Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-0086

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-17 May, 2019 | 15:41
Updated At-04 Aug, 2024 | 17:37
Rejected At-
Credits

Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:17 May, 2019 | 15:41
Updated At:04 Aug, 2024 | 17:37
Rejected At:
â–¼CVE Numbering Authority (CNA)

Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) Converged Security & Management Engine (CSME) Dynamic Application Loader, Intel (R) Trusted Execution Engine Interface (TXE)
Versions
Affected
  • Versions before CSME 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15.
Problem Types
TypeCWE IDDescription
textN/AEscalation of Privilege
Type: text
CWE ID: N/A
Description: Escalation of Privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
x_refsource_MISC
https://support.f5.com/csp/article/K35815741
x_refsource_CONFIRM
https://danishcyberdefence.dk/blog/dal
x_refsource_MISC
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Resource:
x_refsource_MISC
Hyperlink: https://support.f5.com/csp/article/K35815741
Resource:
x_refsource_CONFIRM
Hyperlink: https://danishcyberdefence.dk/blog/dal
Resource:
x_refsource_MISC
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
x_refsource_MISC
x_transferred
https://support.f5.com/csp/article/K35815741
x_refsource_CONFIRM
x_transferred
https://danishcyberdefence.dk/blog/dal
x_refsource_MISC
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://support.f5.com/csp/article/K35815741
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://danishcyberdefence.dk/blog/dal
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:17 May, 2019 | 16:29
Updated At:24 Aug, 2020 | 17:37

Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Intel Corporation
intel
>>converged_security_management_engine_firmware>>Versions from 11.0(inclusive) to 11.8.65(exclusive)
cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_management_engine_firmware>>Versions from 11.10(inclusive) to 11.11.65(exclusive)
cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_management_engine_firmware>>Versions from 11.20(inclusive) to 11.22.65(exclusive)
cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_management_engine_firmware>>Versions from 12.0(inclusive) to 12.0.35(exclusive)
cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_engine_firmware>>Versions from 3.0(inclusive) to 3.1.65(exclusive)
cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_engine_firmware>>Versions from 4.0(inclusive) to 4.0.15(inclusive)
cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-59Primarynvd@nist.gov
CWE-732Primarynvd@nist.gov
CWE ID: CWE-59
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-732
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://danishcyberdefence.dk/blog/dalsecure@intel.com
N/A
https://support.f5.com/csp/article/K35815741secure@intel.com
N/A
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://danishcyberdefence.dk/blog/dal
Source: secure@intel.com
Resource: N/A
Hyperlink: https://support.f5.com/csp/article/K35815741
Source: secure@intel.com
Resource: N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

