Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-0091

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-17 May, 2019 | 15:41
Updated At-04 Aug, 2024 | 17:37
Rejected At-
Credits

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:17 May, 2019 | 15:41
Updated At:04 Aug, 2024 | 17:37
Rejected At:
▼CVE Numbering Authority (CNA)

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) Converged Security & Management Engine (CSME), Intel (R) Trusted Execution Engine Interface (TXE)
Versions
Affected
  • Versions before CSME 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15.
Problem Types
TypeCWE IDDescription
textN/AEscalation of Privilege
Type: text
CWE ID: N/A
Description: Escalation of Privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
x_refsource_MISC
https://support.f5.com/csp/article/K21423526
x_refsource_CONFIRM
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Resource:
x_refsource_MISC
Hyperlink: https://support.f5.com/csp/article/K21423526
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
x_refsource_MISC
x_transferred
https://support.f5.com/csp/article/K21423526
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://support.f5.com/csp/article/K21423526
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:17 May, 2019 | 16:29
Updated At:20 Jun, 2019 | 01:15

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 11.8.0(inclusive) to 11.8.65(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 11.11.0(inclusive) to 11.11.65(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 11.22.0(inclusive) to 11.22.65(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_management_engine>>Versions from 12.0(inclusive) to 12.0.35(exclusive)
cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_technology>>Versions from 3.1.0(inclusive) to 3.1.65(exclusive)
cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_technology>>Versions from 4.0(inclusive) to 4.0.15(exclusive)
cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.f5.com/csp/article/K21423526secure@intel.com
N/A
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://support.f5.com/csp/article/K21423526
Source: secure@intel.com
Resource: N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

150Records found

CVE-2021-33103
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.02%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unintended intermediary in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i3-9100ecore_i3-10100core_i5-11600_firmwarecore_i5-1038ng7core_i5-10400t_firmwarecore_i5-11400core_i9-9900kscore_i7-10510ycore_i7-10710u_firmwarecore_i9-11900_firmwarecore_i3-10100_firmwarecore_i9-10900_firmwarecore_i5-11600kcore_i5-1155g7_firmwarexeon_e-2374gcore_i9-10900tecore_i5-1030g4_firmwarecore_i7-9700k_firmwarecore_i5-9500fcore_i3-10100ycore_i3-9300t_firmwarecore_i5-11260hcore_i5-9500t_firmwarexeon_e-2378core_i3-1115g4ecore_i5-10600tcore_i5-10600kf_firmwarexeon_e-2374g_firmwarecore_i5-9500te_firmwarecore_i7-10875h_firmwarexeon_e-2386g_firmwarecore_i5-9400hcore_i9-10900e_firmwarecore_i9-9900kf_firmwarecore_i3-9320core_i9-11900kfcore_i5-10600t_firmwarecore_i7-11700k_firmwarecore_i5-10300h_firmwarecore_i3-1120g4_firmwarecore_i9-10900tcore_i3-10100t_firmwarecore_i7-10700f_firmwarecore_i5-10500t_firmwarecore_i7-10700tecore_i5-10600_firmwarecore_i9-10900kcore_i3-10105core_i5-9400t_firmwarecore_i5-1140g7_firmwarecore_i5-11400tcore_i7-11700kcore_i5-11400fcore_i9-10900kf_firmwarecore_i5-10400txeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i7-1185g7core_i7-9700kfcore_i9-9880h_firmwarecore_i7-9700xeon_e-2334_firmwarecore_i7-9850hecore_i9-11980hk_firmwarecore_i7-10700kfcore_i7-9850hl_firmwarecore_i9-10900te_firmwarexeon_w-1370p_firmwarecore_i9-11900kcore_i5-10500hcore_i5-11600kf_firmwarecore_i7-1065g7core_i5-10600kfcore_i3-1000g1core_i5-1130g7_firmwarecore_i7-10700_firmwarecore_i5-1035g1_firmwarecore_i3-1005g1core_i7-1068ng7core_i5-1038ng7_firmwarecore_i9-11900h_firmwarecore_i7-1185gre_firmwarexeon_e-2356g_firmwarecore_i5-9400f_firmwarecore_i3-10305t_firmwarecore_i5-11500he_firmwarecore_i5-9400fcore_i3-10100ecore_i5-11320h_firmwarecore_i9-10850k_firmwarecore_i7-10700kf_firmwarecore_i5-9500f_firmwarecore_i7-11600hcore_i7-9700tcore_i7-10700core_i5-1135g7_firmwarecore_i5-11600kfcore_i5-9600t_firmwarecore_i9-11950h_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i3-1115g4_firmwarecore_i5-10500e_firmwarecore_i5-1145grecore_i5-11600k_firmwarecore_i5-1135g7core_i5-9300hfxeon_e-2378_firmwarecore_i3-1115g4core_i5-9600kfcore_i5-10400core_i3-9300core_i3-11100he_firmwarecore_i7-10870h_firmwarecore_i3-1120g4core_i5-1155g7core_i3-9300tcore_i7-9700kcore_i5-11400hcore_i7-11700kf_firmwarecore_i9-11900hcore_i7-9700t_firmwarecore_i7-1185g7ecore_i3-1110g4core_i7-10810ucore_i3-10300tcore_i5-1130g7core_i7-10700te_firmwarecore_i7-10700exeon_e-2378g_firmwarecore_i9-11900core_i5-9600kcore_i3-10100tecore_i7-10700tcore_i9-9900kfxeon_e-2388gcore_i5-10210u_firmwarecore_i7-11390hcore_i7-9700te_firmwarecore_i7-9700kf_firmwarecore_i5-1145g7core_i3-9300_firmwarecore_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kcore_i3-10100te_firmwarexeon_w-1390_firmwarecore_i7-1160g7_firmwarecore_i5-10600k_firmwarecore_i9-10900ecore_i3-9100core_i7-9750hcore_i3-10110y_firmwarecore_i7-11850h_firmwarecore_i9-11980hkcore_i7-9700f_firmwarecore_i9-11900fcore_i5-10500tecore_i5-10210y_firmwarecore_i5-11500core_i9-11950hcore_i7-11700core_i5-10500tcore_i5-10600core_i7-1195g7core_i5-10310ucore_i9-10885hcore_i5-10500_firmwarecore_i5-10310ycore_i5-9500_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_i7-1165g7core_i5-11400_firmwarecore_i7-11850hecore_i3-9100tecore_i5-10310y_firmwarecore_i5-9300hf_firmwarecore_i5-11500t_firmwarecore_i7-10750h_firmwarexeon_e-2388g_firmwarecore_i3-1115gre_firmwarecore_i5-1145g7ecore_i7-10700kxeon_e-2336core_i5-1030g7core_i9-10980hkcore_i5-11600t_firmwarecore_i9-9880hcore_i3-1000g1_firmwarecore_i7-10700k_firmwarecore_i9-10900t_firmwarecore_i3-9350k_firmwarecore_i7-11370hcore_i5-11400f_firmwarecore_i3-10305_firmwarecore_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i5-11500hcore_i7-1185g7_firmwarecore_i5-1035g4core_i5-11600tcore_i7-11800h_firmwarecore_i7-1180g7_firmwarecore_i7-1060g7_firmwarecore_i7-1068ng7_firmwarecore_i5-9600tcore_i9-11900t_firmwarecore_i5-10200hcore_i9-9900kcore_i3-1110g4_firmwarecore_i5-10400fxeon_e-2324g_firmwarecore_i7-1160g7xeon_w-1370core_i5-9600core_i5-1035g7_firmwarecore_i5-9400_firmwarecore_i5-9500core_i9-9900core_i7-9850hlcore_i3-10320_firmwarecore_i7-11850he_firmwarecore_i7-9750hfcore_i7-1180g7xeon_w-1370pcore_i3-10320core_i3-10110ycore_i5-1035g7core_i5-9300h_firmwarecore_i3-10105fxeon_w-1390t_firmwarecore_i3-9350kxeon_w-1390core_i7-11700t_firmwarecore_i7-10875hcore_i3-1115grecore_i5-11600core_i7-11700fcore_i7-1195g7_firmwarecore_i3-11100hecore_i5-10400hcore_i5-9600kf_firmwarecore_i3-10100e_firmwarecore_i3-10305tcore_i5-10505_firmwarecore_i3-9350kf_firmwarexeon_w-1370_firmwarecore_i5-10600kcore_i9-9900t_firmwarecore_i5-9500e_firmwarecore_i5-9600_firmwarecore_i7-9700e_firmwarecore_i7-9700ecore_i9-11900kf_firmwarecore_i7-10850hcore_i3-1005g1_firmwarecore_i5-10500core_i7-9700tecore_i5-9500tecore_i3-9100hl_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i5-1145g7e_firmwarecore_i3-10105tcore_i9-9900k_firmwarecore_i5-11300hcore_i7-10510u_firmwarexeon_w-1390p_firmwarecore_i3-1000g4core_i3-10105t_firmwarecore_i5-10400h_firmwarecore_i3-10100f_firmwarecore_i9-10900f_firmwarecore_i3-9100hlcore_i7-11390h_firmwarecore_i9-10900kfcore_i3-10100tcore_i9-9980hk_firmwarecore_i3-9100f_firmwarecore_i3-9320_firmwarecore_i9-9980hkcore_i5-11500hecore_i7-11700txeon_w-1390tcore_i5-1035g4_firmwarecore_i7-10700e_firmwarecore_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i3-9100te_firmwarecore_i7-9850h_firmwarecore_i5-1030g7_firmwarecore_i7-11700_firmwarecore_i7-11375hcore_i5-9500ecore_i7-1185g7e_firmwarecore_i5-11500tcore_i9-11900tcore_i5-11260h_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i7-11600h_firmwarecore_i7-1060g7core_i5-11400h_firmwarecore_i5-9400core_i7-1185grecore_i5-11400t_firmwarecore_i7-9750h_firmwarecore_i3-10325core_i7-10700t_firmwarexeon_e-2356gcore_i9-9900tcore_i7-9700_firmwarexeon_e-2336_firmwarecore_i5-1145gre_firmwarecore_i3-9350kfcore_i3-10105f_firmwarecore_i3-10105_firmwarecore_i5-11320hxeon_e-2334core_i7-9850hxeon_w-1350core_i3-10110u_firmwarecore_i7-10850h_firmwarexeon_e-2314core_i3-10305core_i5-1035g1core_i7-11850hcore_i7-9850he_firmwarecore_i9-11900f_firmwarexeon_e-2314_firmwarexeon_w-1390pcore_i3-10110ucore_i3-9100_firmwarecore_i5-10505core_i9-10885h_firmwarecore_i3-10100y_firmwarecore_i3-9100e_firmwarecore_i5-11500_firmwarecore_i7-10710uxeon_w-1350pcore_i5-10210ycore_i9-10900core_i3-1000g4_firmwarecore_i5-9400tcore_i7-1065g7_firmwarecore_i5-10300hcore_i7-1165g7_firmwarecore_i5-1145g7_firmwarecore_i9-9900ks_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i3-10300core_i7-11375h_firmwarecore_i3-9100fcore_i7-11700f_firmwarecore_i3-1125g4_firmwarecore_i9-10900fcore_i3-1125g4core_i5-10310u_firmwarecore_i5-1030g4xeon_e-2378gcore_i5-10200h_firmwarecore_i9-10980hk_firmwarecore_i5-11500h_firmwarecore_i7-10870hcore_i5-9500tcore_i3-10100fcore_i7-10510ucore_i5-10400_firmwarecore_i9-9900_firmwarecore_i3-10300_firmwarecore_i5-10500h_firmwarecore_i7-9750hf_firmwarexeon_e-2324gcore_i7-9700fcore_i7-10700fcore_i3-1115g4e_firmwarecore_i5-10210ucore_i5-9600k_firmwarecore_i9-10900k_firmwarecore_i3-9100tcore_i5-11300h_firmwareIntel(R) Processors
CVE-2015-2291
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.25% / 83.93%
||
7 Day CHG-0.24%
Published-09 Aug, 2017 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-03-03||Apply updates per vendor instructions.

(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.

Action-Not Available
Vendor-n/aIntel CorporationMicrosoft Corporation
Product-ethernet_diagnostics_driver_iqvw32.sysethernet_diagnostics_driver_iqvw64.syswindowsn/aEthernet Diagnostics Driver for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2006-6385
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 39.91%
||
7 Day CHG~0.00%
Published-08 Dec, 2006 | 01:00
Updated-07 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with "kernel-level" privileges via an incorrect function call in certain OID handlers.

