10i7fnhjanuc_10_performance_kit_nuc10i7fnkp_firmwarenuc_10_performance_kit_nuc10i3fnhf_firmwarenuc_10_performance_mini_pc_nuc10i3fnhfa_firmwarenuc_10_performance_kit_nuc10i7fnhcnuc_10_performance_mini_pc_nuc10i7fnhaa_firmwarenuc_10_performance_kit_nuc10i7fnhn_firmwarenuc_10_performance_kit_nuc10i3fnh_firmwarenuc_10_performance_kit_nuc10i7fnknuc_10_performance_mini_pc_nuc10i5fnhjanuc_10_performance_mini_pc_nuc10i5fnkpa_firmwarenuc_10_performance_kit_nuc10i5fnknnuc_10_performance_mini_pc_nuc10i3fnhfanuc_10_performance_kit_nuc10i3fnkn_firmwarenuc_10_performance_mini_pc_nuc10i5fnhja_firmwarenuc_10_performance_kit_nuc10i5fnkn_firmwarenuc_10_performance_kit_nuc10i5fnhn_firmwarenuc_10_performance_kit_nuc10i3fnknIntel(R) NUC
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 17
  • 18
  • Next
Details not found