693Records found

CVE-2020-0563
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.30%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 18:20
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for Intel(R) MPSS before version 3.8.6 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-manycore_platform_software_stackIntel(R) MPSS
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-0559
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.69%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:27
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-celeron_n3010celeron_j1750windows_8.1celeron_n2840ac_3165_firmwareac_9560_firmwarepentium_j6426ac_8265_firmwareceleron_n2808pentium_j2850celeron_j4025celeron_n2910pentium_j4205celeron_n2930pentium_n3510celeron_j6413celeron_n3350ac_3168_firmwareceleron_n3050ac_9260_firmwareceleron_j1850celeron_n6210ac_8260_firmwarepentium_n3700celeron_n2920celeron_n3000celeron_n2807ac_7265_firmwarepentium_n3520celeron_n2815pentium_j3710pentium_j2900celeron_j3060celeron_n3160ac_9461_firmwareac_9462_firmwareceleron_n2940celeron_n6211celeron_n5105pentium_n3530celeron_j3455pentium_n3540celeron_n4000celeron_j3455eceleron_n2830pentium_n4200eceleron_n4500celeron_n2820pentium_n6415celeron_n3450celeron_n5100pentium_n3710celeron_n4020celeron_j4105celeron_j3160celeron_j6412celeron_n3150celeron_n2810celeron_n4100celeron_j1800celeron_n2805celeron_n2806celeron_j1900celeron_n3060atom_x5-e3940celeron_n4505celeron_j4005atom_x5-e3930celeron_j3355pentium_n4200atom_x7-e3950ax200_firmwareceleron_n4120celeron_n3350ewindows_7ax201_firmwareceleron_j3355eceleron_j4125Intel(R) PROSet/Wireless WiFi Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-0557
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.29%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 16:58
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wireless-ac_9461wireless-ac_9560wi-fi_6_ax201dual_band_wireless-ac_3165dual_band_wireless-ac_7265_\(rev_d\)dual_band_wireless-ac_8260wireless-ac_9260dual_band_wireless-ac_3168wi-fi_6_ax200dual_band_wireless-ac_8265wireless-ac_9462proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi Software
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-0056
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:05
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions for the Intel(R) NUC M15 Laptop Kit Driver Pack software before updated version 1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-lapbc510_firmwarelapbc510lapbc710lapbc710_firmwareIntel(R) NUC M15 Laptop Kit Driver Pack software
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-0064
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:18
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ac_8265ac_9462ac_3165_firmwareac_9560_firmwareac_8265_firmwareax200ac_3165ac_9461ac_8260ac_9260ac_9461_firmwareac_9462_firmwareac_3168ac_9560ax200_firmware7265_firmwareac_3168_firmwareax201ax210_firmwareax201_firmwareac_9260_firmwareac_8260_firmwareax2107265Intel(R) PROSet/Wireless WiFi software installer for Windows 10
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-0094
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.13%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:05
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper link resolution before file access in Intel(R) DSA before version 20.11.50.9 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-driver_\&_support_assistantIntel(R) DSA
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2021-0109
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:36
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions for the Intel(R) SOC driver package for STK1A32SC before version 604 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_stick_stk1a32sccompute_stick_stk1a32sc_firmwareIntel(R) SOC driver package for STK1A32SC
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-8731
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.04% / 11.97%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:26
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-11121
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:53
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper file permissions in the installer for the Intel(R) Media SDK for Windows before version 2019 R1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsmedia_sdkIntel(R) Media SDK for Windows
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-11166
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.23%
||
7 Day CHG~0.00%
Published-16 Sep, 2019 | 15:58
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper file permissions in the installer for Intel(R) Easy Streaming Wizard before version 2.1.0731 may allow an authenticated user to potentially enable escalation of privilege via local attack.

Action-Not Available
Vendor-n/aIntel Corporation
Product-easy_streaming_wizardIntel(R) Easy Streaming Wizard Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-11167
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-11 Oct, 2019 | 17:57
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper file permission in software installer for Intel(R) Smart Connect Technology for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-smart_connect_technologySmart Connect Technology for Intel® NUC Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-0138
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in Intel(R) ACU Wizard version 12.0.0.129 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-acu_wizardIntel(R) ACU Wizard
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-0055
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:02
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions for some Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers before version 10.42 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-lapqc71alapqc71dlapqc71c_firmwarelapqc71clapqc71d_firmwarelapqc71blapqc71a_firmwarelapqc71b_firmwareIntel(R) NUC 9 Extreme Laptop Kit LAN Drivers
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-0077
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:09
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) VTune(TM) Profiler before version 2021.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-vtune_profilerIntel(R) VTune(TM) Profiler
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-0102
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:05
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the Intel Unite(R) Client for Windows before version 4.2.25031 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-uniteIntel Unite(R) Client for Windows
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-18097
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-13 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in Intel Solid State Drive Toolbox before 3.5.7 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-solid_state_drive_toolboxIntel Solid State Drive Toolbox
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-0171
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for Intel(R) Quartus(R) software may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quartus_iiquartus_primeIntel(R) Quartus(R)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-3701
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.82%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi Software Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-3704
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-13 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for the Intel Parallel Studio before 2019 Gold may allow authenticated users to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-parallel_studioparallel_studio_xeIntel Parallel Studio
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-3702
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.85%
||
7 Day CHG~0.00%
Published-13 Jun, 2019 | 15:36
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for the ITE Tech* Consumer Infrared Driver for Windows 10 versions before 5.4.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ite_tech_consumer_infrared_driverwindows_10ITE Tech Consumer Infrared Driver for Windows 10 Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-3697
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.86%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 14:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for the Intel Media Server Studio may allow unprivileged users to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-media_server_studioIntel Media Server Studio
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-12302
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-05 Oct, 2020 | 13:46
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the Intel(R) Driver & Support Assistant before version 20.7.26.7 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-driver_\&_support_assistantIntel(R) Driver & Support Assistant
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-18094
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.85%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 17:01
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in installer for Intel(R) Media SDK before 2018 R2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-media_sdkIntel(R) Media SDK Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-18093
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-13 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access.

