Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Type | CWE ID | Description |
---|---|---|
text | N/A | Denial of Service |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html | x_refsource_MISC |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html | vendor-advisory x_refsource_SUSE |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html | vendor-advisory x_refsource_SUSE |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_us | x_refsource_CONFIRM |
https://support.f5.com/csp/article/K42433061?utm_source=f5support&%3Butm_medium=RSS | x_refsource_CONFIRM |
https://seclists.org/bugtraq/2019/Dec/28 | mailing-list x_refsource_BUGTRAQ |
https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html | mailing-list x_refsource_MLIST |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html | x_refsource_MISC x_transferred |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html | vendor-advisory x_refsource_SUSE x_transferred |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html | vendor-advisory x_refsource_SUSE x_transferred |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_us | x_refsource_CONFIRM x_transferred |
https://support.f5.com/csp/article/K42433061?utm_source=f5support&%3Butm_medium=RSS | x_refsource_CONFIRM x_transferred |
https://seclists.org/bugtraq/2019/Dec/28 | mailing-list x_refsource_BUGTRAQ x_transferred |
https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html | mailing-list x_refsource_MLIST x_transferred |
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.1 | 6.0 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
Primary | 2.0 | 2.1 | LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
Hyperlink | Source | Resource |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html | secure@intel.com | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html | secure@intel.com | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html | secure@intel.com | Mailing List Third Party Advisory |
https://seclists.org/bugtraq/2019/Dec/28 | secure@intel.com | Mailing List Third Party Advisory |
https://support.f5.com/csp/article/K42433061?utm_source=f5support&%3Butm_medium=RSS | secure@intel.com | N/A |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03969en_us | secure@intel.com | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html | secure@intel.com | Vendor Advisory |