Action-Not Available
Vendor-n/aIntel Corporation
Product-pro_10gbe_adapterspro_1000_pcie_adapterspro_10_100_adapterspro_1000_adaptersn/a
CVE-2021-33091
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.36%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:46
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit audio driver pack before version 1.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_audio_driver_packIntel(R) NUC M15 Laptop Kit audio driver pack
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-33088
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.36%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:36
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack before version 5.4.1.4449 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_integrated_sensor_hub_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33124
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.62%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e-2286gcore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7xeon_e5-2603_v4_firmwarecore_i9-7900xxeon_d-2733nt_firmwarecore_i7-10710u_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_w-1270p_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_e5-2637_v4core_i9-9960xxeon_w-2123xeon_platinum_8353hcore_i7-9700k_firmwarecore_i5-8500t_firmwarexeon_d-1749nt_firmwarecore_i3-9300t_firmwarexeon_e-2236xeon_platinum_8280_firmwarexeon_e3-1220_v5_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_w-1270exeon_silver_4209t_firmwarecore_i5-7500xeon_e5-2650_v4_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqcore_i7-8709gxeon_d-2786nte_firmwarexeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4core_i5-8200ycore_i5-10500t_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260uxeon_gold_6226r_firmwarexeon_e3-1235l_v5core_i5-7287u_firmwarecore_i9-10900xxeon_gold_6256_firmwarexeon_w-3335xeon_e7-8891_v4_firmwarexeon_w-11555mrecore_i5-10500hcore_i7-6800k_firmwarecore_i5-10600kfxeon_e5-2648l_v4core_i5-1035g1_firmwarexeon_w-2123_firmwarexeon_e-2146gxeon_d-2752nte_firmwarecore_i5-8210y_firmwarecore_i3-10100exeon_silver_4316_firmwarexeon_w-3365_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwarecore_i7-9700txeon_gold_6238core_i5-7600tcore_i7-4820kxeon_e3-1260l_v5_firmwarexeon_w-2195_firmwarexeon_e3-1240l_v5xeon_platinum_8256xeon_w-2275_firmwarexeon_e-2276mxeon_d-2163itcore_i7-3930kxeon_gold_6334_firmwarexeon_e3-1505m_v5xeon_w-2235_firmwarexeon_gold_6328hlxeon_d-1623nxeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarecore_i7-10810ucore_i3-10300txeon_e5-2628l_v4core_i3-8100xeon_e-2378g_firmwarecore_i5-9600kxeon_e5-2658_v4xeon_gold_5218r_firmwarecore_i3-7100xeon_e5-1630_v4_firmwarecore_i7-7600u_firmwarecore_i7-9700kf_firmwarecore_i5-9300hcore_i5-10500exeon_silver_4214y_firmwarecore_i9-10850kcore_i5-8500bcore_i3-7100e_firmwarexeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_platinum_8368q_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_w-2175_firmwarecore_i3-8100hcore_i3-7300t_firmwarexeon_e5-2695_v4core_i7-9700f_firmwarexeon_d-2177nt_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-1712tr_firmwarecore_i3-8130u_firmwarecore_i5-10310ucore_i7-6950x_firmwarexeon_e7-8860_v4_firmwarecore_i7-8557ucore_i3-8350k_firmwarexeon_e5-2683_v4core_i9-9820x_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarexeon_platinum_8376hl_firmwarecore_i9-10980hkxeon_d-2733ntxeon_w-11155mlexeon_d-1559_firmwarecore_i7-10700k_firmwarexeon_gold_5320tcore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarexeon_e5-2630l_v4core_i7-10510y_firmwarexeon_e7-8893_v4core_i7-1060g7_firmwarecore_i7-8500yxeon_w-3323xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarecore_i7-1068ng7_firmwarecore_i5-7400_firmwarexeon_w-2133_firmwarecore_i5-9600xeon_w-3375core_i5-8600tcore_i5-7200u_firmwarexeon_e3-1585_v5_firmwarexeon_gold_6258r_firmwarecore_i3-10320_firmwarexeon_gold_5218bxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_d-1734nt_firmwarexeon_e-2288gxeon_w-1370pcore_i7-7500uxeon_e-2274g_firmwarexeon_gold_5318s_firmwarexeon_e3-1225_v6xeon_e3-1280_v6xeon_gold_5218rxeon_d-2752ntexeon_e-2124g_firmwarexeon_e5-2695_v4_firmwarexeon_w-2235xeon_e5-2608l_v4_firmwarexeon_w-3175xxeon_platinum_8362_firmwarexeon_w-3225core_i3-7101texeon_e5-2609_v4core_i7-7700xeon_d-1540xeon_gold_6246r_firmwarexeon_gold_6246rcore_i5-7300hqxeon_d-1513ncore_i5-10505_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e5-2690_v4core_i9-9900xcore_i9-9900t_firmwarexeon_e5-2699a_v4_firmwarecore_i5-9600_firmwarexeon_e3-1505m_v6_firmwarecore_i7-9700exeon_e-2254mexeon_platinum_8260l_firmwarecore_i7-8500y_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_w-3235_firmwarexeon_platinum_9222xeon_gold_5318ncore_i3-10105tcore_i3-8100h_firmwarecore_i7-10510u_firmwarexeon_platinum_8358_firmwarecore_i7-7700_firmwarecore_i3-1000g4core_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i9-9980hk_firmwarexeon_e-2144gxeon_gold_6314ucore_i5-8300h_firmwarexeon_e3-1270_v6_firmwarexeon_d-2752tercore_i5-8279u_firmwarecore_i5-8500b_firmwarexeon_w-11555mlexeon_w-1390txeon_silver_4216xeon_e5-2640_v4xeon_e5-2697a_v4_firmwarexeon_platinum_8362core_i7-10610uxeon_platinum_8276lxeon_platinum_8351n_firmwarecore_i7-7740xxeon_e5-2637_v4_firmwarecore_i7-7y75xeon_d-1713nte_firmwarexeon_e3-1575m_v5xeon_e-2124gxeon_platinum_9221_firmwarecore_i7-4930kcore_i5-9400core_i5-8500_firmwarexeon_d-1557xeon_e5-2623_v4core_i3-10105f_firmwarexeon_w-3245mxeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_gold_5318sxeon_w-11555mle_firmwarecore_i5-7300hq_firmwarexeon_w-1350core_i5-1035g1xeon_w-3345_firmwarexeon_w-1290xeon_e-2314_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i7-8086k_firmwarexeon_w-2223_firmwarexeon_d-1718t_firmwarexeon_gold_6234core_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarecore_i5-7442eq_firmwarexeon_gold_6252n_firmwarecore_i7-4930mxcore_i9-10900xeon_e3-1230_v6_firmwarexeon_w-1250core_i7-1065g7_firmwarexeon_e3-1565l_v5_firmwarecore_i5-7360uxeon_e3-1275_v6xeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4core_i5-7300uxeon_e5-2698_v4_firmwarexeon_e5-2618l_v4_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarexeon_d-1736ntcore_i3-7100h_firmwarecore_i7-8565uxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_d-1747ntexeon_bronze_3206r_firmwarecore_i7-7700kxeon_w-3323_firmwarecore_i3-10100fcore_i9-9900_firmwarexeon_gold_5217core_i7-6850kcore_i7-9750hf_firmwarexeon_gold_6210ucore_i5-7200uxeon_d-1548_firmwarecore_i7-9700fcore_i5-8265u_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarecore_i5-10210ucore_i3-7300_firmwarecore_i7-7740x_firmwarexeon_w-11155mre_firmwarecore_i5-8400bcore_i3-7100hxeon_gold_5215core_i5-10400t_firmwarecore_i9-9900ksxeon_d-1531_firmwarexeon_d-1527_firmwarecore_i9-7920xxeon_d-1633n_firmwarexeon_platinum_8352vcore_i9-7960x_firmwarexeon_e3-1230_v6xeon_d-1513n_firmwarecore_i9-8950hkxeon_e7-4809_v4_firmwarexeon_platinum_8360ycore_i5-10600tcore_i5-10600kf_firmwarexeon_d-1747nte_firmwarecore_i5-7640xxeon_w-3275mcore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_d-1726_firmwarexeon_gold_6336yxeon_gold_6209ucore_i9-10900e_firmwarexeon_gold_6250lxeon_e-2176m_firmwarexeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_d-2146nt_firmwarexeon_e3-1240_v5_firmwarecore_i7-7660uxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_d-1518_firmwarexeon_platinum_8376h_firmwarecore_i7-7700hqxeon_e-2236_firmwarexeon_e-2244g_firmwarecore_i7-6900k_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_gold_6238l_firmwarecore_m3-7y30core_i5-8269u_firmwarexeon_w-11155mrexeon_gold_6252xeon_w-2135xeon_e3-1505l_v6_firmwarexeon_e3-1285_v6xeon_e5-4627_v4xeon_e-2276mlxeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarecore_i7-5820k_firmwarecore_i3-8300xeon_e3-1545m_v5core_i3-7102e_firmwarexeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_gold_6346_firmwarexeon_e-2276me_firmwarecore_i5-8400txeon_d-2775texeon_w-1370p_firmwarecore_i7-1065g7core_i7-9800xxeon_silver_4208xeon_e-2136_firmwarexeon_w-1270_firmwarexeon_gold_6210u_firmwarexeon_w-1250ecore_i5-8257u_firmwarecore_i5-1038ng7_firmwarecore_i5-9400f_firmwarecore_i7-8706g_firmwarexeon_gold_5215lcore_i5-7287uxeon_e5-4660_v4xeon_e-2146g_firmwarecore_i7-3970xcore_i7-3960xxeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_e-2126g_firmwarecore_i5-9600t_firmwarexeon_d-2753nt_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarexeon_d-1529_firmwarexeon_gold_6240lxeon_w-3265mxeon_gold_6248xeon_e5-4640_v4_firmwarexeon_d-1712trxeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_d-1736_firmwarecore_i3-8145ucore_i3-9300xeon_d-2173itxeon_d-2766ntcore_i7-7567ucore_i7-10870h_firmwarecore_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_gold_6252_firmwarexeon_e5-2650_v4xeon_d-2776ntcore_i7-3820xeon_e7-4820_v4_firmwarexeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700ecore_i3-7320xeon_e3-1585l_v5core_i7-3940xmxeon_gold_6348h_firmwarexeon_e-2388gcore_i7-9700te_firmwarexeon_platinum_8268xeon_d-2786ntexeon_e-2226gxeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_silver_4215rxeon_e-2278gcore_i9-10900ecore_i3-9100core_i5-8600core_i5-8250uxeon_platinum_8380xeon_w-3265core_m3-8100y_firmwarecore_i7-3940xm_firmwarecore_i5-10500tecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i7-8700bcore_i5-10500txeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_w-1250texeon_platinum_8352mxeon_gold_6208ucore_i3-9100tecore_i5-9300hf_firmwarexeon_d-1749ntxeon_gold_6242core_i7-10700kxeon_d-1627xeon_e3-1575m_v5_firmwarexeon_e-2186mcore_i3-8109u_firmwarexeon_e3-1558l_v5xeon_gold_6250_firmwarexeon_d-1623n_firmwarecore_i3-9350k_firmwarecore_i5-7442eqxeon_d-1702core_i7-8665uecore_i3-8130uxeon_e7-4830_v4core_i3-7167uxeon_e5-2699_v4_firmwarecore_i3-8300txeon_d-1528_firmwarexeon_gold_6342xeon_e5-4628l_v4xeon_d-1732te_firmwarexeon_e3-1268l_v5core_i9-9900kxeon_silver_4316xeon_gold_6240_firmwarecore_i7-5930kcore_i5-10400fxeon_w-2265_firmwarexeon_e-2278ge_firmwarexeon_gold_6330ncore_i5-9400_firmwarexeon_gold_6226rxeon_bronze_3204xeon_w-1270e_firmwarexeon_e-2276m_firmwarecore_i3-7350k_firmwarexeon_d-1567core_i5-8400t_firmwarexeon_w-3365core_i7-9850hlxeon_w-2135_firmwarexeon_e-2286m_firmwarecore_i5-8400hxeon_e3-1245_v5xeon_w-2175xeon_d-2141i_firmwarexeon_silver_4214r_firmwarexeon_w-3335_firmwarecore_i3-10110yxeon_d-2776nt_firmwarexeon_gold_6334core_i7-7820hkcore_i5-9300h_firmwarexeon_d-1734ntxeon_w-11855mxeon_gold_6240yxeon_e5-4655_v4_firmwarexeon_gold_6238lxeon_w-1390xeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_gold_5318h_firmwarexeon_gold_6354core_i7-8665ucore_i3-10305tcore_i3-9350kf_firmwarecore_i7-5960x_firmwarexeon_w-1370_firmwarecore_i5-7440eq_firmwarexeon_d-1649n_firmwarecore_i3-8140uxeon_gold_5320hcore_i7-8086kcore_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kxeon_gold_5222xeon_e7-8870_v4_firmwarecore_i7-10850hxeon_gold_6256xeon_d-1523ncore_i3-1005g1_firmwarexeon_gold_6338n_firmwarecore_i3-9100hl_firmwarecore_i9-9900x_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i3-8100bcore_i5-8279ucore_i3-10100f_firmwarecore_i5-8600kcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarexeon_d-1541xeon_d-1543n_firmwarexeon_gold_5320t_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1622xeon_gold_5222_firmwarecore_i7-8700t_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_platinum_8352v_firmwarexeon_w-2223xeon_gold_5318n_firmwarexeon_gold_6238tcore_i5-8500xeon_silver_4310t_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i9-10980xe_firmwarexeon_gold_6240r_firmwarecore_i5-8257uxeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarecore_i7-8569uxeon_silver_4310core_i9-9900tcore_i7-10700t_firmwarexeon_d-2796ntxeon_e3-1240_v5xeon_w-2133xeon_platinum_8260lxeon_e-2336_firmwarexeon_platinum_8270xeon_gold_6248r_firmwarecore_i5-8500txeon_e3-1501m_v6core_i7-4930k_firmwarexeon_d-2766nt_firmwarexeon_w-11555mre_firmwarexeon_d-2166ntxeon_gold_6348_firmwarecore_i3-10305core_i7-9850he_firmwarexeon_e5-2608l_v4xeon_w-1390pcore_i3-9100_firmwarexeon_e5-2658_v4_firmwarecore_i7-7560u_firmwarexeon_gold_6262vxeon_platinum_8354h_firmwarecore_i7-10710uxeon_e5-2620_v4xeon_e7-4809_v4core_i5-10300hxeon_platinum_8358pcore_i5-10210yxeon_silver_4210_firmwarexeon_d-1702_firmwarexeon_platinum_8380hl_firmwarexeon_w-1270texeon_e-2224core_i9-9900ks_firmwarexeon_e-2124_firmwarexeon_gold_6238rxeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarexeon_d-2798nt_firmwarecore_i9-10980hk_firmwarexeon_d-2166nt_firmwarexeon_e5-2699a_v4core_i5-10400_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_w-2155core_i3-7102exeon_w-11155mle_firmwarexeon_platinum_8376hlxeon_e7-8894_v4_firmwarexeon_silver_4216_firmwarexeon_d-1746tercore_i9-10900k_firmwarexeon_gold_5215l_firmwarexeon_d-2738_firmwarexeon_w-2225_firmwarexeon_gold_6230xeon_d-1714_firmwarexeon_e5-2650l_v4xeon_e7-4820_v4core_i3-9100ecore_i3-7300xeon_d-1548core_i7-10510yxeon_e3-1220_v5core_i5-7y57_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_d-1653nxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarecore_i9-10900_firmwarexeon_gold_5218txeon_e-2374gxeon_e-2254ml_firmwarexeon_d-1557_firmwarecore_i5-9500t_firmwarexeon_gold_5218ncore