Action-Not Available
Vendor-Intel Corporation
Product-vtune_amplifierIntel VTune Amplifier
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12131
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 14:00
Updated-17 Sep, 2024 | 02:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permissions in the driver pack installers for Intel NVMe before version 4.0.0.1007 and Intel RSTe before version 4.7.0.2083 may allow an authenticated user to potentially escalate privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-client_nvmedatacenter_nvmerapid_storage_technologyIntel NVMe and Intel RSTe
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12200
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 29.91%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-17 Sep, 2024 | 03:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in Intel(R) Capability Licensing Service before version 1.50.638.1 may allow an unprivileged user to potentially escalate privileges via local access.

Action-Not Available
Vendor-Intel Corporation
Product-capability_licensing_serviceIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12223
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 13.89%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 17:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12148
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.52%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation in file permissions in Intel Driver and Support Assistant before 3.5.0.1 may allow an authenticated user to potentially execute code as administrator via local access.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantIntel(R) Driver & Support Assistant
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12168
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.52%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 19:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege escalation in file permissions in Intel Computing Improvement Program before version 2.2.0.03942 may allow an authenticated user to potentially execute code as administrator via local access.

Action-Not Available
Vendor-Intel Corporation
Product-computing_improvement_programIntel(R) Computing Improvement Program
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-24525
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:16
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_board_h27002-404nuc_8_mainstream-g_kit_nuc8i7inhnuc_8_pro_kit_nuc8i3pnknuc_8_pro_board_nuc8i3pnbnuc_8_pro_kit_nuc8i3pnhnuc_kit_h26998-402nuc_board_h27002-400nuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_board_nuc8cchbnuc_8_pro_mini_pc_nuc8i3pnknuc_kit_h26998-405_firmwarenuc_8_mainstream-g_kit_nuc8i7inh_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inhnuc_kit_h26998-500_firmwarenuc_kit_h26998-402_firmwarenuc_8_pro_board_nuc8i3pnb_firmwarenuc_8_rugged_kit_nuc8cchkrnuc_board_h27002-404_firmwarenuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_8_mainstream-g_kit_nuc8i5inhnuc_board_nuc8cchb_firmwarenuc_kit_h26998-500nuc_kit_h26998-404nuc_board_h27002-500_firmwarenuc_8_rugged_kit_nuc8cchkr_firmwarenuc_board_h27002-400_firmwarenuc_board_h27002-402_firmwarenuc_kit_h26998-403_firmwarenuc_kit_h26998-403nuc_board_h27002-402nuc_kit_h26998-401nuc_kit_h26998-405nuc_8_pro_mini_pc_nuc8i3pnk_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inh_firmwarenuc_board_h27002-401_firmwarenuc_8_pro_kit_nuc8i3pnh_firmwarenuc_board_h27002-401nuc_kit_h26998-401_firmwarenuc_board_h27002-500nuc_9_pro_kit_nuc9v7qnxnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_9_pro_kit_nuc9v7qnx_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_8_pro_kit_nuc8i3pnk_firmwarenuc_kit_h26998-404_firmwareIntel(R) NUCs
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12177
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 20:00
Updated-16 Sep, 2024 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-wireless-ac_9560dual_band_wireless-ac_8265_desktop_kitwireless-n_7265_\(rev_c\)dual_band_wireless-n_7260dual_band_wireless-ac_7265_\(rev_d\)dual_band_wireless-ac_8265dual_band_wireless-ac_7260wireless-ac_9462tri-band_wireless-ac_18260dual_band_wireless-ac_7265\(rev_c\)wireless-ac_9461dual_band_wireless-ac_3160tri-band_wireless-ac_17265proset\/wireless_softwarewireless-n_7260dual_band_wireless-ac_3165dual_band_wireless-ac_8260wireless-ac_9260dual_band_wireless-ac_3168wireless-n_7265_\(rev_d\)dual_band_wireless-ac_7260_for_desktopdual_band_wireless-n_7265_\(rev_c\)tri-band_wireless-ac_18265dual_band_wireless-n_7265_\(rev_d\)Intel(R) PROSet/Wireless WiFi Software
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2018-12162
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.97%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 22:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory permissions in the Intel OpenVINO Toolkit for Windows before version 2018.1.265 may allow an authenticated user to potentially execute code using default directory permissions via local access.

Action-Not Available
Vendor-Intel Corporation
Product-openvino_toolkitIntel(R) OpenVINO(TM) Toolkit for Windows
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2023-50197
Matching Score-10
Assigner-Zero Day Initiative
ShareView Details
Matching Score-10
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.59%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:14
Updated-14 Aug, 2025 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantDriver & Support Assistantdriver\&support_assistant
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2023-42099
Matching Score-10
Assigner-Zero Day Initiative
ShareView Details
Matching Score-10
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.59%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:13
Updated-12 Aug, 2025 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantDriver & Support Assistantdriver\&support_assistant
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-3703
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 20:00
Updated-16 Sep, 2024 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for the Intel(R) SSD Data Center Tool for Windows before v3.0.17 may allow authenticated users to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-Microsoft CorporationIntel Corporation
Product-windowsssd_data_center_toolIntel(R) SSD Data Center Tool for Windows
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-0528
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.70%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:53
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in BIOS firmware for 7th, 8th, 9th and 10th Generation Intel(R) Core(TM) Processor families may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i9-9900kscore_i7-7700kcore_i7-8705gcore_i7-8665ucore_i7-7660ucore_i7-8706gcore_i7-1068ng7core_i5-7300u_firmwarecore_i7-8565u_firmwarecore_i9-9880h_firmwarecore_i7-8700t_firmwarecore_i7-10850hcore_i7-10700e_firmwarecore_i5-7600t_firmwarecore_i5-7500_firmwarecore_i7-10700kcore_i7-8700core_i7-8665ue_firmwarecore_i5-7440hq_firmwarecore_i5-7y54core_i7-8705g_firmwarecore_i7-10700tecore_i7-7700tcore_i7-10700tcore_i7-8086kcore_i5-7260u_firmwarecore_i7-8709g_firmwarecore_i7-1060g7_firmwarecore_i5-7600k_firmwarecore_i7-8700kcore_i9-9880hcore_i9-9900kfcore_i5-7440eqcore_i5-7287ucore_i7-10710ucore_i7-10700kfcore_i5-7200u_firmwarecore_i7-10700k_firmwarecore_i5-7442eqcore_i7-10510u_firmwarecore_i7-8565ucore_i7-7600ucore_i5-7y57_firmwarecore_i5-7600kcore_i7-10700t_firmwarecore_i5-7300hq_firmwarecore_i5-7442eq_firmwarecore_i7-8569u_firmwarecore_i5-7300hqcore_i7-7560ucore_i7-8706g_firmwarecore_i7\+8700_firmwarecore_i7-10510ycore_i7-7820eqcore_i5-7400t_firmwarecore_i5-7360u_firmwarecore_i5-7360ucore_i9-9900core_i7-10510y_firmwarecore_i7-8650u_firmwarecore_i7-7600u_firmwarecore_i7-7700hqcore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_i7-10610u_firmwarecore_i7-10710u_firmwarecore_i7-7820hkcore_i7-7567u_firmwarecore_i7-7700hq_firmwarecore_i5-7600tcore_i5-7300ucore_i5-7440eq_firmwarecore_i7-7500ucore_i7-8550ucore_i7-10510ucore_i5-7500core_i7-8500y_firmwarecore_i7-1060g7core_i7-10810u_firmwarecore_i7-10810ucore_i5-7200ucore_i7-8700b_firmwarecore_i7-10875h_firmwarecore_i7-8559u_firmwarecore_i7-8850hcore_i5-7287u_firmwarecore_i7-7700core_i7-8086k_firmwarecore_i7-10610ucore_i7-8665u_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqcore_i7-8500ycore_i7-7920hq_firmwarecore_i7-7567ucore_i9-9900tcore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i9-9900ks_firmwarecore_i7-10700te_firmwarecore_i