_i7-8709g_firmwarexeon_d-2163it_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarexeon_e7-8891_v4xeon_silver_4314_firmwarexeon_d-1533n_firmwarexeon_e-2278gexeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_w-10855mxeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_w-3275_firmwarecore_i5-10600t_firmwarexeon_platinum_8270_firmwarecore_i5-10300h_firmwarexeon_d-2775te_firmwarexeon_w-3235xeon_e5-2680_v4_firmwarecore_i9-10900txeon_d-1571_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarecore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarexeon_e5-4650_v4_firmwarexeon_gold_5220rxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-9700kfxeon_d-2796texeon_d-1541_firmwarexeon_w-1290te_firmwarexeon_gold_6328hl_firmwarexeon_platinum_9221xeon_d-2142itcore_i5-7600k_firmwarexeon_platinum_9222_firmwarecore_i5-8305g_firmwarexeon_e5-2699r_v4core_i3-8100b_firmwarecore_i9-10900te_firmwarexeon_e5-2640_v4_firmwarecore_i3-8300t_firmwarecore_i3-7167u_firmwarexeon_d-1726xeon_platinum_8380_firmwarecore_i7-10700_firmwarexeon_d-1735tr_firmwarexeon_silver_4314core_i3-1005g1core_i7-1068ng7xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarecore_i7-7820eq_firmwarexeon_d-1637core_i5-9400fxeon_d-1539_firmwarexeon_e3-1515m_v5core_i5-9500f_firmwarecore_i7-6800kcore_i7-7560uxeon_platinum_8368_firmwarecore_i7-8550u_firmwarexeon_d-1602xeon_e5-4655_v4core_i5-8365uxeon_platinum_8376hxeon_w-2245xeon_d-2799xeon_gold_6312u_firmwarexeon_d-2145ntcore_i5-9600kfxeon_e5-2697a_v4xeon_e-2288g_firmwarexeon_w-1250te_firmwarexeon_e-2224gcore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uxeon_gold_6254_firmwarexeon_e5-1620_v4xeon_e5-4669_v4xeon_gold_5220_firmwarexeon_e5-2609_v4_firmwarexeon_gold_6338ncore_i5-7600t_firmwarecore_i7-9700t_firmwarecore_i7-8665ue_firmwarecore_i7-4820k_firmwarexeon_gold_6330core_i7-7820hq_firmwarexeon_silver_4208_firmwarexeon_d-1521core_i3-8145uexeon_w-2155_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarecore_i5-8265ucore_i7-10700txeon_e-2246g_firmwarecore_i9-9900kfxeon_e5-4620_v4_firmwarecore_i7-10750hxeon_e-2226ge_firmwarexeon_d-2753ntxeon_e3-1225_v6_firmwarexeon_gold_6338xeon_gold_5315ycore_i5-8400b_firmwarecore_i7-8706gcore_i7-5930k_firmwarecore_i5-7400t_firmwarexeon_silver_4215xeon_gold_6230ncore_i5-8365u_firmwarexeon_platinum_8280l_firmwarexeon_e5-2667_v4_firmwarecore_i9-10885hxeon_gold_6338tcore_i5-9500_firmwarecore_i5-7440eqxeon_d-1739_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_m3-7y32xeon_gold_6242_firmwarexeon_d-1733nt_firmwarecore_i7-10750h_firmwarexeon_e-2134xeon_w-1290texeon_w-3265_firmwarexeon_d-2142it_firmwarexeon_platinum_8360y_firmwarecore_i7-8557u_firmwarecore_m3-7y32_firmwarexeon_w-11865mre_firmwarexeon_platinum_8360hxeon_e-2176mxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_5218_firmwarecore_i9-10900t_firmwarexeon_silver_4210txeon_w-3275m_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-2795ntcore_i5-7267u_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_w-3245m_firmwarecore_i5-9600txeon_e-2226g_firmwarexeon_e5-1650_v4core_i9-7960xxeon_gold_6336y_firmwarexeon_w-1370xeon_d-1715terxeon_d-1559xeon_platinum_9242_firmwarexeon_e-2174gxeon_e3-1220_v6core_i7-7y75_firmwarexeon_d-1537xeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_gold_6230_firmwarexeon_e7-4850_v4_firmwarexeon_e-2176gxeon_gold_6254xeon_e7-8880_v4core_i3-10320xeon_gold_6342_firmwarexeon_e5-2667_v4core_i3-10105fxeon_w-1390t_firmwarexeon_gold_5320xeon_e-2224_firmwarexeon_gold_5320h_firmwarexeon_d-1649nxeon_e7-8890_v4core_i7-10875hxeon_d-1736nt_firmwarecore_i5-10400hxeon_d-2712t_firmwarecore_i5-9600kf_firmwarecore_i7-9800x_firmwarexeon_w-10885mxeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_d-1527core_i9-9940xcore_i9-9980xe_firmwarexeon_gold_6312uxeon_e3-1535m_v5core_i9-7940xxeon_gold_5220r_firmwarexeon_platinum_8380hlxeon_e3-1505l_v5core_i7-9700texeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_w-2125core_i9-9900k_firmwarexeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-10400h_firmwarexeon_silver_4309yxeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntcore_i3-10100txeon_d-1713ntcore_i3-9100f_firmwarecore_i7-7700hq_firmwarecore_i9-9980hkxeon_e-2244gcore_i3-7100txeon_w-2125_firmwarecore_i5-1035g4_firmwarexeon_platinum_8358p_firmwarexeon_e3-1235l_v5_firmwarecore_i7-9850h_firmwarexeon_d-2795nt_firmwarecore_i7-8559ucore_i5-9500exeon_gold_6314u_firmwarecore_i9-9920x_firmwarexeon_platinum_8368qxeon_w-1250e_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarexeon_gold_6209u_firmwarecore_i3-10325core_i9-7920x_firmwarexeon_e-2356gxeon_platinum_8356h_firmwarecore_i7-8700core_i3-7130ucore_i5-8400xeon_platinum_8276l_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_platinum_8380hxeon_gold_6262v_firmwarexeon_e-2334core_i7\+8700core_i5-7440hq_firmwarecore_i7-9850hcore_i3-10110u_firmwarecore_i5-7600core_i9-10980xexeon_e3-1505l_v5_firmwarexeon_w-11865mlexeon_e3-1280_v5_firmwarexeon_e5-2697_v4xeon_e-2186gxeon_gold_6226_firmwarecore_i5-8310y_firmwarexeon_silver_4210core_i9-10885h_firmwarexeon_gold_6250l_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i3-7320_firmwarecore_i7-8569u_firmwarexeon_e5-2630_v4xeon_gold_6240y_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i5-9400txeon_w-3245_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i3-8100t_firmwarecore_i5-7600_firmwarecore_i9-9960x_firmwarecore_i5-10310u_firmwarecore_i5-8400_firmwarexeon_e-2234_firmwarecore_i7-10870hxeon_silver_4215r_firmwarecore_i7-10510uxeon_w-1290pcore_i7-7920hq_firmwarecore_i5-8310ycore_i5-10500h_firmwarexeon_d-1523n_firmwarecore_i3-10300_firmwarexeon_d-2183it_firmwarexeon_w-3245xeon_e-2324gxeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_w-3345xeon_e-2186m_firmwarexeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500xeon_platinum_8351nxeon_gold_6354_firmwarexeon_e5-1650_v4_firmwarecore_i7-8850hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarexeon_e3-1240_v6_firmwarexeon_d-1622_firmwarexeon_w-11865mrecore_i3-10100_firmwarexeon_platinum_8352y_firmwarecore_i9-10900texeon_platinum_8260y_firmwarexeon_platinum_8358core_i5-1030g4_firmwarecore_i5-9500fxeon_e3-1501l_v6core_i3-10100yxeon_e7-8867_v4xeon_e-2378core_i7-7820xcore_i7-3970x_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2699r_v4_firmwarexeon_gold_5317_firmwarecore_i7-7800xcore_i5-9400hxeon_platinum_8253xeon_gold_6252nxeon_e7-8894_v4core_i3-9320xeon_platinum_8280core_i7-10700f_firmwarecore_i3-10100t_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarecore_i3-10105xeon_silver_4309y_firmwarecore_i7-4940mxxeon_gold_6246core_i9-10900kf_firmwarexeon_e5-4610_v4_firmwarexeon_e5-1630_v4core_i7-8550uxeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i9-10940xcore_i7-9700xeon_e3-1270_v6xeon_w-3265m_firmwarexeon_d-1577_firmwarecore_i7-9850hexeon_platinum_8360hlcore_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwarexeon_d-1748texeon_gold_5315y_firmwarecore_i5-7500txeon_silver_4310txeon_d-2187ntxeon_d-1518xeon_gold_5318hcore_i3-1000g1xeon_w-2225xeon_gold_5320_firmwarecore_i7-3820_firmwarexeon_e-2276mexeon_silver_4210t_firmwarecore_i5-7y54xeon_gold_5218t_firmwarecore_i7-6950xxeon_e5-4620_v4core_i5-7400core_i7-8700b_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarecore_i3-10305t_firmwarexeon_w-10855m_firmwarecore_i9-10850k_firmwarecore_i7-7660u_firmwarecore_i5-8365ue_firmwarexeon_e5-2698_v4xeon_platinum_8352score_i7-7920hqxeon_d-1718tcore_i7-10700xeon_d-1533ncore_i3-7020uxeon_w-2195xeon_e-2136core_i5-9300hfcore_i3-8145u_firmwarexeon_w-1270pcore_i5-8600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rxeon_platinum_9282core_i5-10400core_i3-7020u_firmwarexeon_d-2161ixeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarexeon_silver_4215_firmwarexeon_d-2123itcore_i5-8365uecore_i3-8109ucore_i7-4960x_firmwarexeon_bronze_3206rxeon_gold_6346xeon_d-1722nexeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarexeon_gold_5220core_i5-8350uxeon_platinum_8256_firmwarexeon_e3-1275_v5core_i7-8750h_firmwarexeon_e5-4610_v4core_i3-10100texeon_e3-1558l_v5_firmwarecore_i5-10210u_firmwarecore_i3-8140u_firmwarexeon_d-1537_firmwarexeon_d-2796te_firmwarecore_i5-7y57xeon_w-3375_firmwarecore_i3-9300_firmwarecore_i7-3920xmxeon_gold_6330hcore_i5-7260uxeon_d-1540_firmwarecore_i5-10600k_firmwarexeon_e7-8890_v4_firmwarecore_i5-8259u_firmwarexeon_e5-2683_v4_firmwarexeon_e-2124core_i7-9750hcore_i3-10110y_firmwarexeon_e-2186g_firmwarexeon_d-1553n_firmwarecore_i9-7980xe_firmwarexeon_platinum_8368xeon_w-1270te_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarexeon_d-2798ntcore_i5-10600xeon_e3-1240l_v5_firmwarecore_i5-10500_firmwarexeon_w-2245_firmwarexeon_e3-1260l_v5core_i5-10310yxeon_d-1736core_i5-10310y_firmwarexeon_d-2738xeon_d-1567_firmwarecore_i5-8259uxeon_e-2388g_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_e-2336xeon_gold_6246_firmwarexeon_e3-1225_v5xeon_platinum_8260_firmwarexeon_e-2286mcore_i9-9880hcore_i7-8705g_firmwarecore_i7-4930mx_firmwarexeon_gold_6244_firmwarexeon_d-1722ne_firmwarecore_i5-1035g4core_i7-8650ucore_i5-10200hcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220txeon_e-2324g_firmwarecore_i7-7600uxeon_gold_6244xeon_w-3223_firmwarexeon_gold_6242rcore_i5-1035g7_firmwarecore_i3-7100exeon_w-2275xeon_w-3175x_firmwarecore_i7\+8700_firmwarexeon_w-2265core_i5-9500xeon_e3-1535m_v6core_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_d-1714xeon_gold_5218b_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_gold_6248_firmwarecore_i7-9750hfxeon_e3-1501m_v6_firmwarexeon_d-2141icore_i7-3920xm_firmwarecore_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e-2176g_firmwarecore_i5-1035g7xeon_gold_6326xeon_e-2254mlcore_i5-8305gcore_i3-9350kcore_i5-7400txeon_gold_6348core_i7-8750hxeon_w-2145_firmwarecore_i3-10100e_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i5-8300hcore_i9-7940x_firmwarecore_i3-7101te_firmwarexeon_d-2712txeon_e5-2650l_v4_firmwarecore_i5-9500e_firmwarecore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i5-9500texeon_w-1290e_firmwarexeon_d-1520core_i5-7y54_firmwarexeon_d-2187nt_firmwarexeon_w-1390p_firmwarexeon_e3-1280_v6_firmwarecore_i9-10900f_firmwarexeon_w-11955m_firmwarexeon_platinum_8280lcore_m3-8100yxeon_platinum_8356hxeon_gold_6338t_firmwarecore_i5-7267ucore_i3-7100uxeon_d-1543ncore_i5-7260u_firmwarexeon_e7-8867_v4_firmwarexeon_gold_5318y_firmwarecore_i5-7300u_firmwarexeon_d-1732texeon_d-1520_firmwarexeon_platinum_9242xeon_e5-4660_v4_firmwarexeon_e5-2680_v4core_i7-10700e_firmwarecore_i3-9100te_firmwarexeon_e5-2660_v4_firmwarecore_i3-7300tcore_i5-8210yxeon_e5-2687w_v4core_i7-1060g7core_i7-8565u_firmwarexeon_w-11855m_firmwarecore_i7-5820kxeon_platinum_8352m_firmwarecore_i7-9700_firmwarecore_i7-7700tcore_i7-6900kcore_i9-9980xexeon_platinum_9282_firmwarexeon_gold_6250xeon_d-1713ntecore_i3-9350kfxeon_w-1290txeon_d-1739core_i7-8809gxeon_gold_6226core_i3-10105_firmwarecore_i7-8650u_firmwarexeon_d-1577xeon_d-1735trxeon_silver_4214_firmwarexeon_platinum_8268_firmwarecore_i7-10850h_firmwarexeon_e3-1535m_v5_firmwarexeon_e-2314xeon_e5-2690_v4_firmwarecore_i7-8700_firmwarecore_i3-7350kcore_i3-8300_firmwarecore_i5-10505xeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_w-2255core_i9-10900x_firmwarecore_i5-7600kcore_m3-7y30_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_d-1746ter_firmwarexeon_w-11865mle_firmwarecore_i3-1000g4_firmwarexeon_gold_6330_firmwarecore_i5-8350u_firmwarexeon_e-2276g_firmwarexeon_d-1627_firmwarexeon_d-1733ntxeon_gold_5218xeon_w-2145xeon_gold_6338_firmwarecore_i7-4940mx_firmwarecore_i3-9100fxeon_w-1250_firmwarecore_i5-7500t_firmwarexeon_d-1653n_firmwarecore_i9-10900fxeon_w-3225_firmwarexeon_e3-1245_v6xeon_e-2378gcore_i5-10200h_firmwarecore_i3-8100txeon_gold_6238r_firmwarecore_i5-9500txeon_platinum_8352yxeon_w-3223xeon_e5-2643_v4xeon_e3-1268l_v5_firmwarexeon_e-2276gxeon_gold_6222vcore_i7-10700fxeon_e5-1620_v4_firmwarexeon_d-1571core_i5-9600k_firmwarexeon_gold_6238t_firmwarexeon_e5-2620_v4_firmwarexeon_platinum_8353h_firmwarexeon_gold_5217_firmwareIntel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33094
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.36%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:50
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_keyboard_led_service_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2021-33090
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.36%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:57
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissionsin the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC10i3FN, NUC10i5FN, NUC10i7FN before version 1.78.2.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc10i5fnnuc10i3fnnuc_hdmi_firmware_update_toolnuc10i7fnIntel(R) NUC HDMI Firmware Update Tool for NUC10i3FN, NUC10i5FN, NUC10i7FN
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2017-5700
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.48%
||
7 Day CHG~0.00%
Published-11 Oct, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient protection of password storage in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to bypass Administrator and User passwords via access to password storage.