7-8700k_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i7-10700core_i7\+8700core_i7-7660u_firmwarecore_i7-7820hqcore_i7-10750h_firmwarecore_i7-8750h_firmwarecore_i5-7600core_i5-7400_firmwarecore_i7-8665uecore_i7-10700fcore_i7-8809g_firmwarecore_i7-8557u_firmwarecore_i7-1068ng7_firmwarecore_i7-10750hcore_i7-7700t_firmwarecore_i7-7820eq_firmwarecore_i5-7y54_firmwarecore_i9-9980hk_firmwarecore_i5-7400tcore_i5-7267u_firmwarecore_i7-10875hcore_i9-9900kcore_i7-8809gcore_i5-7440hqcore_i5-7600_firmwarecore_i5-7260ucore_i7-8709gcore_i7-8700bcore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-8569ucore_i7-7500u_firmwarecore_i5-7267ucore_i7-10700f_firmwarecore_i7-7700_firmwarecore_i7-10700kf_firmwarecore_i7-7y75core_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-7560u_firmwarecore_i5-7500t_firmwarecore_i5-7y57core_i7-8700tcore_i7-10700_firmwarecore_i7-10850h_firmwarecore_i5-7500tcore_i7-1065g7core_i5-7400core_i9-9980hkcore_i7-8559ucore_i7-8650ucore_i9-9900t_firmwarecore_i7-10700eBIOS
CVE-2020-0544
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:47
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the kernel mode driver for some Intel(R) Graphics Drivers before version 15.36.39.5145 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CVE-2020-0587
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 35.62%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:55
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lcore_i7-9800xxeon_gold_6222vxeon_platinum_9222core_i7-3930kxeon_gold_5217xeon_gold_6230txeon_gold_6242core_i7-6950xxeon_gold_6230ncore_i7-4960xxeon_gold_5218nxeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_5218txeon_silver_4215core_i9-9980xecore_i9-10940xxeon_gold_5220rcore_i7-6800kxeon_gold_5220xeon_gold_6246core_i9-10900xxeon_silver_4214core_i7-7740xxeon_silver_4214rcore_i7-5820kxeon_platinum_8276xeon_gold_6254xeon_gold_6238tcore_i7-3960xxeon_silver_4210rxeon_gold_6240yxeon_gold_6250lxeon_silver_4214yxeon_gold_6210ucore_i9-10920xxeon_gold_6234core_i9-10980xecore_i7-3940xmxeon_gold_5218bxeon_gold_6238rcore_i7-6850kcore_i7-3970xcore_i9-7940xxeon_gold_6208ucore_i7-4940mxxeon_platinum_8268xeon_gold_5215core_i9-9960xcore_i7-3920xmxeon_gold_6262vcore_i7-4930kxeon_silver_4216core_i9-7920xxeon_gold_6230xeon_platinum_8253xeon_gold_5222xeon_gold_6240rxeon_gold_5218xeon_silver_4209tcore_i5-7640xcore_i9-7900xxeon_gold_6209uxeon_gold_5215lxeon_silver_4215rxeon_gold_6252nxeon_gold_6226xeon_gold_6256core_i7-4820kxeon_platinum_9221core_i7-5960xxeon_gold_6244xeon_gold_6230rxeon_gold_6238xeon_gold_6252xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_gold_6248core_i7-7800xcore_i9-9920xxeon_gold_6212ucore_i7-4930mxxeon_silver_4208core_i9-7980xecore_i7-5930kxeon_gold_5218rxeon_platinum_8280xeon_gold_6248rxeon_gold_6226rxeon_bronze_3206rxeon_gold_5220score_i7-6900kxeon_platinum_9242xeon_platinum_9282core_i7-3820core_i9-9940xxeon_gold_6258rxeon_platinum_8260lxeon_platinum_8280lxeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_bronze_3204xeon_gold_6250biosxeon_platinum_8256core_i9-9820xxeon_gold_5220tcore_i9-9900xxeon_silver_4210Intel(R) Processors
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-0546
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.70%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 20:45
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unquoted service path in Intel(R) Optane(TM) DC Persistent Memory Module Management Software before version 1.0.0.3461 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access.

Action-Not Available
Vendor-Microsoft CorporationIntel Corporation
Product-optane_dc_persistent_memory_module_managementwindows_server_2019Intel® Optane(TM) DC Persistent Memory Module Management Software
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2020-0592
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 32.57%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:56
Updated-04 Aug, 2024 | 06:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lxeon_w-2223core_i7-9800xxeon_platinum_9222xeon_e7-4860_v2xeon_w-3245mxeon_gold_5217xeon_gold_6230txeon_e7-8894_v4xeon_e7-8867_v4core_i7-6950xxeon_gold_6230ncore_i7-4960xxeon_w-3225xeon_w-3265xeon_e7-8880l_v2xeon_gold_5218nxeon_e7-2850_v2xeon_w-3245xeon_d-1527xeon_w-2125core_i9-10940xxeon_d-1523nxeon_d-1540xeon_e7-8880_v4xeon_e7-8880_v2xeon_gold_5220xeon_gold_6246xeon_d-1653ncore_i7-7740xxeon_d-1528xeon_silver_4214rcore_i7-5820kxeon_d-1577xeon_gold_6254xeon_d-1637xeon_w-2295xeon_e7-8891_v4core_i7-3960xxeon_gold_6240yxeon_gold_6234xeon_d-2141ixeon_d-1541xeon_e7-4830_v4core_i7-3940xmxeon_e7-4809_v2xeon_gold_6238rxeon_w-1250xeon_d-1518xeon_w-1250texeon_w-2255xeon_gold_6208ucore_i7-4940mxxeon_platinum_8268xeon_gold_5215xeon_e7-4830_v2xeon_e7-8893_v4xeon_w-1290exeon_d-2143itxeon_gold_6262vcore_i7-4930kxeon_d-2163itcore_i9-7920xxeon_gold_5222xeon_w-3275xeon_gold_5218xeon_d-1553nxeon_w-1270xeon_silver_4209txeon_d-1567xeon_w-1270exeon_d-1633nxeon_gold_5215lxeon_silver_4215rxeon_gold_6252nxeon_d-1548core_i7-4820kxeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_w-2245xeon_e7-4820_v4xeon_gold_6244xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_gold_6248xeon_gold_6212uxeon_w-1270tecore_i9-7980xexeon_platinum_8280xeon_gold_6248rxeon_e7-4809_v4core_i7-6900kcore_i9-9940xxeon_gold_6258rxeon_d-1520xeon_e7-8870_v4xeon_w-1290txeon_d-1571xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6250biosxeon_platinum_8256core_i9-9820xxeon_d-2173itxeon_w-2155core_i9-9900xxeon_d-2123itxeon_w-1290pxeon_w-3265mxeon_e7-8857_v2xeon_w-2135xeon_gold_6222vxeon_d-1627xeon_e7-2890_v2core_i7-3930kxeon_gold_6242xeon_e7-8893_v2xeon_w-2265xeon_d-1623nxeon_w-2145xeon_d-1531xeon_e7-4820_v2xeon_d-1602xeon_w-10855mxeon_platinum_8260yxeon_platinum_8270xeon_e7-8890_v4xeon_d-1539xeon_d-1533nxeon_e7-8870_v2xeon_gold_6242rxeon_gold_5218txeon_silver_4215core_i9-9980xexeon_d-2142itxeon_w-2235xeon_gold_5220rcore_i7-6800kxeon_e7-8891_v2xeon_d-2146ntxeon_e7-4850_v2core_i9-10900xxeon_silver_4214xeon_e7-8890_v2xeon_platinum_8276xeon_gold_6238txeon_w-1270pxeon_silver_4210rxeon_gold_6250lxeon_d-2161ixeon_silver_4214yxeon_gold_6210ucore_i9-10920xcore_i9-10980xexeon_d-2187ntxeon_e7-4870_v2xeon_gold_5218bxeon_e7-8860_v4core_i7-6850kcore_i7-3970xcore_i9-7940xcore_i9-9960xxeon_d-2166ntxeon_w-1250exeon_w-1290core_i7-3920xmxeon_e7-4880_v2xeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6240rxeon_w-10885mxeon_w-2195xeon_d-2183itxeon_e7-2870_v2xeon_d-1513nxeon_d-1537xeon_w-2275xeon_d-1622xeon_w-1290tecore_i5-7640xcore_i9-7900xxeon_d-1543nxeon_gold_6209uxeon_w-3223xeon_gold_6226xeon_d-1559xeon_gold_6256xeon_d-1521core_i7-5960xxeon_e7-4890_v2xeon_d-2145ntxeon_gold_6230rxeon_w-3175xxeon_gold_6238xeon_gold_6252xeon_w-1250pcore_i7-7800xcore_i9-9920xcore_i7-4930mxxeon_w-3235xeon_silver_4208xeon_e7-8850_v2core_i7-5930kxeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_w-2225xeon_w-2123xeon_gold_5220sxeon_w-2133xeon_w-3275mxeon_platinum_9242xeon_platinum_9282core_i7-3820xeon_d-1557xeon_e7-4850_v4xeon_platinum_8260lxeon_platinum_8280lxeon_bronze_3204xeon_d-2177ntxeon_w-2175xeon_gold_5220txeon_e7-2880_v2xeon_silver_4210Intel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0541
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 22.89%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:59
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0583
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.34% / 56.33%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 21:08
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.