Action-Not Available
Vendor-Intel Corporation
Product-nuc7i3bnhnuc7i3bnk_firmwarenuc7i3bnh_firmwarenuc7i3bnknuc7i7bnh_firmwarenuc7i7bnhnuc7i5bnknuc7i5bnh_firmwarenuc7i5bnhnuc7i5bnk_firmwareNUC Kits
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2017-5727
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.67%
||
7 Day CHG~0.00%
Published-02 Feb, 2018 | 15:00
Updated-17 Sep, 2024 | 02:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel Graphics Driver
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2017-5688
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 22.59%
||
7 Day CHG~0.00%
Published-31 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an escalation of privilege vulnerability in the Intel Solid State Drive Toolbox versions before 3.4.5 which allow a local administrative attacker to load and execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-solid_state_drive_toolboxSolid State Drive Toolbox
CVE-2017-5710
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.75%
||
7 Day CHG~0.00%
Published-21 Nov, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple privilege escalations in kernel in Intel Trusted Execution Engine Firmware 3.0 allows unauthorized process to access privileged content via unspecified vector.

Action-Not Available
Vendor-Intel Corporation
Product-trusted_execution_engine_firmwareTrusted Execution Engine
CVE-2021-0154
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.76%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e5-2650l_v4xeon_e-2286gxeon_e7-4820_v4xeon_e5-1650_v4_firmwarexeon_e5-2603_v4_firmwarexeon_e3-1240_v6_firmwarecore_i9-7900xxeon_d-2733nt_firmwarexeon_d-1548xeon_d-1622_firmwarexeon_e3-1220_v5core_i7-7820x_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_d-1527_firmwarexeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_d-1653nxeon_e3-1578l_v5_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_d-2173it_firmwarexeon_e5-2637_v4xeon_d-1633n_firmwarecore_i9-7920xcore_i9-9960xxeon_d-1513n_firmwarexeon_e3-1230_v6core_i9-7960x_firmwarexeon_e-2374gxeon_d-1749nt_firmwarexeon_e3-1501l_v6xeon_e-2254ml_firmwarexeon_e7-4809_v4_firmwarexeon_e-2378xeon_e7-8867_v4xeon_d-1557_firmwarexeon_e5-2630_v4_firmwarexeon_e-2236xeon_e3-1220_v5_firmwarecore_i7-7820xcore_i7-3970x_firmwarexeon_e5-2699r_v4_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_d-1747nte_firmwarexeon_d-2163it_firmwarecore_i5-7640xcore_i7-7800xxeon_d-1531xeon_d-1726_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarexeon_e7-8891_v4xeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_e3-1240_v5_firmwarexeon_e-2278gexeon_d-1533n_firmwarexeon_e3-1545m_v5_firmwarexeon_e5-2650_v4_firmwarexeon_d-2146nt_firmwarexeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_e7-8894_v4xeon_d-2786nte_firmwarexeon_d-1518_firmwarexeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4xeon_e-2236_firmwarexeon_d-2775te_firmwarexeon_e5-2680_v4_firmwarexeon_e-2244g_firmwarexeon_d-1571_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_e-2126gcore_i7-6900k_firmwarexeon_e7-8893_v4_firmwarexeon_e5-4650_v4_firmwarexeon_e3-1285_v6xeon_e3-1505l_v6_firmwarexeon_e5-4627_v4core_i7-4940mxxeon_e-2276mlxeon_e5-4610_v4_firmwarexeon_e3-1235l_v5xeon_e5-1630_v4xeon_e3-1225_v5_firmwarexeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i9-10940xxeon_d-2796texeon_d-1541_firmwarexeon_e3-1270_v6core_i7-5820k_firmwarecore_i9-10900xxeon_e3-1545m_v5xeon_d-1577_firmwarexeon_d-1531_firmwarexeon_e-2334_firmwarexeon_e3-1515m_v5_firmwarexeon_d-2142itxeon_e-2276me_firmwarexeon_d-1748texeon_e7-8891_v4_firmwarexeon_e5-2699r_v4xeon_d-2187ntxeon_d-2775texeon_e5-2640_v4_firmwarexeon_d-1518core_i7-9800xcore_i7-6800k_firmwarexeon_e-2136_firmwarexeon_d-1726xeon_d-1735tr_firmwarexeon_e5-2648l_v4xeon_e-2276mecore_i7-3820_firmwarexeon_e-2146gcore_i7-6950xxeon_e5-4620_v4xeon_d-2752nte_firmwarexeon_e7-8870_v4xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarexeon_d-1637xeon_e-2356g_firmwarexeon_e5-4660_v4xeon_e-2146g_firmwarexeon_e5-2698_v4core_i7-3970xxeon_e-2286g_firmwarexeon_e3-1515m_v5xeon_d-1539_firmwarecore_i7-3960xcore_i7-6800kxeon_d-1718txeon_e-2126g_firmwarexeon_d-2753nt_firmwarexeon_d-1602xeon_e5-4655_v4core_i7-4820kxeon_d-1533nxeon_d-1529_firmwarexeon_e3-1260l_v5_firmwarexeon_d-2799xeon_e3-1240l_v5xeon_e-2136xeon_e5-4640_v4_firmwarexeon_e-2378_firmwarexeon_d-1712trcore_i9-9940x_firmwarexeon_d-2145ntxeon_e5-2697a_v4xeon_d-1736_firmwarexeon_e-2288g_firmwarexeon_e-2276mxeon_e-2224gxeon_d-2173itxeon_d-2766ntxeon_d-2161ixeon_d-2163itxeon_e5-1620_v4xeon_e5-4669_v4core_i7-3930kxeon_d-2123itxeon_e5-2609_v4_firmwarexeon_e3-1505m_v5xeon_d-1623nxeon_e3-1535m_v6_firmwarecore_i7-4960x_firmwarecore_i7-4820k_firmwarexeon_d-1521xeon_e5-2628l_v4xeon_d-1722nexeon_e5-2650_v4xeon_e7-4820_v4_firmwarexeon_d-2776ntcore_i7-3820xeon_d-2161i_firmwarexeon_e-2144g_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarexeon_e3-1585l_v5xeon_e-2378g_firmwarecore_i7-3940xmxeon_e3-1275_v5xeon_e5-4610_v4xeon_e-2246g_firmwarexeon_e5-2658_v4xeon_e5-1630_v4_firmwarexeon_e-2388gxeon_e3-1558l_v5_firmwarexeon_e5-4620_v4_firmwarexeon_d-2786ntexeon_d-1537_firmwarexeon_e-2226gxeon_d-2796te_firmwarecore_i7-3920xmxeon_e-2226ge_firmwarexeon_d-2143itxeon_e-2226gexeon_e3-1225_v6_firmwarexeon_d-2753ntxeon_e-2278gxeon_d-1540_firmwarexeon_e7-8890_v4_firmwarexeon_e5-2683_v4_firmwarecore_i7-5930k_firmwarexeon_e-2124xeon_e-2186g_firmwarexeon_d-1553n_firmwarexeon_e5-2695_v4core_i9-7980xe_firmwarexeon_d-2177nt_firmwarecore_i7-3940xm_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-2798ntxeon_e5-2667_v4_firmwarexeon_d-1712tr_firmwarexeon_e3-1240l_v5_firmwarexeon_e7-8860_v4_firmwarecore_i7-6950x_firmwarexeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_e3-1260l_v5xeon_d-1739_firmwarexeon_e-2386gxeon_d-1736xeon_d-2738xeon_d-1567_firmwarexeon_e5-2683_v4xeon_e-2134xeon_d-1733nt_firmwarexeon_e-2388g_firmwarexeon_d-1749ntcore_i9-9820x_firmwarexeon_d-2142it_firmwarexeon_e-2336xeon_d-1627xeon_e3-1575m_v5_firmwarexeon_d-2779_firmwarexeon_e3-1225_v5xeon_e-2186mxeon_d-1602_firmwarexeon_e3-1558l_v5xeon_e-2176mxeon_d-2733ntxeon_e-2286mxeon_d-1559_firmwarecore_i7-4930mx_firmwarexeon_d-1623n_firmwarexeon_d-1702xeon_e-2274gxeon_d-1722ne_firmwarexeon_e5-2630l_v4xeon_e7-8893_v4xeon_e7-4830_v4xeon_e5-2699_v4_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-1528_firmwarexeon_d-2795ntxeon_e5-4628l_v4xeon_d-1732te_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_e3-1268l_v5xeon_e-2226g_firmwarexeon_d-1529xeon_e5-1650_v4core_i9-7960xcore_i7-5930kxeon_e-2324g_firmwarexeon_d-1715terxeon_d-1559xeon_e-2278ge_firmwarexeon_e-2174gxeon_e3-1535m_v6xeon_e3-1220_v6xeon_e3-1585_v5_firmwarecore_i9-9820xxeon_e-2276m_firmwarexeon_d-1537xeon_d-1714xeon_e7-4850_v4xeon_d-1567xeon_e3-1220_v6_firmwarexeon_e7-4850_v4_firmwarexeon_e-2286m_firmwarexeon_e3-1501m_v6_firmwarexeon_e3-1245_v5xeon_d-1734nt_firmwarexeon_d-2141ixeon_e-2176gxeon_e-2288gcore_i7-3920xm_firmwarexeon_e-2274g_firmwarexeon_d-2141i_firmwarexeon_e3-1225_v6core_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e3-1280_v6xeon_e7-8880_v4xeon_e-2176g_firmwarexeon_d-2752ntexeon_d-2776nt_firmwarexeon_e-2254mlxeon_e-2124g_firmwarexeon_e5-2667_v4xeon_d-1734ntxeon_e5-2695_v4_firmwarexeon_e-2224_firmwarexeon_e5-4655_v4_firmwarexeon_e5-2608l_v4_firmwarexeon_d-1649nxeon_e7-8890_v4xeon_e5-2609_v4xeon_d-1540xeon_d-1736nt_firmwarexeon_d-2712t_firmwarexeon_d-1513ncore_i7-9800x_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i7-5960x_firmwarexeon_e-2224g_firmwarecore_i9-7940x_firmwarexeon_e5-2643_v4_firmwarexeon_d-1527xeon_e3-1505m_v6xeon_e7-8860_v4core_i9-9940xxeon_d-2712txeon_e5-2690_v4xeon_d-1649n_firmwarecore_i9-9980xe_firmwarexeon_e3-1535m_v5core_i9-9900xxeon_e5-2650l_v4_firmwarecore_i9-7940xxeon_e5-2699a_v4_firmwarecore_i9-7900x_firmwarexeon_e3-1505m_v6_firmwarexeon_e7-8870_v4_firmwarexeon_e-2254mexeon_d-1523nxeon_e3-1505l_v5core_i9-9900x_firmwarexeon_e7-4830_v4_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_d-1520xeon_d-2187nt_firmwarexeon_e3-1280_v6_firmwarecore_i7-7800x_firmwarexeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntxeon_e-2144gxeon_d-1713ntxeon_d-1543nxeon_e3-1270_v6_firmwarexeon_d-2752terxeon_d-1541xeon_d-1543n_firmwarexeon_e-2244gxeon_e7-8867_v4_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1732texeon_d-1622xeon_d-1520_firmwarexeon_e5-2640_v4xeon_e5-4660_v4_firmwarexeon_e5-2680_v4xeon_e5-2697a_v4_firmwarexeon_e3-1235l_v5_firmwarecore_i7-7740xxeon_d-2795nt_firmwarexeon_d-1713nte_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2660_v4_firmwarexeon_e3-1575m_v5xeon_e-2124gcore_i9-9920x_firmwarexeon_e5-2687w_v4core_i7-4930kcore_i9-10980xe_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarecore_i7-5820kcore_i9-7920x_firmwarexeon_e-2356gcore_i7-6900kcore_i9-9980xexeon_d-1557xeon_e5-2623_v4xeon_d-2796ntxeon_e3-1240_v5xeon_e3-1585l_v5_firmwarexeon_e-2336_firmwarexeon_d-1713ntexeon_e3-1585_v5xeon_d-1739xeon_e-2334xeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_d-1577xeon_e3-1501m_v6xeon_d-1735trxeon_d-2766nt_firmwarecore_i7-4930k_firmwarecore_i9-10980xexeon_e3-1505l_v5_firmwarexeon_e-2314xeon_e3-1535m_v5_firmwarexeon_e5-2690_v4_firmwarexeon_d-2166ntxeon_e3-1280_v5_firmwarexeon_e5-2608l_v4xeon_e5-2697_v4xeon_e-2186gxeon_e-2314_firmwarexeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2658_v4_firmwarexeon_d-1718t_firmwarexeon_e5-2648l_v4_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i9-10900x_firmwarecore_i7-4930mxxeon_e5-2630_v4xeon_e7-4809_v4xeon_d-1746ter_firmwarexeon_e5-2620_v4xeon_d-2143it_firmwarexeon_e3-1230_v6_firmwarexeon_e3-1275_v6xeon_e3-1565l_v5_firmwarexeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4xeon_e-2276g_firmwarexeon_e5-2698_v4_firmwarexeon_d-1627_firmwarexeon_d-1702_firmwarexeon_d-1733ntxeon_e-2224xeon_e5-2618l_v4_firmwarexeon_e-2124_firmwarecore_i7-4940mx_firmwarexeon_d-1653n_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarecore_i9-9960x_firmwarexeon_d-1736ntxeon_e-2278gelxeon_d-1553nxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_e3-1245_v6xeon_e-2378gxeon_d-2798nt_firmwarexeon_e-2234_firmwarexeon_d-1747ntexeon_d-2166nt_firmwarexeon_e5-2699a_v4xeon_d-1523n_firmwarexeon_d-2183it_firmwarecore_i7-6850kxeon_e5-2643_v4xeon_e-2324gxeon_e3-1268l_v5_firmwarexeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e7-8894_v4_firmwarexeon_e-2276gxeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_d-1548_firmwarexeon_d-1746terxeon_e5-1620_v4_firmwarexeon_d-1571xeon_e-2186m_firmwarexeon_d-1528xeon_d-2738_firmwarexeon_e-2234xeon_e5-2620_v4_firmwarecore_i7-7740x_firmwarexeon_d-1714_firmwareIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11085
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.99%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i915_firmwarei915Intel(R) i915 Graphics for Linux
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11148
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.27%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:12
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for Intel(R) Remote Displays SDK before version 2.0.1 R2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-remote_displays_sdkIntel(R) Remote Displays SDK Advisory
CVE-2019-11094
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.70%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in system firmware for Intel (R) NUC Kit may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_dn2820fykhnuc_kit_d54250wybnuc_kit_nuc7cjyhnuc_kit_nuc5i7ryhnuc_kit_nuc6i7kyknuc_kit_de3815tybenuc_kit_nuc8i7hnknuc_kit_nuc5cpyhnuc_kit_nuc7i7bnhnuc_kit_d33217gkenuc_kit_nuc6caysnuc_kit_nuc5pgyhnuc_kit_nuc5i5myhenuc_kit_d53427rkenuc_kit_nuc7i3dnhenuc_kit_nuc6i5syhnuc_kit_nuc7i5dnkenuc_kit_firmwarenuc_kit_nuc5i3myhenuc_kit_nuc7i7dnkeIntel (R) NUC
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11112
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.50%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:41
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-graphics_drivercloud_backupdata_availability_servicessteelstore_cloud_integrated_storage2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-11146
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:13
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper file verification in Intel® Driver & Support Assistant before 19.7.30.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-driver_\&_support_assistantIntel(R) Driver & Support Assistant Advisory
CWE ID-CWE-275
Not Available
CVE-2019-11163
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.62%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:12
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in a hardware abstraction driver for Intel(R) Processor Identification Utility for Windows before version 6.1.0731 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-processor_identification_utilityIntel(R) Processor Identification Utility for Windows* Advisory
CVE-2019-11181
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.42%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:38
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-0121
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.27%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in Intel(R) Matrix Storage Manager 8.9.0.1023 and before may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-matrix_storage_managerIntel(R) Matrix Storage Manager
CWE ID-CWE-264
Not Available
CVE-2019-0119
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.78%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s7200aphns2600kp_firmwarexeon_d-1627_firmwarehns2600tpnr_firmwarexeon_d-1527xeon_gold_processors_firmwarexeon_silver_processorsxeon_d-1523nserver_board_s2600kphns2600jff_firmwarexeon_d-1540xeon_d-1653nxeon_d-2163it_firmwareserver_board_s2600cw_firmwarexeon_d-1528xeon_d-1637xeon_d-1577xeon_d-1521_firmwarexeon_d-1527_firmwarexeon_d-2141ixeon_d-1557_firmwarexeon_d-1541hns2600bpq24_firmwarexeon_d-1543n_firmwarexeon_d-1518xeon_d-1633n_firmwarehns2600bpb24hns2600tpfrhns2600bpblc24xeon_d-2143ithns7200ap_firmwarexeon_d-2163itxeon_d-1653n_firmwareserver_board_s1200sphns2600kpr_firmwarexeon_d-2161i_firmwarehns2600tpfr_firmwarehns2600jf_firmwarexeon_d-1553nserver_board_s2600st_firmwarehns2600tpfxeon_d-1567_firmwaremfs5000si_firmwarexeon_d-1571_firmwarehns2600tp_firmwarexeon_d-1567server_board_s2600tpxeon_d-1633nhns2600bpbxeon_d-1548xeon_d-2173it_firmwarexeon_d-1649nxeon_d-1529hns7200aprlhns2600tp24str_firmwarehns2600wpq_firmwarexeon_bronze_processorsxeon_d-2191xeon_d-1531_firmwarexeon_d-1518_firmwarexeon_d-2123it_firmwarexeon_platinum_processorsxeon_silver_processors_firmwarehns2600kphns2600kpfxeon_platinum_processors_firmwarehns7200aplhns2400lpxeon_d-1520xeon_d-1571mfs5000sixeon_d-2146nt_firmwareserver_board_s2600sthns2600bpb24_firmwarexeon_d-2173itserver_board_s1200sp_firmwaremfs2600kixeon_d-2123ithns2600tp24strxeon_d-2177nt_firmwarexeon_gold_processorsxeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwareserver_board_s2600wt_firmwarehns2600bpblc24_firmwarexeon_d-1623nxeon_d-1531xeon_d-1602hns7200aphns2600tprserver_board_s2600tp_firmwaremfs5520vir_firmwarehns2600wp_firmwarexeon_d-1539xeon_d-1533nhns2600tpf_firmwareserver_board_s2600cwhns2600bpq_firmwarehns2600bpqmfs5520virxeon_d-2142itserver_board_s2600wthns2600bps_firmwarexeon_d-1622_firmwarexeon_d-1649n_firmwarehns2600bpblcxeon_d-2146ntxeon_d-1577_firmwarexeon_d-2145nt_firmwarehns2600jffhns2600wpqxeon_d-2161ixeon_d-2141i_firmwarehns2600wpxeon_d-2187nthns2600kpfrhns2600kprhns7200apl_firmwarexeon_d-1537_firmwarexeon_bronze_processors_firmwareserver_board_s2600bpxeon_d-1541_firmwarehns2600bpsserver_board_s2600bp_firmwarehns2600bpblc_firmwarexeon_d-2166nt_firmwarehns2600bps24xeon_d-2166nthns2600bpq24xeon_d-1623n_firmwarehns2600tpxeon_d-1548_firmwarehns7200apr_firmwarehns2600tpnrxeon_d-2183ithns2600tpr_firmwarehns2600jfq_firmwarexeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-1622xeon_d-1559_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_d-1539_firmwaremfs2600ki_firmwarexeon_d-1559xeon_d-1521hns2600kpfr_firmwareserver_board_s2600wfxeon_d-2145ntxeon_d-2191_firmwarehns7200aprl_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_d-1637_firmwarehns2600jfserver_board_s7200ap_firmwarehns7200aprhns2600tp24srserver_board_s2600kp_firmwarehns2400lp_firmwarehns2600wpf_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwarehns2600bpb_firmwarehns2600jfqxeon_d-2143it_firmwareserver_system_s9200wkxeon_d-1557server_system_s9200wk_firmwarehns2600tp24rhns2600kpf_firmwarehns2600wpfxeon_d-1513n_firmwarexeon_d-1602_firmwarexeon_d-1523n_firmwareserver_board_s2600wf_firmwarehns2600bps24_firmwarexeon_d-2177ntxeon_d-1553n_firmwarehns2600tp24sr_firmwarehns2600tp24r_firmwareIntel(R) Unified Extensible Firmware Interface (UEFI)
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0152
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.62%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:06
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8276lxeon_platinum_8153xeon_platinum_8170_firmwarexeon_bronze_3104_firmwarexeon_gold_6146xeon_gold_6126txeon_gold_6126f_firmwarexeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_w-2125xeon_w-2155_firmwarexeon_gold_5217_firmwarexeon_gold_6138xeon_gold_6246xeon_d-2163it_firmwarexeon_platinum_8164xeon_gold_6240_firmwarexeon_gold_5215mxeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_d-2143itxeon_d-2163itxeon_platinum_8168xeon_gold_6244_firmwarexeon_d-2161i_firmwarexeon_gold_5218xeon_gold_6238m_firmwarexeon_platinum_8284xeon_silver_4109txeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_5122_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6212u_firmwarexeon_gold_6212uxeon_gold_6126_firmwarexeon_platinum_8280mxeon_gold_6240l_firmwarexeon_silver_4114xeon_d-2123it_firmwarexeon_platinum_8276_firmwarexeon_bronze_3104xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6150_firmwarexeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5220s_firmwarexeon_gold_5215_firmwarexeon_platinum_8260y_firmwarexeon_gold_6144_firmwarexeon_platinum_8274xeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_5218txeon_gold_6240y_firmwarexeon_gold_6150xeon_gold_6242_firmwarexeon_gold_6140xeon_silver_4114_firmwarexeon_gold_6230_firmwarexeon_d-2146ntxeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_gold_6210uxeon_d-2187ntxeon_gold_6126xeon_platinum_8158_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_gold_6140m_firmwarexeon_silver_4216xeon_platinum_8253xeon_gold_6230xeon_w-2195xeon_gold_6134_firmwarexeon_gold_6130t_firmwarexeon_gold_6130f_firmwarexeon_d-2183itxeon_gold_6142fxeon_w-2145_firmwarexeon_d-2145ntxeon_platinum_8153_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_gold_6130xeon_platinum_8260mxeon_silver_4214y_firmwarexeon_silver_4208xeon_platinum_8260xeon_platinum_8160t_firmwarexeon_bronze_3204_firmwarexeon_silver_4214_firmwarexeon_d-2142it_firmwarexeon_w-2123xeon_gold_5220sxeon_platinum_8280m_firmwarexeon_d-2143it_firmwarexeon_platinum_9242xeon_platinum_9282xeon_platinum_8280lxeon_silver_4110xeon_platinum_9242_firmwarexeon_bronze_3204xeon_platinum_8280_firmwarexeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_5217xeon_platinum_8276mxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_gold_6138txeon_bronze_3106xeon_gold_6238mxeon_gold_5120xeon_gold_5220xeon_gold_6154_firmwarexeon_platinum_8160txeon_gold_6254xeon_silver_4209t_firmwarexeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_d-2141ixeon_gold_5215l_firmwarexeon_silver_4208_firmwarexeon_w-2195_firmwarexeon_platinum_8268xeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_silver_4209txeon_w-2133_firmwarexeon_silver_4116xeon_gold_6240mxeon_gold_6210u_firmwarexeon_gold_6252nxeon_gold_6244xeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_platinum_8274_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_w-2135_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_5218_firmwarexeon_gold_6132xeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_d-2146nt_firmwarexeon_platinum_8158xeon_gold_6238l_firmwarexeon_w-2155xeon_gold_5218b_firmwarexeon_w-2135xeon_gold_6222vxeon_w-2125_firmwarexeon_platinum_8176xeon_platinum_8160_firmwarexeon_gold_6242xeon_w-2175_firmwarexeon_silver_4112_firmwarexeon_w-2145xeon_gold_6262v_firmwarexeon_platinum_8260yxeon_platinum_8270xeon_platinum_8260m_firmwarexeon_gold_6148_firmwarexeon_gold_6128xeon_w-3175x_firmwarexeon_silver_4215xeon_gold_5220t_firmwarexeon_d-2142itxeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_gold_5220_firmwarexeon_gold_6240m_firmwarexeon_gold_5215m_firmwarexeon_silver_4214xeon_platinum_8276xeon_gold_6142f_firmwarexeon_gold_6238txeon_d-2161ixeon_platinum_8164_firmwarexeon_silver_4214yxeon_d-2141i_firmwarexeon_gold_5218bxeon_silver_4216_firmwarexeon_gold_6254_firmwarexeon_platinum_8276m_firmwarexeon_platinum_8176fxeon_platinum_8284_firmwarexeon_d-2187nt_firmwarexeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_5120txeon_w-3175xxeon_gold_6252xeon_gold_6134xeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_platinum_8260_firmwarexeon_w-2133xeon_gold_6252_firmwarexeon_d-2183it_firmwarexeon_gold_6148xeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6140mxeon_platinum_9282_firmwarexeon_platinum_8180xeon_d-2177ntxeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_w-2175xeon_gold_5220t2019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0109
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.68%
||
7 Day CHG~0.00%
Published-18 Feb, 2019 | 17:00
Updated-16 Sep, 2024 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper folder permissions in Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managern/a
CVE-2019-0086
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.06%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) Converged Security & Management Engine (CSME) Dynamic Application Loader, Intel (R) Trusted Execution Engine Interface (TXE)
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-0126
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 33.45%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in silicon reference firmware for Intel(R) Xeon(R) Scalable Processor, Intel(R) Xeon(R) Processor D Family may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_d-2123itxeon_d-2177nt_firmwarexeon_gold_processorsxeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwarexeon_d-1627_firmwarexeon_d-1623nxeon_d-1531xeon_d-1602xeon_d-1539xeon_d-1533nxeon_d-1527xeon_gold_processors_firmwarexeon_d-2142itxeon_silver_processorsxeon_d-1523nxeon_d-1622_firmwarexeon_d-1649n_firmwarexeon_d-2146ntxeon_d-1540xeon_d-1653nxeon_d-2163it_firmwarexeon_d-1577_firmwarexeon_d-1528xeon_d-2145nt_firmwarexeon_d-1637xeon_d-1577xeon_d-1521_firmwarexeon_d-1527_firmwarexeon_d-2161ixeon_d-2141i_firmwarexeon_d-2141ixeon_d-1557_firmwarexeon_d-1541xeon_d-2187ntxeon_d-1543n_firmwarexeon_d-1537_firmwarexeon_bronze_processors_firmwarexeon_d-1518xeon_d-1541_firmwarexeon_d-1633n_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2143itxeon_d-1623n_firmwarexeon_d-2163itxeon_d-1653n_firmwarexeon_d-1548_firmwarexeon_d-2161i_firmwarexeon_d-1553nxeon_d-2183itxeon_d-1567_firmwarexeon_d-1571_firmwarexeon_d-1513nxeon_d-1567xeon_d-1537xeon_d-2187nt_firmwarexeon_d-1622xeon_d-1559_firmwarexeon_d-1633nxeon_d-1543nxeon_d-1528_firmwarexeon_d-1539_firmwarexeon_d-1548xeon_d-1559xeon_d-2173it_firmwarexeon_d-1521xeon_d-1649nxeon_d-1529xeon_d-2145ntxeon_d-2191_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_d-1637_firmwarexeon_bronze_processorsxeon_d-2191xeon_d-1531_firmwarexeon_d-1518_firmwarexeon_d-2123it_firmwarexeon_platinum_processorsxeon_silver_processors_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwarexeon_platinum_processors_firmwarexeon_d-2143it_firmwarexeon_d-1557xeon_d-1520xeon_d-1513n_firmwarexeon_d-1571xeon_d-1602_firmwarexeon_d-1523n_firmwarexeon_d-2177ntxeon_d-2146nt_firmwarexeon_d-1553n_firmwarexeon_d-2173itIntel(R) Unified Extensible Firmware Interface (UEFI)
CVE-2019-0171
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for Intel(R) Quartus(R) software may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quartus_iiquartus_primeIntel(R) Quartus(R)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2019-0158
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.70%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 17:02
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient path checking in the installation package for Intel(R) Graphics Performance Analyzer for Linux version 18.4 and before may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_performance_analyzerIntel(R) Graphics Performance Analyzer for Linux Advisory
CVE-2019-0129
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.00%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 23:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions for Intel(R) USB 3.0 Creator Utility all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-usb_3.0_creator_utilityIntel(R) USB 3.0 Creator Utility
CWE ID-CWE-264
Not Available
CVE-2019-0088
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 20:00
Updated-17 Sep, 2024 | 02:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient path checking in Intel(R) System Support Utility for Windows before 2.5.0.15 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-system_support_utilityIntel(R) System Support Utility for Windows
CVE-2019-0145
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.42%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:21
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel Corporation
Product-ethernet_controller_x710-at2_firmwarelinux_kernelethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-0124
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.77%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:07
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting TXT, may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1230_v5core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_e3-1558l_v5core_i7-7660ucore_i7-6600ucore_i7-8706gxeon_e3-1565l_v5_firmwarexeon_e3-1565l_v5xeon_e3-1501l_v6_firmwarexeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e-2124g_firmwarecore_i7-9700kfxeon_e-2126g_firmwarexeon_e3-1240_v6xeon_e-2254me_firmwarecore_i7-8700core_i7-8665ue_firmwarexeon_e-2276me_firmwarexeon_e3-1220_v5_firmwarecore_i7-8705g_firmwarecore_i7-7700tcore_i7-8086kcore_i7-6600u_firmwarecore_i7-9700core_i7-6770hqcore_i7-8700kcore_i7-6650u_firmwarexeon_e3-1280_v5core_i9-9900kfxeon_e-2226gxeon_e3-1270_v6_firmwarexeon_e3-1285_v6_firmwarecore_i7-10510u_firmwarecore_i7-6822eqxeon_e-2276m_firmwarexeon_e-2134core_i7-6700tecore_i7-6567u_firmwarecore_i7-9700texeon_e3-1501l_v6xeon_e-2226g_firmwarecore_i7-7600uxeon_e3-1285_v6xeon_e-2224xeon_e-2186m_firmwarecore_i7-9700f_firmwarexeon_e3-1225_v6core_i7-8569u_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarecore_i7-10510yxeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_e-2134_firmwarecore_i7-7600u_firmwarecore_i7-7700hqxeon_e3-1240_v5_firmwarecore_i7-10710u_firmwarecore_i7-7820hkxeon_e3-1245_v5core_i7-6870hqxeon_e3-1558l_v5_firmwarecore_i7-6970hqcore_i7-9700fxeon_e3-1505l_v6_firmwarexeon_e-2136xeon_e-2246gcore_i7-9700kcore_i7-10510ucore_i7-8500y_firmwarexeon_e3-1270_v5_firmwarecore_i7-8700b_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5core_i7-7700xeon_e3-1535m_v5_firmwarecore_i7-6820hq_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqcore_i7-7920hq_firmwarexeon_e3-1575m_v5_firmwarexeon_e3-1268l_v5core_i9-9900ks_firmwarexeon_e-2254mlcore_i7-8700k_firmwarexeon_e3-1545m_v5xeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1501m_v6_firmwarexeon_e3-1240_v6_firmwarecore_i7-8750hxeon_e3-1501m_v6xeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_e-2254ml_firmwarexeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_e3-1260l_v5xeon_e3-1270_v6xeon_e-2286mcore_i7-9850he_firmwarecore_i7-8557u_firmwarexeon_e3-1505m_v5core_i7-7820eq_firmwarexeon_e-2276gxeon_e-2186gxeon_e-2276mlxeon_e-2244gxeon_e-2174gcore_i9-9900kxeon_e-2176gcore_i7-8809gcore_i7-8709gcore_i7-8700bxeon_e3-1230_v6_firmwarecore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-7500u_firmwarexeon_e3-1275_v6_firmwarexeon_e3-1585_v5xeon_e3-1225_v6_firmwarecore_i7-6700k_firmwarecore_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-6560uxeon_e-2278ge_firmwarecore_i7-6820hk_firmwarecore_i7-8700txeon_e3-1280_v5_firmwarecore_i7-6820hqxeon_e3-1220_v6_firmwarecore_i7-9850hecore_i7-8650uxeon_e3-1535m_v6_firmwarexeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i9-9900kscore_i7-9750h_firmwarexeon_e3-1230_v6xeon_e3-1585l_v5_firmwarecore_i7-6700_firmwarexeon_e3-1240l_v5_firmwarexeon_e-2234_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwarexeon_e-2224_firmwarecore_i7-9750hfxeon_e-2186g_firmwarexeon_e-2274gxeon_e-2124gxeon_e-2278gelxeon_e3-1280_v6xeon_e-2288gcore_i7-6700t_firmwarexeon_e-2234xeon_e3-1245_v5_firmwarecore_i7-8709g_firmwarecore_i7-6500ucore_i7-6500u_firmwarecore_i7-9850hcore_i7-6700kcore_i7-9700t_firmwarexeon_e3-1280_v6_firmwarexeon_e-2124core_i9-9880hcore_i7-6820eq_firmwarecore_i7-10710uxeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarexeon_e-2276mecore_i7-8565uxeon_e-2274g_firmwarexeon_e-2126gcore_i7-7560ucore_i7-8706g_firmwarecore_i7-6920hq_firmwarecore_i7-9700tcore_i7-7820eqxeon_e3-1535m_v6core_i7-9850hlcore_i9-9900core_i7-10510y_firmwarexeon_e3-1220_v5core_i7-9850hl_firmwarecore_i7-8650u_firmwarexeon_e-2146g_firmwarexeon_e3-1220_v6core_i7-6785r_firmwarecore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-6700hq_firmwarecore_i7-6700hqcore_i7-7700k_firmwarecore_i7-9700kf_firmwarecore_i7-9850h_firmwarexeon_e-2186mcore_i7-7567u_firmwarecore_i7-9700exeon_e-2176mcore_i7-6970hq_firmwarecore_i7-6785rcore_i7-7700hq_firmwarecore_i7-6820hkcore_i7-6660u_firmwarexeon_e3-1230_v5_firmwarecore_i7-9750hf_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2278g_firmwarexeon_e-2276ml_firmwarexeon_e-2224gxeon_e-2286gxeon_e3-1268l_v5_firmwarecore_i7-6700te_firmwarexeon_e3-1275_v6xeon_e-2226gexeon_e-2244g_firmwarecore_i7-6650uxeon_e3-1575m_v5xeon_e-2278gxeon_e3-1505l_v5xeon_e3-1245_v6core_i7-8559u_firmwarecore_i7-8850hcore_i7-8086k_firmwarecore_i7-8665u_firmwarexeon_e-2176g_firmwarexeon_e3-1585_v5_firmwarecore_i7-6560u_firmwarecore_i7-6820eqcore_i7-8500ycore_i7-7567ucore_i9-9900tcore_i9-9900_firmwarexeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarecore_i7-9700e_firmwarexeon_e3-1235l_v5core_i7\+8700core_i7-7660u_firmwarecore_i7-7820hqxeon_e3-1585l_v5core_i7-8750h_firmwarexeon_e3-1275_v5core_i7-8665uecore_i7-9700k_firmwarecore_i7-8809g_firmwarexeon_e3-1240_v5xeon_e-2288g_firmwarecore_i7-7700t_firmwarecore_i9-9980hk_firmwarexeon_e-2246g_firmwarecore_i7-6567uxeon_e-2176m_firmwarexeon_e-2174g_firmwarexeon_e3-1515m_v5xeon_e3-1505l_v5_firmwarexeon_e3-1225_v5core_i7-6870hq_firmwarexeon_e-2278gel_firmwarexeon_e-2144gxeon_e3-1245_v6_firmwarexeon_e3-1515m_v5_firmwarecore_i7-8569ucore_i7-9700te_firmwarecore_i7-7700_firmwarecore_i7-6770hq_firmwarexeon_e-2254mecore_i7-9750hcore_i7-7y75core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1505m_v6core_i9-9980hkcore_i7-8559ucore_i9-9900t_firmwarecore_i7-9700_firmwarexeon_e-2146gxeon_e-2224g_firmwarexeon_e3-1578l_v5_firmware2019.2 IPU – Intel(R) SGX and TXT
CVE-2019-0098
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.17% / 38.26%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic bug vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) TXE before 3.1.65, 4.0.15 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) Converged Security & Management Engine (CSME), Intel (R) Trusted Execution Engine Interface (TXE)
CVE-2019-0105
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.91%
||
7 Day CHG~0.00%
Published-18 Feb, 2019 | 17:00
Updated-16 Sep, 2024 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managern/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-0142
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.12% / 30.97%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:21
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in ilp60x64.sys driver for Intel(R) Ethernet 700 Series Controllers before version 1.33.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1ethernet_controller_xxv710-am1_firmwareethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CVE-2019-0151
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.62%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:07