Action-Not Available
Vendor-Intel Corporation
Product-core_m3core_i5core_i9smart_sound_technologycore_i7core_i3Intel® Smart Sound Technology
CVE-2020-0542
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.82%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:57
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CVE-2020-0513
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:18
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers Advisory
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0533
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.48%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:58
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2020-0521
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:48
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in some Intel(R) Graphics Drivers before version 15.45.32.5145 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CVE-2020-0515
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 22.96%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 19:59
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-0572
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 16.75%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:56
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s2600stqrserver_board_s2600wf0rserver_board_s2600wf_firmwareserver_board_s2600stbrserver_board_s2600st_firmwareserver_board_s2600wfqrserver_board_s2600wftrIntel(R) Server Board S2600ST and S2600WF families
CWE ID-CWE-20
Improper Input Validation
CVE-2020-0586
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.88%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:56
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_platform_servicesIntel(R) SPS
CWE ID-CWE-665
Improper Initialization
CVE-2020-0561
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.11%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 18:21
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncopenSUSEIntel CorporationMicrosoft Corporation
Product-linux_kernelsoftware_guard_extensions_sdkwindowsbackportsleapIntel(R) SGX SDK
CWE ID-CWE-665
Improper Initialization
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 13
  • 14
  • Next
Details not found