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2687w_v2_firmwarexeon_platinum_8153xeon_e3-1230_v5xeon_e5-1620_v2_firmwarexeon_e7-8893_v3xeon_e5-1630_v3_firmwarexeon_e3-1558l_v5xeon_bronze_3104_firmwarexeon_e5-4610_v4xeon_e7-8894_v4xeon_e5-2608l_v4_firmwarexeon_e3-1226_v3_firmwarexeon_gold_6146xeon_e5-2660_v3xeon_gold_6126f_firmwarexeon_e3-1240_v3_firmwarexeon_e5-2450_v2xeon_e7-8880l_v2xeon_platinum_8168_firmwarexeon_e3-1501l_v6_firmwarexeon_silver_4108_firmwarexeon_e5-2670_v2xeon_e5-1680_v3xeon_e-2124g_firmwarexeon_e5-2697_v4xeon_d-1527xeon_e5-2608l_v3_firmwarexeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_e-2254me_firmwarexeon_w-2125core_i5-8400hcore_m-5y71_firmwarexeon_e5-2690_v2xeon_e3-1220_v2_firmwarexeon_e5-2648l_v2xeon_e5-4610_v3xeon_e7-8890_v3_firmwarexeon_e3-1220_v5_firmwarexeon_e7-8870_v3xeon_e-2276me_firmwarexeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-2448l_v2_firmwarexeon_e5-2620_v2_firmwarexeon_e3-1275l_v3_firmwarexeon_d-2163it_firmwarexeon_e5-1660_v4xeon_e5-2699r_v4_firmwarexeon_e7-8891_v4xeon_platinum_8164core_i7-9700xeon_d-1521_firmwarexeon_e5-1620_v2core_i7-6650u_firmwarexeon_e3-1280_v5xeon_e-2226gxeon_e3-1226_v3xeon_e5-2699r_v4xeon_e3-1265l_v2xeon_e5-2658a_v3_firmwarexeon_silver_4116t_firmwarexeon_d-1557_firmwarexeon_e7-4820_v2_firmwarexeon_e5-1680_v3_firmwarexeon_d-1518xeon_e3-1285l_v4_firmwarexeon_e5-1620_v3_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i7-6700texeon_e7-4830_v2xeon_e7-4830_v3_firmwarexeon_e3-1501l_v6xeon_e5-2609_v4_firmwarexeon_platinum_8168xeon_e5-2683_v4core_i7-7600uxeon_e5-1660_v3_firmwarexeon_e5-2640_v3xeon_e5-2608l_v4xeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarexeon_e5-2418l_v3_firmwarexeon_e3-1280_v3_firmwarexeon_e5-1620_v4xeon_e7-8880l_v3xeon_d-1567_firmwarexeon_e3-1230_v2_firmwarexeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_gold_6138t_firmwarexeon_e-2134_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_5122xeon_platinum_8180_firmwarexeon_e5-2699_v3core_i7-7600u_firmwarexeon_gold_6126_firmwarexeon_e5-4624l_v2_firmwarexeon_e3-1240_v5_firmwarexeon_e5-4640_v2xeon_e3-1285_v3_firmwarexeon_e5-2618l_v2_firmwarexeon_e5-4657l_v2core_i5-9500_firmwarexeon_e7-8870_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e3-1558l_v5_firmwarexeon_e7-8870_v4xeon_e5-2609_v2_firmwarecore_i5-8400h_firmwarexeon_gold_6150_firmwarexeon_e3-1265l_v4xeon_platinum_8156core_i5-8600xeon_e5-2450l_v2_firmwarexeon_e-2136core_i7-9700kxeon_bronze_3106_firmwarexeon_e7-8893_v4_firmwarexeon_gold_6138_firmwarexeon_d-2177nt_firmwarexeon_d-1533n_firmwarexeon_e7-4860_v2_firmwarexeon_e5-2667_v4_firmwarexeon_e7-8893_v2xeon_e5-2667_v4core_m7-6y75xeon_e3-1285l_v4xeon_gold_6126fxeon_e5-2628l_v2xeon_e7-8870_v2xeon_d-1539xeon_silver_4109t_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5xeon_e5-1680_v4xeon_silver_4114_firmwarexeon_e7-4809_v3xeon_d-2146ntxeon_e3-1575m_v5_firmwarexeon_e5-2609_v2xeon_e3-1268l_v5core_i5-8600kxeon_platinum_8160fxeon_e7-4820_v3_firmwarexeon_d-1577_firmwarecore_i7-8700k_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1290_v2_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240_v6_firmwarexeon_e5-2658_v3xeon_e5-4660_v4xeon_e3-1501m_v6core_i5-8365uxeon_e3-1105c_v2_firmwarexeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_d-2187ntxeon_e5-2643_v3_firmwarexeon_e5-4669_v4_firmwarexeon_platinum_8158_firmwarexeon_e5-2680_v2xeon_e5-2698_v3_firmwarexeon_e3-1270_v6xeon_gold_5120_firmwarexeon_e-2286mxeon_d-2166ntxeon_e3-1505m_v5xeon_e3-1280_v2_firmwarexeon_silver_4114t_firmwarexeon_w-2195xeon_e5-2403_v2_firmwarexeon_e5-2630l_v4xeon_gold_6134_firmwarexeon_e5-4667_v4core_i7-5650uxeon_e5-2628l_v4xeon_gold_6130t_firmwarexeon_e-2276gxeon_e5-2658_v2xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e5-2690_v4_firmwarexeon_e-2174gxeon_e5-2630_v4xeon_e5-2687w_v2xeon_e5-4610_v3_firmwarexeon_e5-4667_v3xeon_e5-2609_v3_firmwarexeon_e7-4809_v2_firmwarecore_m-5y70xeon_e3-1280_v2xeon_w-2145_firmwarexeon_e3-1230_v6_firmwarexeon_e5-2643_v3xeon_e3-1220_v2xeon_e5-1650_v4xeon_d-2145ntxeon_e5-2630_v3xeon_gold_6126t_firmwarexeon_e5-4627_v2_firmwarexeon_e3-1275_v6_firmwarecore_i5-5300uxeon_e3-1585_v5xeon_e3-1225_v6_firmwarexeon_e5-2667_v2_firmwarexeon_e5-2623_v4xeon_e5-4620_v4_firmwarexeon_w-2123xeon_e7-8890_v4_firmwarecore_i5-8600t_firmwarexeon_gold_5119t_firmwarexeon_e3-1220_v6_firmwarexeon_d-1513n_firmwarexeon_e5-2683_v3xeon_e5-2637_v2_firmwarexeon_gold_6142_firmwarexeon_e3-1535m_v6_firmwarexeon_e3-1265l_v4_firmwarecore_i7-5600uxeon_e5-2428l_v3_firmwarexeon_e5-1620_v4_firmwarexeon_gold_6130txeon_silver_4108xeon_e3-1280_v3core_i5-9600xeon_e3-1285_v3xeon_e5-2618l_v4_firmwarexeon_e5-2650_v3_firmwarexeon_e5-2637_v4_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1240l_v5_firmwarexeon_e5-2428l_v2xeon_e7-8867_v4xeon_e3-1225_v2_firmwarexeon_e5-2660_v3_firmwarecore_i5-7300u_firmwarecore_i5-8600_firmwarexeon_e3-1281_v3xeon_bronze_3106xeon_e-2224_firmwarexeon_e3-1240l_v3xeon_e-2274gxeon_e7-8880_v3core_i5-9500xeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1280_v6xeon_e3-1225_v3xeon_e7-8891_v3_firmwarecore_i7-6700t_firmwarexeon_e5-1650_v2xeon_e3-1245_v5_firmwarexeon_e5-2650l_v3_firmwarexeon_e5-2698_v4xeon_e7-4890_v2_firmwarexeon_platinum_8160txeon_d-1528xeon_e5-2697_v3xeon_e5-4603_v2xeon_e5-4627_v4xeon_e5-4620_v2_firmwarexeon_e3-1280_v6_firmwarexeon_e-2124core_i9-9880hxeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_d-2141icore_i5-8500t_firmwarexeon_e3-1275_v3xeon_e7-4809_v2xeon_e7-4830_v4xeon_d-1541xeon_e5-2650_v4_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarecore_i5-6300uxeon_e5-1660_v2xeon_e5-2690_v2_firmwarexeon_e-2276mexeon_e5-4620_v3_firmwarexeon_e5-2687w_v4xeon_e5-2630_v4_firmwarexeon_e-2274g_firmwarexeon_e5-4607_v2xeon_e3-1271_v3xeon_e5-2695_v2_firmwarexeon_w-2133_firmwarexeon_e5-4667_v3_firmwarexeon_e3-1220l_v3_firmwarexeon_e3-1275_v2_firmwarexeon_e3-1535m_v6xeon_e5-4667_v4_firmwarexeon_e3-1278l_v4_firmwarexeon_e5-2699a_v4_firmwarexeon_d-1548xeon_e3-1265l_v3xeon_d-1529core_i9-9900xeon_e5-2603_v4_firmwarexeon_e3-1220_v5xeon_platinum_8160xeon_gold_5115_firmwarexeon_platinum_8156_firmwarexeon_e5-4660_v4_firmwarexeon_e-2146g_firmwarexeon_e5-2403_v2xeon_e5-2428l_v3core_i7-8850h_firmwarecore_m7-6y75_firmwarexeon_gold_5118_firmwarexeon_e5-2667_v3_firmwarexeon_e5-4648_v3xeon_e7-4809_v4core_i7-9850h_firmwarexeon_gold_6146_firmwarexeon_gold_6148fxeon_e5-2630l_v4_firmwarexeon_e5-2640_v2xeon_e5-2407_v2_firmwarexeon_gold_6132xeon_e5-2618l_v3_firmwarecore_i7-6660u_firmwarexeon_e5-2618l_v4xeon_e7-8891_v4_firmwarexeon_e3-1258l_v4xeon_w-2155xeon_e-2278g_firmwarexeon_e-2276ml_firmwarexeon_e5-2623_v3_firmwarexeon_e5-2650l_v4_firmwarexeon_e-2224gxeon_w-2135xeon_platinum_8160_firmwarexeon_w-2145xeon_e7-8894_v4_firmwarexeon_e3-1231_v3_firmwarexeon_e5-2648l_v2_firmwarexeon_e-2226gecore_i7-6650uxeon_gold_6142xeon_e5-4650_v3_firmwarecore_m-5y71xeon_gold_6148_firmwarexeon_e5-4610_v4_firmwarecore_i7-8665u_firmwarexeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i5-9400hxeon_e5-2620_v2xeon_e5-4640_v3_firmwarecore_i9-9900txeon_e5-2680_v4_firmwarexeon_e5-1428l_v2_firmwarexeon_e3-1286l_v3_firmwarexeon_e5-1630_v4_firmwarexeon_e3-1286_v3xeon_e7-8890_v2xeon_e3-1230_v3xeon_d-2161ixeon_e5-4603_v2_firmwarexeon_e3-1225_v3_firmwarexeon_e5-2640_v2_firmwarexeon_platinum_8164_firmwarexeon_d-2141i_firmwarexeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_e7-2880_v2_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2648l_v3xeon_e5-1680_v4_firmwarexeon_e3-1271_v3_firmwarexeon_e5-2609_v3xeon_e3-1275_v5core_i7-9700k_firmwarexeon_e3-1270_v2_firmwarexeon_e5-2438l_v3xeon_e3-1240_v5xeon_e-2288g_firmwarexeon_e5-2430_v2_firmwarexeon_e5-2450_v2_firmwarexeon_e5-2440_v2_firmwarexeon_e3-1230l_v3xeon_e3-1286_v3_firmwarexeon_e5-2660_v2_firmwarexeon_e5-2650_v3xeon_e-2246g_firmwarexeon_e5-2648l_v4xeon_e5-1650_v4_firmwarexeon_e-2176m_firmwarexeon_e-2174g_firmwarexeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_e5-2683_v3_firmwarexeon_e3-1515m_v5xeon_d-2187nt_firmwarexeon_e3-1225_v5xeon_e7-8880_v4_firmwarexeon_e5-2630l_v2core_i5-8500xeon_d-1539_firmwarexeon_silver_4112xeon_d-1559xeon_gold_6130_firmwarexeon_e5-2667_v2xeon_e3-1515m_v5_firmwarexeon_e5-2618l_v2xeon_e7-4890_v2xeon_gold_5120txeon_e5-2630_v3_firmwarexeon_e7-4830_v2_firmwarexeon_w-3175xxeon_e3-1230l_v3_firmwarexeon_gold_6134xeon_e5-2628l_v3xeon_e-2254mexeon_platinum_8160f_firmwarexeon_e5-2448l_v2core_i5-6440hqxeon_e3-1258l_v4_firmwarecore_i7-7y75xeon_e5-2648l_v4_firmwarexeon_e5-4669_v3xeon_e7-8893_v2_firmwarexeon_e5-1660_v2_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1220_v3xeon_d-2183it_firmwarexeon_w-2133core_i5-7y57xeon_e5-4627_v3xeon_e7-2890_v2_firmwarexeon_e7-4850_v4xeon_gold_6148xeon_d-1557xeon_e3-1505m_v6xeon_gold_6144core_i5-9600k_firmwarecore_i9-9900t_firmwarexeon_e7-2870_v2_firmwarexeon_e7-4880_v2_firmwarexeon_e-2224g_firmwarexeon_e5-2670_v2_firmwarexeon_e7-8860_v3_firmwarexeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_e3-1578l_v5_firmwarexeon_e5-2687w_v3_firmwarexeon_e5-4627_v2xeon_platinum_8170_firmwarexeon_e-2276mxeon_e7-4860_v2core_i7-8665uxeon_e5-4620_v2xeon_e5-2470_v2_firmwarecore_i7-6600uxeon_e3-1220l_v2xeon_gold_6126txeon_gold_6140_firmwarexeon_e3-1565l_v5_firmwarexeon_e5-2630_v2_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarexeon_e5-4610_v2_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e5-2408l_v3xeon_e5-2643_v2_firmwarexeon_e-2126g_firmwarexeon_e3-1240_v6core_i7-8700xeon_w-2155_firmwarexeon_e7-4850_v3_firmwarexeon_e3-1285l_v3_firmwarexeon_e5-2640_v4_firmwarexeon_e5-1630_v4xeon_e5-4660_v3xeon_e7-2850_v2_firmwarexeon_e5-1428l_v2xeon_e5-2603_v2core_i7-6600u_firmwarexeon_e5-2603_v3_firmwarexeon_d-1527_firmwarexeon_e5-2697_v3_firmwarecore_i7-8700kxeon_e5-2407_v2xeon_e5-2683_v4_firmwarexeon_e3-1268l_v3xeon_e5-4628l_v4_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-2603_v3xeon_e7-4850_v4_firmwarexeon_e3-1270_v6_firmwarexeon_e5-2658_v3_firmwarecore_i5-8600k_firmwarexeon_e7-8870_v3_firmwarexeon_e3-1285_v6_firmwarexeon_e-2134xeon_e5-2667_v3xeon_e5-4655_v3xeon_e5-2650_v2xeon_e7-4820_v3xeon_e5-2620_v4_firmwarexeon_d-2143itxeon_e-2226g_firmwarexeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_d-2161i_firmwarexeon_e3-1278l_v4xeon_e3-1225_v6xeon_e3-1220l_v3xeon_e5-2699_v3_firmwarexeon_e-2144g_firmwarexeon_silver_4109txeon_e5-2650l_v2_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5122_firmwarexeon_e5-2658_v4xeon_gold_6138fxeon_e5-2440_v2xeon_e5-1630_v3xeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_e5-4650_v2_firmwarecore_i5-9600kxeon_e7-8893_v3_firmwarexeon_e3-1290_v2xeon_e3-1286l_v3xeon_e5-2418l_v2_firmwarexeon_e5-2680_v3xeon_e3-1125c_v2xeon_d-1531_firmwarexeon_e5-2697_v4_firmwarexeon_e7-4830_v3xeon_e5-2420_v2_firmwarexeon_silver_4114xeon_e5-4655_v3_firmwarexeon_d-2123it_firmwarexeon_e3-1245_v3xeon_e5-2698_v3xeon_e3-1245_v5xeon_e7-8880_v3_firmwarexeon_e3-1230_v2xeon_e5-2648l_v3_firmwarexeon_e7-8857_v2_firmwarexeon_bronze_3104xeon_d-1571xeon_e3-1265l_v2_firmwarexeon_e5-2699_v4_firmwarexeon_e5-2637_v3xeon_e7-8890_v2_firmwarexeon_e5-1620_v3core_i5-8350uxeon_e7-8880l_v3_firmwarecore_i5-7300ucore_i5-6440hq_firmwarexeon_e3-1505l_v6_firmwarexeon_e3-1240_v2xeon_e7-8850_v2_firmwarexeon_d-2173itxeon_d-2123itcore_i7-5600u_firmwarecore_i5-8500txeon_e-2246gxeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_e3-1241_v3xeon_gold_6144_firmwarexeon_e5-2687w_v3xeon_e5-2695_v4_firmwarexeon_e5-1428l_v3_firmwarexeon_e3-1270_v5_firmwarexeon_e7-8890_v4xeon_e5-2680_v4core_i5-8350u_firmwarexeon_e5-4607_v2_firmwarexeon_e5-2630l_v3_firmwarexeon_e5-2697a_v4xeon_gold_6150xeon_e3-1535m_v5_firmwarexeon_e7-4809_v3_firmwarexeon_gold_6140xeon_e5-2690_v4core_i7-6820hq_firmwarexeon_e5-2609_v4xeon_e7-8891_v2xeon_e3-1220_v3_firmwarexeon_e5-2658_v4_firmwarexeon_e7-4850_v2xeon_e-2254mlxeon_e5-2660_v2xeon_e3-1545m_v5xeon_e5-1650_v2_firmwarexeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_e3-1501m_v6_firmwarexeon_e-2254ml_firmwarexeon_e7-4870_v2xeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_d-1537_firmwarexeon_gold_6126xeon_d-1541_firmwarexeon_e3-1245_v3_firmwarexeon_d-2166nt_firmwarexeon_e3-1260l_v5xeon_e3-1246_v3core_i5-6500_firmwarexeon_e5-2699a_v4xeon_e5-2643_v4xeon_d-1548_firmwarexeon_e-2276mlxeon_gold_6130f_firmwarexeon_e5-2690_v3_firmwarexeon_e7-2870_v2xeon_e7-8860_v3xeon_e-2244gcore_i9-9900kxeon_d-1559_firmwarexeon_e-2176gxeon_e3-1125c_v2_firmwarexeon_e3-1275l_v3xeon_e5-4648_v3_firmwarexeon_e5-2698_v4_firmwarexeon_gold_6142fxeon_e5-2637_v2xeon_e7-4809_v4_firmwarecore_i7-7y75_firmwarexeon_e7-4870_v2_firmwarexeon_platinum_8153_firmwarexeon_e5-2697a_v4_firmwarexeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_d-1529_firmwarexeon_d-1540_firmwarexeon_e5-1650_v3_firmwarexeon_e7-8850_v2xeon_e5-2695_v2xeon_platinum_8160t_firmwarexeon_e5-4640_v2_firmwarecore_i7-5650u_firmwarexeon_e3-1245_v2xeon_d-2142it_firmwarexeon_e-2278ge_firmwarecore_i5-9500txeon_e5-2470_v2core_i7-8700txeon_d-2143it_firmwarexeon_e3-1280_v5_firmwarexeon_e5-2420_v2core_i7-6820hqxeon_e3-1270_v3_firmwarexeon_e7-4850_v3xeon_silver_4110core_i7-8650uxeon_d-1523n_firmwarexeon_e5-2697_v2xeon_e5-2430_v2xeon_e5-4627_v3_firmwarexeon_gold_5119txeon_e-2286m_firmwarecore_i7-6700txeon_e7-8880l_v2_firmwarecore_i7-6920hqxeon_e5-4669_v3_firmwarexeon_e5-2408l_v3_firmwarexeon_e7-8870_v2_firmwarexeon_e3-1230_v6xeon_e5-2687w_v4_firmwarexeon_e7-8867_v3_firmwarecore_i7-6700_firmwarexeon_e-2234_firmwarexeon_e5-2430l_v2xeon_e5-2628l_v2_firmwarexeon_e3-1245_v2_firmwarexeon_e7-2850_v2xeon_e5-2620_v4xeon_e7-4820_v4_firmwarexeon_gold_6138txeon_e-2186g_firmwarexeon_e3-1276_v3xeon_gold_5120xeon_e-2124gxeon_e5-2618l_v3xeon_e3-1230_v3_firmwarexeon_e3-1270_v3xeon_d-1523nxeon_e5-2608l_v3xeon_e3-1231_v3xeon_e5-4660_v3_firmwarexeon_e-2288gxeon_e7-8880_v2xeon_e7-8891_v2_firmwarexeon_gold_6154_firmwarexeon_e-2234xeon_e7-8860_v4_firmwarexeon_e5-4650_v2xeon_d-1577xeon_silver_4114tcore_i7-9850hcore_i7-9700t_firmwarexeon_e5-4669_v4xeon_platinum_8176_firmwarexeon_gold_6154xeon_d-1543n_firmwarexeon_e5-2640_v4xeon_w-2195_firmwarexeon_e7-8893_v4xeon_gold_5120t_firmwarexeon_e3-1240_v2_firmwarexeon_e5-1650_v3xeon_e5-2630_v2xeon_e3-1276_v3_firmwarexeon_e3-1105c_v2xeon_e7-8891_v3xeon_e5-2640_v3_firmwarecore_m5-6y57xeon_d-1553nxeon_e-2126gxeon_d-1571_firmwarecore_i7-6920hq_firmwarexeon_e5-4620_v3core_i7-9700txeon_silver_4116xeon_e7-4820_v4xeon_e3-1268l_v3_firmwarexeon_e3-1240_v3xeon_e3-1220l_v2_firmwarexeon_e5-2650_v2_firmwarexeon_e5-2695_v3core_i5-6500core_i7-8650u_firmwarexeon_e5-2658_v2_firmwarexeon_d-1518_firmwarexeon_e3-1220_v6core_i9-9900k_firmwarecore_m-5y70_firmwarexeon_w-2135_firmwarexeon_e3-1246_v3_firmwarexeon_e3-1225_v2xeon_e-2186mxeon_e5-2438l_v3_firmwarexeon_gold_6152_firmwarexeon_e5-2603_v2_firmwarexeon_e5-1660_v3xeon_platinum_8176f_firmwarexeon_d-1520xeon_e-2176mxeon_e3-1285_v4xeon_e5-4657l_v2_firmwarexeon_e3-1265l_v3_firmwarexeon_d-2146nt_firmwarexeon_gold_6152xeon_e3-1230_v5_firmwarexeon_e5-2623_v3xeon_e7-4830_v4_firmwarexeon_platinum_8158xeon_e3-1275_v3_firmwarexeon_e5-2418l_v3xeon_e5-2658a_v3xeon_e7-8857_v2xeon_e-2286gxeon_e5-2680_v2_firmwarexeon_e7-2890_v2xeon_w-2125_firmwarexeon_d-1520_firmwarexeon_e3-1268l_v5_firmwarecore_i5-8365u_firmwarexeon_platinum_8176xeon_w-2175_firmwarecore_i7-6700te_firmwarexeon_silver_4112_firmwarexeon_e3-1241_v3_firmwarexeon_e3-1275_v6xeon_e5-4610_v2xeon_e7-4820_v2xeon_d-1531xeon_e-2244g_firmwarexeon_e3-1575m_v5core_i5-6360u_firmwarexeon_e5-2660_v4_firmwarexeon_e-2278gxeon_e5-2650_v4xeon_e3-1505l_v5xeon_d-1533nxeon_e7-8867_v3xeon_e7-8880_v2_firmwarexeon_e5-2450l_v2xeon_e3-1245_v6xeon_gold_6128xeon_w-3175x_firmwarexeon_d-2142itcore_i7-8850hxeon_gold_5118xeon_e5-2695_v4xeon_gold_6130fcore_i5-5350uxeon_e3-1281_v3_firmwarexeon_e5-4624l_v2core_i9-9900_firmwarexeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarexeon_gold_6142f_firmwarexeon_e3-1235l_v5xeon_e5-2603_v4xeon_e5-2643_v2xeon_e5-2695_v3_firmwarexeon_e5-1660_v4_firmwarexeon_e5-4628l_v4xeon_e5-2630l_v2_firmwarexeon_e5-2418l_v2xeon_e7-8860_v4core_i5-8500_firmwarexeon_e3-1285l_v3xeon_e5-2650l_v2xeon_e5-2680_v3_firmwarexeon_gold_6138pcore_i5-5300u_firmwarexeon_e5-2430l_v2_firmwarexeon_gold_6138p_firmwarecore_i5-6300u_firmwarexeon_platinum_8176fxeon_e7-4880_v2xeon_e7-8867_v4_firmwarexeon_e3-1240l_v3_firmwarexeon_e7-4850_v2_firmwarecore_i5-9400h_firmwarexeon_e7-8890_v3xeon_e3-1275_v2xeon_e5-2623_v4_firmwarexeon_e3-1285_v4_firmwarexeon_e3-1505l_v5_firmwarexeon_e5-2697_v2_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_e-2278gel_firmwarecore_i5-5350u_firmwarecore_i5-6360uxeon_e3-1245_v6_firmwarexeon_d-1521xeon_e-2144gcore_i5-9500t_firmwarecore_m5-6y57_firmwarexeon_e5-2637_v3_firmwarexeon_e5-2428l_v2_firmwarexeon_e5-4640_v3xeon_e5-4650_v4_firmwarecore_i5-9600txeon_silver_4110_firmwarecore_i5-8600txeon_e5-1428l_v3core_i7-9700_firmwarexeon_platinum_8180xeon_d-2177ntxeon_e-2146gxeon_e5-2628l_v3_firmwarexeon_e5-2650l_v3xeon_w-2175xeon_e7-2880_v22019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0123
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.14%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:07
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1230_v5core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_e3-1558l_v5core_i7-7660ucore_i7-6600ucore_i7-8706gxeon_e3-1565l_v5_firmwarexeon_e3-1565l_v5xeon_e3-1501l_v6_firmwarexeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e-2124g_firmwarecore_i7-9700kfxeon_e-2126g_firmwarexeon_e3-1240_v6xeon_e-2254me_firmwarecore_i7-8700core_i7-8665ue_firmwarexeon_e-2276me_firmwarexeon_e3-1220_v5_firmwarecore_i7-8705g_firmwarecore_i7-7700tcore_i7-8086kcore_i7-6600u_firmwarecore_i7-9700core_i7-6770hqcore_i7-8700kcore_i7-6650u_firmwarexeon_e3-1280_v5core_i9-9900kfxeon_e-2226gxeon_e3-1270_v6_firmwarexeon_e3-1285_v6_firmwarecore_i7-10510u_firmwarecore_i7-6822eqxeon_e-2276m_firmwarexeon_e-2134core_i7-6700tecore_i7-6567u_firmwarecore_i7-9700texeon_e3-1501l_v6xeon_e-2226g_firmwarecore_i7-7600uxeon_e3-1285_v6xeon_e-2224xeon_e-2186m_firmwarecore_i7-9700f_firmwarexeon_e3-1225_v6core_i7-8569u_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarecore_i7-10510yxeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_e-2134_firmwarecore_i7-7600u_firmwarecore_i7-7700hqxeon_e3-1240_v5_firmwarecore_i7-10710u_firmwarecore_i7-7820hkxeon_e3-1245_v5core_i7-6870hqxeon_e3-1558l_v5_firmwarecore_i7-6970hqcore_i7-9700fxeon_e3-1505l_v6_firmwarexeon_e-2136xeon_e-2246gcore_i7-9700kcore_i7-10510ucore_i7-8500y_firmwarexeon_e3-1270_v5_firmwarecore_i7-8700b_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5core_i7-7700xeon_e3-1535m_v5_firmwarecore_i7-6820hq_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqcore_i7-7920hq_firmwarexeon_e3-1575m_v5_firmwarexeon_e3-1268l_v5core_i9-9900ks_firmwarexeon_e-2254mlcore_i7-8700k_firmwarexeon_e3-1545m_v5xeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1501m_v6_firmwarexeon_e3-1240_v6_firmwarecore_i7-8750hxeon_e3-1501m_v6xeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_e-2254ml_firmwarexeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_e3-1260l_v5xeon_e3-1270_v6xeon_e-2286mcore_i7-9850he_firmwarecore_i7-8557u_firmwarexeon_e3-1505m_v5core_i7-7820eq_firmwarexeon_e-2276gxeon_e-2186gxeon_e-2276mlxeon_e-2244gxeon_e-2174gcore_i9-9900kxeon_e-2176gcore_i7-8809gcore_i7-8709gcore_i7-8700bxeon_e3-1230_v6_firmwarecore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-7500u_firmwarexeon_e3-1275_v6_firmwarexeon_e3-1585_v5xeon_e3-1225_v6_firmwarecore_i7-6700k_firmwarecore_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-6560uxeon_e-2278ge_firmwarecore_i7-6820hk_firmwarecore_i7-8700txeon_e3-1280_v5_firmwarecore_i7-6820hqxeon_e3-1220_v6_firmwarecore_i7-9850hecore_i7-8650uxeon_e3-1535m_v6_firmwarexeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i9-9900kscore_i7-9750h_firmwarexeon_e3-1230_v6xeon_e3-1585l_v5_firmwarecore_i7-6700_firmwarexeon_e3-1240l_v5_firmwarexeon_e-2234_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwarexeon_e-2224_firmwarecore_i7-9750hfxeon_e-2186g_firmwarexeon_e-2274gxeon_e-2124gxeon_e-2278gelxeon_e3-1280_v6xeon_e-2288gcore_i7-6700t_firmwarexeon_e-2234xeon_e3-1245_v5_firmwarecore_i7-8709g_firmwarecore_i7-6500ucore_i7-6500u_firmwarecore_i7-9850hcore_i7-6700kcore_i7-9700t_firmwarexeon_e3-1280_v6_firmwarexeon_e-2124core_i9-9880hcore_i7-6820eq_firmwarecore_i7-10710uxeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarexeon_e-2276mecore_i7-8565uxeon_e-2274g_firmwarexeon_e-2126gcore_i7-7560ucore_i7-8706g_firmwarecore_i7-6920hq_firmwarecore_i7-9700tcore_i7-7820eqxeon_e3-1535m_v6core_i7-9850hlcore_i9-9900core_i7-10510y_firmwarexeon_e3-1220_v5core_i7-9850hl_firmwarecore_i7-8650u_firmwarexeon_e-2146g_firmwarexeon_e3-1220_v6core_i7-6785r_firmwarecore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-6700hq_firmwarecore_i7-6700hqcore_i7-7700k_firmwarecore_i7-9700kf_firmwarecore_i7-9850h_firmwarexeon_e-2186mcore_i7-7567u_firmwarecore_i7-9700exeon_e-2176mcore_i7-6970hq_firmwarecore_i7-6785rcore_i7-7700hq_firmwarecore_i7-6820hkcore_i7-6660u_firmwarexeon_e3-1230_v5_firmwarecore_i7-9750hf_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2278g_firmwarexeon_e-2276ml_firmwarexeon_e-2224gxeon_e-2286gxeon_e3-1268l_v5_firmwarecore_i7-6700te_firmwarexeon_e3-1275_v6xeon_e-2226gexeon_e-2244g_firmwarecore_i7-6650uxeon_e3-1575m_v5xeon_e-2278gxeon_e3-1505l_v5xeon_e3-1245_v6core_i7-8559u_firmwarecore_i7-8850hcore_i7-8086k_firmwarecore_i7-8665u_firmwarexeon_e-2176g_firmwarexeon_e3-1585_v5_firmwarecore_i7-6560u_firmwarecore_i7-6820eqcore_i7-8500ycore_i7-7567ucore_i9-9900tcore_i9-9900_firmwarexeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarecore_i7-9700e_firmwarexeon_e3-1235l_v5core_i7\+8700core_i7-7660u_firmwarecore_i7-7820hqxeon_e3-1585l_v5core_i7-8750h_firmwarexeon_e3-1275_v5core_i7-8665uecore_i7-9700k_firmwarecore_i7-8809g_firmwarexeon_e3-1240_v5xeon_e-2288g_firmwarecore_i7-7700t_firmwarecore_i9-9980hk_firmwarexeon_e-2246g_firmwarecore_i7-6567uxeon_e-2176m_firmwarexeon_e-2174g_firmwarexeon_e3-1515m_v5xeon_e3-1505l_v5_firmwarexeon_e3-1225_v5core_i7-6870hq_firmwarexeon_e-2278gel_firmwarexeon_e-2144gxeon_e3-1245_v6_firmwarexeon_e3-1515m_v5_firmwarecore_i7-8569ucore_i7-9700te_firmwarecore_i7-7700_firmwarecore_i7-6770hq_firmwarexeon_e-2254mecore_i7-9750hcore_i7-7y75core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1505m_v6core_i9-9980hkcore_i7-8559ucore_i9-9900t_firmwarecore_i7-9700_firmwarexeon_e-2146gxeon_e-2224g_firmwarexeon_e3-1578l_v5_firmware2019.2 IPU – Intel(R) SGX and TXT
CVE-2019-0155
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.04%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:42
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.Intel Corporation
Product-enterprise_linux_server_euspentium_gold_g4600pentium_silver_n5000_firmwareenterprise_linux_server_auscore_i3-9100_firmwarexeon_e3-1558l_v5celeron_j1900_firmwarecore_i5-1035g7xeon_e3-1501l_v6_firmwarecore_i3-8350k_firmwarecore_i3-9350k_firmwarepentium_gold_g5420xeon_e-2124g_firmwarecore_i5-8305g_firmwarecore_i5-7500_firmwarepentium_gold_g5420t_firmwarexeon_e-2254me_firmwarecore_i5-8400hceleron_j1850core_m-5y71_firmwarexeon_e-2276me_firmwarepentium_gold_g5420_firmwarecore_i5-7y54pentium_d1509_firmwareceleron_n2815core_i7-9700core_i7-6650u_firmwarexeon_e-2226gpentium_gold_g5400tpentium_gold_g4560_firmwarecore_i7-5500u_firmwarecore_i5-1035g4core_i3-8145uceleron_n3000_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i9-9940x_firmwarecore_i7-6700tecore_i7-6567u_firmwarexeon_e3-1501l_v6core_i3-8109ucore_i9-7920xcore_i7-7600uxeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarecore_i3-7300core_i9-7940x_firmwarecore_i5-8269u_firmwarexeon_e3-1505l_v6xeon_e-2278gegraphics_drivercore_i5-6287u_firmwarexeon_e-2134_firmwarecore_i5-5350h_firmwarepentium_g4560tcore_m5-6y54celeron_n3150celeron_n4100celeron_n3060core_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i5-5250ucore_i7-10710u_firmwarecore_i7-7820hkpentium_d1517core_i5-9500_firmwarecore_i7-5850hqcore_m-5y10ccore_i9-9940xpentium_gold_g5620xeon_e3-1558l_v5_firmwarecore_i5-8400h_firmwareceleron_n4120core_i7-6970hqcore_i5-8600celeron_g3930texeon_e-2136core_i7-10510ucore_i7-9700kcore_i5-9400_firmwareceleron_n2840pentium_g4600t_firmwarecore_i7-8500y_firmwareceleron_g4930e_firmwarecore_i3-8100celeron_n2930celeron_n2840_firmwarecore_m7-6y75pentium_n3540_firmwareceleron_g4900tcore_i3-7300_firmwarecore_m3-6y30core_m-5y31_firmwarexeon_e3-1535m_v5core_i5-7287u_firmwarecore_i7-7700core_m-5y10celeron_g3900te_firmwarecore_i7-7820hq_firmwarecore_i7-5950hq_firmwarecore_i7-7920hq_firmwareceleron_g4932epentium_d1517_firmwarecore_i5-8600kxeon_e3-1575m_v5_firmwarecore_i7-8700k_firmwarecore_i7-5750hq_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i7-5700hq_firmwareceleron_g3900_firmwarecore_i5-8365uxeon_e3-1501m_v6celeron_j3060core_i9-9960x_firmwarexeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarecore_i5-8500b_firmwareceleron_n3160core_i3-7100u_firmwareceleron_g4930core_i5-7600core_i3-6100h_firmwarecore_i9-7940xcore_i9-9960xxeon_e-2286mxeon_e3-1505m_v5pentium_gold_g4600_firmwarepentium_n3540pentium_3560mcore_i7-5650uxeon_e-2276gcore_i3-8300xeon_e-2186gcore_i5-7400tcore_i7-5557u_firmwarecore_i5-7267u_firmwarecore_i3-5005ucore_i3-5020uxeon_e-2174gcore_i3-7100core_i7-8809gceleron_j4105celeron_g4932e_firmwarecore_i5-7260ucore_i7-8700bcore_i5-5257ucore_m-5y70core_i7-7500u_firmwareceleron_j1800core_i3-9130u_firmwarecore_i5-7267ucore_i7-7800xcore_i5\+8500core_i5-5300ucore_m-5y10a_firmwarexeon_e3-1585_v5core_i5-10210ycore_i7-7820hk_firmwarecore_i7-6560ucore_i5-9400tceleron_j3355core_i5-10210u_firmwarecore_i7-5550u_firmwarecore_i5-8300hcore_i5-8600t_firmwareatom_x7-e3950core_i3-10110ycore_i3-7300t_firmwarexeon_e3-1535m_v6_firmwareceleron_j3355ecore_i7-5600uceleron_g4930epentium_gold_4410ycore_i9-9900kscore_i5-9600celeron_j4125_firmwarepentium_gold_g5500tpentium_g4400_firmwarexeon_e3-1585l_v5_firmwarepentium_3805u_firmwarepentium_3805ucore_i5-7300u_firmwarecore_i5-8600_firmwarexeon_e-2224_firmwareceleron_n3350core_i5-9300h_firmwarecore_i3-6167uceleron_g4920xeon_e-2274gcore_i5-9500core_i3-9320_firmwarepentium_silver_j5005xeon_e-2278gelcore_i5-8400b_firmwarecore_i5-5200ucore_i7-6700t_firmwarecore_i3-8100_firmwareceleron_n2807core_i7-6500upentium_j3710core_i7-6500u_firmwareceleron_g3902exeon_e-2124core_i9-9880hcore_i7-10710ucore_i5-7287ucore_i5-8500t_firmwarecore_i3-7100h_firmwareatom_x5-e3930_firmwarecore_i5-8300h_firmwarexeon_e-2136_firmwarepentium_n3530xeon_e-2276g_firmwarecore_i5-6300upentium_gold_g4560xeon_e-2276mecore_i7-8565uceleron_n3350_firmwarecore_i9-9980xe_firmwarecore_i5-7300hq_firmwarecore_i3-5015u_firmwarexeon_e-2274g_firmwareceleron_n2820core_i5-7300hqcore_i7-8706g_firmwarecore_i7-7560upentium_gold_g5420tcore_i3-6100hcore_i5-7400t_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259upentium_gold_4415y_firmwarexeon_e3-1535m_v6core_i9-9900celeron_j3355e_firmwarecore_i7-10510y_firmwarecore_i5-5257u_firmwareceleron_n2806pentium_gold_g5500atom_x5-e3940xeon_e-2146g_firmwarecore_i7-5850hq_firmwarecore_i7-8850h_firmwarecore_m7-6y75_firmwarecore_i7-6700hqcore_i3-9130ucore_i9-7900x_firmwarecore_i7-7800x_firmwarecore_i7-9850h_firmwarecore_i5-6350hqpentium_d1519core_i3-7100_firmwarecore_i5-7600tcore_i7-6660u_firmwareenterprise_linux_server_tuscore_i5-6350hq_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2276ml_firmwareubuntu_linuxceleron_n3010xeon_e-2224gcore_i3-9100tceleron_j4025pentium_j4205xeon_e-2226gecore_i7-6650ucore_i9-9900x_firmwarecore_m-5y71core_i5-9300hcore_i3-7167u_firmwarecore_i7-8559u_firmwarecore_i9-10920x_firmwarecore_i7-8086k_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarecore_i3-7167uxeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i7-8500ycore_i5-9400hcore_i7-7567ucore_i9-9900tcore_i7-5557uceleron_g3900e_firmwarecore_i3-8145u_firmwarepentium_4405u_firmwareceleron_n3160_firmwarecore_i7-7660u_firmwarecore_i7-7820hqceleron_n2820_firmwarecore_i5-6260u_firmwarexeon_e3-1585l_v5core_i7-8750h_firmwarecore_i3-5010u_firmwarecore_i3-7300tatom_x7-e3950_firmwarecore_i5-7400_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n3060_firmwareceleron_n3010_firmwarecore_i7-9700k_firmwarecore_i9-10980xe_firmwarepentium_a1020xeon_e-2288g_firmwareceleron_n4000celeron_n2830core_i5-7y54_firmwarexeon_e-2246g_firmwarepentium_4405y_firmwarecore_i7-6567uxeon_e-2176m_firmwarecore_i7-5775cxeon_e-2174g_firmwareceleron_n3450xeon_e3-1515m_v5core_i9-7900xceleron_n2805_firmwarecore_i9-8950hk_firmwarecore_i5-8500celeron_g3930_firmwarecore_i7-6870hq_firmwarecore_i5-7600_firmwarexeon_e3-1515m_v5_firmwareceleron_n2810core_i5-6267u_firmwarepentium_d1519_firmwareceleron_n2808_firmwarecore_i5-8265ucore_i5-6300hqxeon_e-2254mecore_i7-9750hcore_i5-6440hqcore_i7-7y75core_i3-5157u_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarecore_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700core_i3-5005u_firmwarecore_i5-7y57celeron_g3920_firmwarecore_i3-8350kcore_i5-7500tpentium_silver_j5040xeon_e3-1505m_v6core_i5-9600k_firmwarecore_i9-9900t_firmwarecore_i3-9100pentium_gold_g5500_firmwarexeon_e-2224g_firmwarepentium_gold_g5600xeon_e3-1578l_v5_firmwareceleron_j4125celeron_g4950_firmwarecore_i9-7920x_firmwarecore_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uceleron_j1750celeron_n2940_firmwarecore_i3-8300tcore_i7-7660ucore_i7-6600ucore_i3-6100u_firmwarecore_i7-8706gpentium_g4600txeon_e3-1565l_v5_firmwarepentium_gold_g5620_firmwarepentium_d1508_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarepentium_gold_4415u_firmwarexeon_e-2126g_firmwarecore_i9-7960x_firmwarecore_i7-8700core_i5-8259u_firmwarepentium_j3710_firmwareceleron_g3950core_i5-8400core_i7-8705g_firmwarepentium_3825u_firmwarecore_i3-7100tcore_i7-7700tceleron_n2930_firmwarecore_i7-8086kcore_i5-10210ucore_i5-7260u_firmwarepentium_gold_g5500t_firmwarecore_i7-6600u_firmwarecore_i5-7600k_firmwarecore_i7-6770hqcore_i7-8700kcore_m-5y10aceleron_n2940celeron_n2830_firmwarecore_i5-7200u_firmwarecore_i5-8600k_firmwarecore_i7-10510u_firmwarexeon_e-2134celeron_j3455core_i5-5350hxeon_e-2226g_firmwareceleron_n2807_firmwarepentium_d1509core_i5-10310y_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarecore_i7-10510ypentium_g4560t_firmwareceleron_j3160core_i5-7360u_firmwarecore_i3-10110uceleron_n3150_firmwarecore_i9-7960xcore_i5-9600kcore_i7-7820xceleron_g3900core_i5-5287u_firmwarecore_i7-7700hqcore_i9-7980xeceleron_g4900t_firmwarecore_i3-9100t_firmwarecore_i7-6870hqpentium_gold_4415ycore_i5-8350uceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_n4000_firmwarecore_i5-7300ucore_i5-6440hq_firmwarecore_m3-6y30_firmwarexeon_e3-1505l_v6_firmwareceleron_j3455_firmwareceleron_g3930core_i7-5600u_firmwarecore_i5-8500tceleron_g3930t_firmwarexeon_e-2246gcore_i5-7500celeron_n2806_firmwareceleron_n2910pentium_3825uceleron_j1800_firmwarecore_i5\+8400_firmwarecore_i5-5200u_firmwarecore_i5-7200ucore_i5-8350u_firmwarecore_i7-8700b_firmwareceleron_g3930ecore_i9-8950hkxeon_e3-1535m_v5_firmwarepentium_4405ucore_i7-6820hq_firmwarecore_i7-7920hqpentium_gold_g5600_firmwarecore_i9-9900ks_firmwarexeon_e-2254mlxeon_e3-1545m_v5core_i5-8400tcore_i3-9300_firmwarecore_i3-5015uceleron_g3930tpentium_d1508pentium_d1507_firmwarexeon_e3-1501m_v6_firmwarecore_i3-6100_firmwarecore_i9-10920xcore_m-5y51xeon_e-2254ml_firmwareceleron_j4105_firmwarexeon_e3-1578l_v5core_i7-6660ucore_i3-7350k_firmwarecore_i7-5775c_firmwarecore_i7-5500uceleron_g4920_firmwarepentium_3560m_firmwarepentium_silver_n5000core_i5-6500_firmwarecore_i3-7100hcore_i3-9300xeon_e-2276mlceleron_n3350e_firmwarexeon_e-2244gcore_i5\+8400core_i9-9900kxeon_e-2176gpentium_gold_g5400_firmwarecore_i7-8709gcore_i3-5020u_firmwarecore_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-6287ucore_i5-1035g7_firmwarepentium_silver_j5040_firmwareceleron_j4025_firmwareceleron_j1900core_i5-9400core_i9-9920xcore_i3-8100tcore_m3-8100y_firmwarecore_i7-5950hqcore_i5-6260ucore_i7-5650u_firmwarecore_i7-5550uatom_x5-e3930celeron_g4930_firmwarecore_i5-9500txeon_e-2278ge_firmwarecore_i5-7500t_firmwarecore_i7-6820hk_firmwarecore_i7-8700tcore_i7-6820hqceleron_g4930t_firmwarecore_i5-7400core_i7-8650uceleron_n2810_firmwarecore_m3-7y30_firmwarecore_i3-7320xeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i7-9750h_firmwarecore_i3-6167u_firmwarepentium_gold_g4620_firmwarecore_i3-6100uceleron_j1850_firmwarepentium_gold_4415ucore_i7-6700_firmwarexeon_e-2234_firmwarecore_i5-1035g1pentium_silver_n5030core_i5-5250u_firmwarecore_i7-8565u_firmwarexeon_e-2186g_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarecore_i5-8500bcore_i5-7600t_firmwarexeon_e-2124gceleron_n3050core_i5-8269ucore_i9-7980xe_firmwarecore_i5-7440hq_firmwarecore_i5-6300hq_firmwarexeon_e-2288gceleron_n3000core_m-5y10_firmwarexeon_e-2234core_i7-8709g_firmwareceleron_g3930e_firmwarepentium_a1020_firmwarecore_i7-9850hcore_i7-9700t_firmwareatom_x5-e3940_firmwareceleron_n4100_firmwarepentium_silver_j5005_firmwarecore_i7-7820x_firmwareceleron_g3900tpentium_d1507celeron_g3920core_i3-7100ucore_i5-10210y_firmwarecore_i5-5287ucore_i3-7350kcore_m-5y51_firmwarecore_i5-7600kcore_m5-6y57core_i5-8250uxeon_e-2126gcore_i7-6920hq_firmwarecore_i7-9700tcore_i3-7100t_firmwarecore_i5-7360uceleron_n3450_firmwarecore_i5-6500celeron_n2805core_i7-8650u_firmwareceleron_j1750_firmwarecore_i3-5157upentium_n3530_firmwarecore_i5-6200ucore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_i7-6700hq_firmwarecore_m-5y70_firmwarecore_m3-8100ycore_i5-8250u_firmwarexeon_e-2186mcore_i7-7567u_firmwarecore_m-5y10c_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarepentium_gold_g4620celeron_n4120_firmwareceleron_g3902e_firmwarexeon_e-2176mcore_i7-6970hq_firmwarecore_i7-7700hq_firmwareceleron_n3350ecore_i7-6820hkpentium_g4400core_i9-9900xcore_i5-10310ycore_i5-8400t_firmwarexeon_e-2286gcore_i5-8365u_firmwareceleron_n2808core_i7-6700te_firmwarecore_i3-9300txeon_e-2244g_firmwarexeon_e3-1575m_v5core_i5-6360u_firmwarepentium_silver_n5030_firmwarexeon_e-2278gxeon_e3-1505l_v5core_i9-9980xeceleron_j3160_firmwarecore_i7-8850hceleron_j4005_firmwarecore_i5-8265u_firmwareceleron_j3060_firmwarecore_i5-5350ucore_i9-10900x_firmwarecore_i7-6560u_firmwarecore_i3-8300_firmwareceleron_g4930tceleron_n2920core_i9-9900_firmwarecore_i7-1065g7_firmwarexeon_e3-1505m_v6_firmwarecore_i9-10900xceleron_g3930te_firmwarexeon_e3-1545m_v5_firmwareceleron_n2815_firmwarecore_i5\+8500_firmwarecore_i7\+8700core_i9-10980xecore_i7-5700hqpentium_j4205_firmwarecore_m3-7y30core_i3-9350kcore_i5-8500_firmwareceleron_n4020_firmwarecore_i5-5300u_firmwarecore_i5-6300u_firmwarecore_i7-8809g_firmwareceleron_g4950core_i7-7700t_firmwarecore_i9-9980hk_firmwarepentium_4405ycore_i5-9400h_firmwareceleron_g4900core_i3-5010ucore_i5-8200ypentium_gold_g5400celeron_g3900t_firmwarecore_i3-6100xeon_e3-1505l_v5_firmwarecore_i3-10110u_firmwareceleron_n4020celeron_g4900_firmwarecore_i5-7440hqcore_i5-5350u_firmwarecore_i5-6360ucore_m5-6y54_firmwarexeon_e-2278gel_firmwarexeon_e-2144gcore_i5-9500t_firmwarecore_m5-6y57_firmwareceleron_g3900ecore_i7-7700_firmwarecore_i7-6770hq_firmwareceleron_g3950_firmwarecore_i7-5750hqcore_i5-6267uceleron_g3900teceleron_j3355_firmwarecore_i3-1005g1celeron_j4005core_i5-9600tcore_m-5y31core_i3-9320core_i9-9920x_firmwarecore_i5-8600tcore_i7-1065g7core_i5-9400t_firmwarecore_i9-9980hkcore_i5-8305gcore_i7-8559uceleron_n2910_firmwarecore_i7-9700_firmwarexeon_e-2146g2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux
CVE-2000-0516
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 36.73%
||
7 Day CHG~0.00%
Published-13 Oct, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When configured to store configuration information in an LDAP directory, Shiva Access Manager 5.0.0 stores the root DN (Distinguished Name) name and password in cleartext in a file that is world readable, which allows local users to compromise the LDAP server.

Action-Not Available
Vendor-n/aIntel Corporation
Product-shiva_access_managern/a
CVE-2019-11162
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 16:11
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in hardware abstraction in SEMA driver for Intel(R) Computing Improvement Program before version 2.4.0.04733 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-computing_improvement_programIntel(R) Computing Improvement Program Advisory
CVE-2019-11133
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 25.00%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 20:23
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Processor Diagnostic Tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-processor_diagnostic_toolIntel(R) Processor Diagnostic Tool Advisory
CVE-2019-11170
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.39%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-287
Improper Authentication
CVE-2023-50197
Matching Score-8
Assigner-Zero Day Initiative
ShareView Details
Matching Score-8
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.64%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:14
Updated-14 Aug, 2025 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantDriver & Support Assistantdriver\&support_assistant
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2019-0138
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in Intel(R) ACU Wizard version 12.0.0.129 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-acu_wizardIntel(R) ACU Wizard
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2011-5174
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.67%
||
7 Day CHG~0.00%
Published-15 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.

Action-Not Available
Vendor-n/aIntel Corporation
Product-7500_chipsetc206_chipsetmobile_intel_gm45_chipset3450_chipsetmobile_intel_qm57_chipsetx58_chipsetmobile_intel_qs67_chipsetmobile_intel_qm67_chipset5520_chipsetq35_express_chipsetmobile_intel_pm45_express_chipset5500_chipsetsinit_authenticated_code_modulec204_chipsetmobile_intel_qs57_express_chipsetc202_chipsetq67_express_chipsetq57_chipsetmobile_intel_qs57_chipsetmobile_intel_gs45_chipsetn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-3697
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.72%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 14:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper directory permissions in the installer for the Intel Media Server Studio may allow unprivileged users to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-media_server_studioIntel Media Server Studio
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2022-0004
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 31.56%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_j3355_firmwareceleron_n2815core_i7-8670t_firmwarepentium_gold_g5500tceleron_j4115core_i5-10610u_firmwarecore_i3-10100core_i9-10910_firmwarecore_i7-8850h_firmwarecore_i5-11400xeon_d-2733nt_firmwarecore_i7-10510yceleron_j4125core_i7-10710u_firmwareceleron_n3010_firmwarecore_i5-11500bcore_i9-11900_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwareceleron_n4120core_i9-10900_firmwarepentium_gold_g4560atom_p5942b_firmwarecore_i5-8500t_firmwarecore_i5-11260hcore_i7-8709g_firmwarepentium_gold_g6605c627pentium_gold_g6405u_firmwarepentium_gold_g5400tcore_i7-10875h_firmwarexeon_d-2163it_firmwarec627apentium_gold_4415u_firmwarecore_i7-8709gpentium_gold_g6505xeon_d-2177ntpentium_gold_g5600_firmwarecore_i9-11900kfcore_i5-10600t_firmwarexeon_d-2786nte_firmwarecore_i3-l13g4core_i7-11700k_firmwarecore_i5-10300h_firmwarepentium_gold_g6400xeon_d-2775te_firmwarecore_i9-10900tpentium_gold_g5400_firmwarecore_i5-8200ycore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarecore_i5-10500t_firmwareatom_x6425repentium_gold_g4620_firmwarepentium_silver_j5040_firmwarecore_i7-8809g_firmwarec246_firmwarecore_i5-8260uxeon_d2700core_i7-12700kfcore_i9-12900_firmwarecore_i5-11400fcore_i5-12600h_firmwarecore_i5-10400txeon_d-2796teceleron_6600hec246c628_firmwarecore_i9-10900xcore_i5-12400fceleron_n3350ecore_i9-11980hk_firmwarecore_i3-8000txeon_d-2142itcore_i5-8305g_firmwareceleron_j4005_firmwarecore_i5-10110y_firmwarecore_i3-8100b_firmwarecore_i5-8650k_firmwarecore_i5-8700bcore_i9-10900te_firmwarec232c624_firmwarecore_i9-11900kcore_i5-10500hcore_i9-11900kb_firmwarecore_i9-12900hkcore_i3-8300t_firmwarecore_i5-12450hcore_i5-10600kfcore_i7-10700_firmwareceleron_n2840_firmwareatom_x6413e_firmwarepentium_gold_g6600_firmwareceleron_j3060c626core_i9-10850hxeon_d-2752nte_firmwarexeon_d-2796nt_firmwarecore_i5-11500he_firmwarecore_i5-8210y_firmwarecore_i3-10100ec236pentium_gold_g5420tcore_i9-12900hxcore_i5-11320h_firmwarecore_i7-10700kf_firmwarecore_i9-12900core_i7-12650h_firmwarepentium_gold_g6400te_firmwareatom_x6413ecore_i5-12500core_i5-11600kfcore_i7-8550u_firmwarec624acore_i5-8365uxeon_d-2799core_i7-12700xeon_d-2145ntc422celeron_j4105_firmwarecore_i7-12700t_firmwarecore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uceleron_n2806_firmwarec621core_i3-11100he_firmwareatom_p5931b_firmwarepentium_gold_g7400xeon_d-2163itceleron_n4020c_firmwarepentium_gold_4417u_firmwarecore_i5-12500h_firmwarecore_i5-11400hcore_i9-11900hceleron_j3160_firmwarecore_i7-8665ue_firmwarecore_i3-12100tcore_i7-10810ucore_i3-10300tcore_i3-8100core_i3-8145uepentium_gold_4425ypentium_gold_g5500_firmwarepentium_gold_g5500t_firmwareceleron_j4025_firmwarecore_i9-11900pentium_gold_g4620core_i5-8265ucore_i7-10700tcore_i7-12700kf_firmwareatom_p5921bcore_i5-8650core_i3-12100f_firmwarepentium_gold_6500ycore_i5-10500ecore_i7-10750hcore_i9-10850kpentium_gold_g6405core_i5-8500bxeon_d-2143itxeon_d-2753ntcore_i5-8250u_firmwareceleron_n2840pentium_gold_g7400texeon_w-1390_firmwarecore_i3-8100hcore_i5-8400b_firmwarecore_i7-8706gceleron_n2810pentium_gold_g6400tcore_i7-11850h_firmwarecore_i7-12850hxceleron_j4115_firmwarecore_i3-8120core_i9-11900fxeon_d-2177nt_firmwareatom_x7-e3950_firmwarecore_i5-8365u_firmwarec242core_i9-10920xcore_i9-11950hceleron_n3450_firmwarexeon_w-1300_firmwarecore_i5-12450hxcore_i9-10885hcore_i5-10310ucore_i3-8130u_firmwareceleron_n4500core_i7-8557uceleron_n2910_firmwarecore_i5-11400_firmwarecore_i7-11850hecore_i3-8350k_firmwareceleron_6305celeron_n5105_firmwarepentium_gold_g6605_firmwarecore_i7-10750h_firmwarexeon_d-2142it_firmwarecore_i7-8557u_firmwarexeon_d-2779_firmwareceleron_j4025core_i9-10980hkxeon_d-2733ntcore_i7-12650hxceleron_n2808_firmwarecore_i7-10700k_firmwarecore_i9-10900t_firmwarepentium_gold_g6505_firmwarecore_i5-11400f_firmwarecore_i3-10305_firmwareceleron_n4100celeron_n3520core_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i7-11700b_firmwarecore_i7-11800h_firmwareceleron_6600he_firmwarexeon_d-2795ntceleron_4305ue_firmwarecore_i7-8500yxeon_d-2779core_i9-11900t_firmwarepentium_silver_n5030_firmwarepentium_silver_j5040celeron_j3060_firmwareceleron_n6211xeon_w-1370pentium_gold_6500y_firmwarecore_i5-8600tcore_i7-8510y_firmwarepentium_gold_g5420_firmwarecore_i5-12600tpentium_gold_g6405t_firmwareceleron_n6210_firmwarecore_i3-10320_firmwarecore_i5-12400xeon_w-1370pcore_i3-10320core_i3-8121uc625_firmwarecore_i5-8420t_firmwarexeon_d-2752ntecore_i3-12300t_firmwarepentium_gold_g5400core_i3-10105fceleron_n3700celeron_n5095_firmwarexeon_w-1390t_firmwareatom_x5-e3940core_i7-10875hceleron_n3060_firmwarecore_i3-8121u_firmwarecore_i3-11100hecore_i5-10400hceleron_n4000c_firmwarepentium_gold_7505core_i7-12700kxeon_d-2712t_firmwarecore_i5-10505_firmwareceleron_n3050_firmwarecore_i5-12600_firmwareceleron_n2810_firmwarepentium_gold_g6500_firmwarepentium_gold_g4600_firmwarepentium_gold_g5620_firmwareceleron_j3455_firmwarecore_i5-10110ycore_i5-12600hcore_i9-11900kf_firmwarecore_i7-8500y_firmwarecore_i7-12700hc627a_firmwareatom_p5962b_firmwarecore_i3-10105tcore_i5-11300hcore_i7-10510u_firmwarecore_i3-8100h_firmwarecore_i3-10105t_firmwarepentium_silver_n6000core_i5-10400h_firmwarecore_i9-12900kf_firmwarecore_i9-10900kfcore_i7-11390h_firmwarecore_i3-10100tpentium_gold_g6600xeon_d-2146ntceleron_n2805_firmwarecore_i5-8300h_firmwarexeon_d-2752terceleron_j4125_firmwarecore_i5-8279u_firmwarecore_i5-11500hecore_i5-8500b_firmwarecore_i5-12500hc622xeon_w-1390tcore_i7-12700k_firmwarecore_i7-11700kfpentium_gold_g5420xeon_d2700_firmwarecore_i7-11700_firmwarecore_i7-8706g__firmwarexeon_d-2795nt_firmwarecore_i7-11375hcore_i7-8559ucore_i9-10850h_firmwarecore_i5-8550_firmwarecore_i5-11500tpentium_gold_g7400_firmwareceleron_n3010core_i9-12900h_firmwarecore_i5-8700b_firmwarecore_i7-8670_firmwarecore_i7-8560ucore_i7-11600h_firmwarecore_i5-11400h_firmwarepentium_gold_g5600core_i3-10325core_i5-8500_firmwarecore_i7-8700core_i5-8400atom_x6200fe_firmwareceleron_n5100core_i3-10105f_firmwareceleron_n3000_firmwarecore_i5-12600xeon_d-2752ter_firmwareceleron_n2805core_i5-12600k_firmwarecore_i5-8650kcore_i3-10110u_firmwarexeon_w-1350core_i9-10980xecore_i7-8750hfceleron_n4505_firmwarecore_i7-11850hceleron_n2808core_i9-11900f_firmwarecore_i5-8310y_firmwarecore_i3-10110ucore_i7-8665u_firmwareceleron_n3060core_i9-10885h_firmwarecore_i7-8086k_firmwarepentium_gold_g7400te_firmwareceleron_n4500_firmwarecore_i3-10100y_firmwareceleron_n6211_firmwarecore_i5-11500_firmwarecore_i7-8569u_firmwareceleron_4305ucore_i5-12600hx_firmwarepentium_gold_6405ucore_i5-8420_firmwarexeon_w-1350pc629a_firmwarexeon_d-2143it_firmwarecore_i9-10900celeron_n5100_firmwarecore_i9-12900hatom_x6212re_firmwareatom_x5-e3930c627_firmwareatom_x6211ex299_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i7-11375h_firmwarecore_i3-10300core_i3-8100t_firmwarepentium_gold_4417ucore_i5-10310u_firmwarecore_i7-8565ucore_i7-8670core_i9-10940x_firmwarecore_i5-8400_firmwarecore_i5-11500h_firmwarecore_i7-8510ycore_i7-10870hcore_i7-10510ucore_i3-10100fpentium_gold_4425y_firmwarepentium_gold_g5500celeron_n2940core_i5-12500tcore_i5-8310ycore_i9-12900tcore_i3-10300_firmwarecore_i5-10500h_firmwareceleron_6305_firmwarexeon_d-2183it_firmwarecore_i5-12600t_firmwareatom_x6200fecore_i5-12400_firmwarec236_firmwarecore_i3-8000t_firmwarecore_i5-8265u_firmwarecore_i3-8000_firmwarecore_i5-10210uceleron_n3000pentium_gold_g4600pentium_gold_g5400t_firmwarecore_i5-10500core_i5-11300h_firmwarecore_i5-8400bpentium_gold_g6405tcore_i7-12800h_firmwarecore_i7-8850hcore_i9-8950hk_firmwareceleron_n2930celeron_n2830core_i5-8400h_firmwarecore_i5-11600_firmwarecore_i5-10400t_firmwarecore_i7-12650hceleron_n4020_firmwarecore_i3-10100_firmwareceleron_4205u_firmwarecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i3-10100ycore_i5-10600tcore_i5-10600kf_firmwareceleron_n3150_firmwarecore_i9-10900e_firmwareceleron_n4505c625celeron_n3520_firmwarexeon_d-2191_firmwarec621apentium_gold_g6505txeon_d-2146nt_firmwarecore_i9-10910core_i9-12900k_firmwarepentium_gold_g6500tcore_i7-10700f_firmwarecore_i3-10100t_firmwarepentium_gold_4415y_firmwarecore_i5-8269u_firmwarecore_i3-10105celeron_n6210celeron_j3455ecore_i3-12300_firmwarecore_i5-11400tceleron_n4020pentium_gold_6405u_firmwarecore_i7-11700kcore_i9-10900kf_firmwarecore_i7-8550ucore_i7-10810u_firmwarexeon_w-1350_firmwarecore_i9-10920x_firmwarecore_i9-10940xceleron_n2920_firmwarec629acore_i3-8300pentium_gold_g6400t_firmwarecore_i7-10700kfceleron_j4105core_i7-12850hx_firmwarecore_i5-8260u_firmwarecore_i5-8400tcore_i9-12900t_firmwarecore_i3-l13g4_firmwarecore_i5-12400t_firmwarecore_i7-12800hx_firmwarexeon_d-2187ntxeon_d-2775teceleron_4305u_firmwareceleron_n4100_firmwarecore_i5-11600kf_firmwarexeon_w-1370p_firmwarepentium_gold_4410y_firmwarepentium_gold_g7400tcore_i9-11900kbpentium_gold_7505_firmwarecore_i5-8257u_firmwarecore_i9-11900h_firmwarecore_i7-8700b_firmwareceleron_j3355eceleron_n2815_firmwareceleron_n4504core_i3-11100b_firmwarecore_i3-10305t_firmwarecore_i7-8706g_firmwarecore_i5-12400tcore_i7-12700tcore_i9-10850k_firmwarecore_i5-8365ue_firmwareceleron_n2910atom_x5-e3930_firmwarecore_i7-11600hcore_i7-10700core_i9-11950h_firmwarexeon_d-2753nt_firmwareceleron_n2940_firmwarexeon_w-1350p_firmwarecore_i5-10500e_firmwarepentium_gold_4410yc420_firmwarecore_i5-11600k_firmwareceleron_j3355core_i3-8145u_firmwarecore_i5-8600k_firmwarecore_i5-10400core_i3-8145uxeon_d-2173itceleron_j3355e_firmwarexeon_d-2161ixeon_d-2766ntcore_i7-8700kcore_i7-10870h_firmwarexeon_d-2123itcore_i7-11700kf_firmwarepentium_gold_g6405_firmwarecore_i5-8420tcore_i3-8109ucore_i5-8365uecore_i7-12650hx_firmwareceleron_j3455core_i9-12900hk_firmwarecore_i7-12700fcore_i3-12100fcore_i3-11100bpentium_silver_n6000_firmwareceleron_n3160xeon_d-2776ntcore_i5-8200y_firmwareceleron_n3160_firmwarec624a_firmwarecore_i7-10700te_firmwarecore_i7-10700eceleron_n2830_firmwarecore_i5-8350uatom_x6425e_firmwarepentium_gold_g7400exeon_d-2161i_firmwarecore_i7-8750h_firmwarecore_i3-10100teceleron_n4000_firmwareceleron_n2807pentium_gold_g5420t_firmwarecore_i5-10210u_firmwarecore_i7-11390hcore_i3-8140u_firmwarexeon_d-2786ntecore_i9-12900hx_firmwarexeon_d-2796te_firmwarexeon_d-2191pentium_silver_a1030_firmwarecore_i3-10100te_firmwarecore_i9-12900fcore_i5-10600k_firmwarepentium_gold_g5600tcore_i9-10900ecore_i5-8259u_firmwarecore_i5-10610uc624core_i3-10110y_firmwarecore_i5-8250ucore_i9-11980hkcore_i5-8600pentium_gold_g7400e_firmwarepentium_silver_n6005atom_p5931bcore_i5-l16g7_firmwarecore_i5-10500tecore_i7-12700f_firmwarecore_i7-12700_firmwarecore_i7-8559u_firmwarecore_i5-10210y_firmwarecore_i5-11500core_i3-8000core_i7-8700k_firmwareceleron_n4000ccore_i7-11700pentium_gold_g6400exeon_d-2798ntcore_i7-12800hxcore_i7-8700bcore_i5-10500tcore_i5-10600core_i5-10500_firmwareatom_x6425re_firmwarecore_i5-10310ycore_i3-12300core_i5-10310y_firmwarexeon_d-2738core_i5-12450hx_firmwarepentium_gold_g6500t_firmwarecore_i5-8259ucore_i5-11500t_firmwarepentium_gold_g6405ucore_i7-10700katom_x7-e3950pentium_gold_g5600t_firmwarecore_i3-12300tpentium_silver_a1030core_i3-8109u_firmwarecore_i5-12450h_firmwarecore_i5-11600t_firmwarecore_i7-8705g_firmwarecore_i7-11370hxeon_w-1300core_i7-8665uecore_i5-12500_firmwarecore_i3-8130ucore_i3-8300tcore_i5-11500hcore_i9-12900kcore_i5-l16g7core_i9-12950hx_firmwarecore_i5-11600tcore_i7-8650ucore_i5-10200hpentium_gold_g5620pentium_silver_n5030core_i7-8705gceleron_n2920c621a_firmwareceleron_n4000core_i5-10400fcore_i5-12600kfpentium_gold_g6400_firmwarecore_i3-12100t_firmwarecore_i9-12950hxcore_i7-8706g_core_i9-12900kfcore_i3-8145ue_firmwarecore_i5-8400t_firmwarepentium_silver_n5000_firmwarecore_i5-8400hceleron_n3150celeron_j4005atom_x5-e3940_firmwarepentium_silver_n5000core_i7-11850he_firmwarexeon_d-2141ipentium_gold_4415uceleron_6305e_firmwarexeon_d-2141i_firmwareatom_x6211e_firmwarecore_i3-10110yc422_firmwarepentium_gold_5405uxeon_d-2776nt_firmwareatom_p5921b_firmwareceleron_n3350core_i5-8305gatom_p5962bxeon_w-1390core_i7-11700t_firmwareceleron_n2820celeron_n2820_firmwarecore_i5-11600core_i7-11700fcore_i7-8750hatom_x6212recore_i7-8665uceleron_n5105core_i3-10305tcore_i3-10100e_firmwarexeon_d-2183itceleron_n2807_firmwarexeon_d-2123it_firmwarecore_i5-12500t_firmwarecore_i5-8300hxeon_w-1370_firmwarexeon_d-2712tceleron_n2806core_i5-8420pentium_silver_n6005_firmwarecore_i3-8140uceleron_n3350_firmwarecore_i3-8350kcore_i5-10600kcore_i7-8086kcore_i9-12900f_firmwarec628core_i7-10850hcore_i3-8120_firmwarecore_i3-12100_firmwarecore_i7-8560u_firmwarecore_i5-12600kf_firmwareatom_x6425ecore_i5-10500te_firmwarecore_i3-8020_firmwarecore_i3-10300t_firmwarex299xeon_d-2187nt_firmwarecore_i5-11500b_firmwarecore_i3-8100bxeon_w-1390p_firmwarecore_i5-8550core_i5-8279ucore_i9-10900f_firmwarecore_i5-12600hxcore_i3-10100f_firmwareatom_p5942bcore_i5-8600kcore_i7-12700h_firmwarecore_i7-8700tc242_firmwarexeon_d-2799_firmwarecore_i7-11700tceleron_n5095celeron_n2930_firmwarec232_firmwarecore_i7-8700t_firmwarecore_i7-10700e_firmwarec621_firmwarecore_i5-8600t_firmwarepentium_gold_g7400t_firmwarecore_i5-8500core_i9-11900tcore_i5-11260h_firmwarecore_i5-8210ycore_i5-10400f_firmwareceleron_n4120_firmwarepentium_silver_j5005_firmwarecore_i7-8565u_firmwarecore_i9-10980xe_firmwareatom_x6427fepentium_gold_5405u_firmwarecore_i5-8257ucore_i7-8569ucore_i5-11400t_firmwarecore_i7-10700t_firmwareceleron_4205upentium_gold_g4560_firmwarexeon_d-2796ntceleron_6305eceleron_n3350e_firmwareatom_x6427fe_firmwarecore_i5-8500tcore_i7-8809gcore_i3-10105_firmwarecore_i5-11320hcore_i7-8650u_firmwareceleron_n3700_firmwarecore_i7-11700bcore_i7-10850h_firmwarexeon_d-2766nt_firmwarecore_i3-10305xeon_d-2166ntcore_i7-8700_firmwarepentium_gold_4415yxeon_w-1390pcore_i3-8300_firmwarecore_i5-10505core_i5-8650_firmwarec629c626_firmwarecore_i3-12100core_i9-10900x_firmwarecore_i7-10710uc622_firmwarec420celeron_j3160core_i5-10300hcore_i5-10210ycore_i5-8350u_firmwarecore_i3-8020celeron_n4504_firmwarepentium_gold_g6500core_i5-12400f_firmwarecore_i7-11700f_firmwarecore_i9-10900fceleron_n4020cceleron_j3455e_firmwareceleron_n3450core_i5-10200h_firmwarecore_i3-8100txeon_d-2798nt_firmwarecore_i9-10980hk_firmwarecore_i5-12600kcore_i7-8670tpentium_gold_g6400texeon_d-2166nt_firmwarecore_i5-10400_firmwarecore_i7-12800hceleron_n3050c629_firmwarepentium_gold_g6400e_firmwarepentium_gold_g6505t_firmwarecore_i7-10700fcore_i9-10900k_firmwarecore_i7-8750hf_firmwareceleron_4305uexeon_d-2738_firmwarepentium_silver_j5005Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT
CVE-2009-4419
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 16.96%
||
7 Day CHG~0.00%
Published-24 Dec, 2009 | 17:00
Updated-07 Aug, 2024 | 07:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Intel Q35, GM45, PM45 Express, Q45, and Q43 Express chipsets in the SINIT Authenticated Code Module (ACM), which allows local users to bypass the Trusted Execution Technology protection mechanism and gain privileges by modifying the MCHBAR register to point to an attacker-controlled region, which prevents the SENTER instruction from properly applying VT-d protection while an MLE is being loaded.

Action-Not Available
Vendor-n/aIntel Corporation
Product-gm45_chipsetq43_express_chipsetpm45_express_chipsetq35_chipsetq45_chipsetn/a
CWE ID-CWE-16
Not Available
CVE-2023-42099
Matching Score-8
Assigner-Zero Day Initiative
ShareView Details
Matching Score-8
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.57%
||
7 Day CHG~0.00%
Published-03 May, 2024 | 02:13
Updated-12 Aug, 2025 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.

Action-Not Available
Vendor-Intel Corporation
Product-driver_\&_support_assistantDriver & Support Assistantdriver\&support_assistant
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2018-3684
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.65%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 21:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unquoted service paths in Intel Quartus II in versions 11.0 - 15.0 allow a local attacker to potentially execute arbitrary code.

Action-Not Available
Vendor-Intel Corporation
Product-quartus_iiIntel Quartus II
CWE ID-CWE-428
Unquoted Search Path or Element
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found