Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-24474

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-09 Jun, 2021 | 19:01
Updated At-04 Aug, 2024 | 15:12
Rejected At-
Credits

Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:09 Jun, 2021 | 19:01
Updated At:04 Aug, 2024 | 15:12
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Affected Products
Vendor
n/a
Product
Intel(R) Server Boards, Server Systems and Compute Modules
Versions
Affected
  • before version 2.48.ce3e3bd2
Problem Types
TypeCWE IDDescription
textN/Aescalation of privilege
Type: text
CWE ID: N/A
Description: escalation of privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html
x_refsource_MISC
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html
x_refsource_MISC
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:09 Jun, 2021 | 20:15
Updated At:01 Jul, 2021 | 19:51

Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.0HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.05.2MEDIUM
AV:A/AC:L/Au:S/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 5.2
Base severity: MEDIUM
Vector:
AV:A/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

Intel Corporation
intel
>>baseboard_management_controller_firmware>>Versions before 2.48.ce3e3bd2(exclusive)
cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600bpb24r>>-
cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600bpbr>>-
cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600bpq24r>>-
cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600bpqr>>-
cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600bps24r>>-
cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600bpsr>>-
cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600bpb>>-
cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600bpbr>>-
cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600bpq>>-
cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600bpqr>>-
cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600bps>>-
cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600bpsr>>-
cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600stb>>-
cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600stbr>>-
cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600stq>>-
cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600stqr>>-
cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wf0>>-
cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wf0r>>-
cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wfq>>-
cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wfqr>>-
cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wft>>-
cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wftr>>-
cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wfqysr>>-
cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wftys>>-
cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wftysr>>-
cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wf0ys>>-
cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wf0ysr>>-
cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wftys>>-
cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wftysr>>-
cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wf0zs>>-
cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wf0zsr>>-
cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wfqzs>>-
cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wfqzsr>>-
cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wftzs>>-
cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wftzsr>>-
cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2224wfqzs>>-
cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2224wftzs>>-
cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2224wftzsr>>-
cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2308wftzs>>-
cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2308wftzsr>>-
cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wf0np>>-
cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wf0npr>>-
cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wfqzs>>-
cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wftzs>>-
cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wftzsr>>-
cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Primarynvd@nist.gov
CWE ID: CWE-120
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

66Records found

CVE-2019-14557
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-8||HIGH
EPSS-0.14% / 35.14%
||
7 Day CHG~0.00%
Published-05 Oct, 2020 | 13:45
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable elevation of privilege or denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7_9700kfcore_i7_9700core_i5_9600celeron_5205ucore_i5_9400tcore_i5_9400fcore_i3_8350kcore_i5_8400tcore_i3_9100fcore_i3_8300core_i3_9300tcore_i5_9600tcore_i9_9900kcore_i3_9100tcore_i7_9700fceleron_5305ucore_i3_9300core_i5_8600tcore_i5_9600kcore_i7_8086kcore_i5_8500core_i7_1060g7core_i7_8700kcore_i5_8500tcore_i9_9900kfcore_i9_9900tcore_i5_8600core_i5_9500fcore_i3_9320core_i7_8700tcore_i5_8400core_i5_9400celeron_4305uecore_i3_8100tcore_i7_1068ng7core_i9_9900celeron_4305ucore_i7_1060ng7core_i3_8300tcore_i9_9900kscore_i7_9700kcore_i3_9350kfcore_i5_9500celeron_4205ucore_i5_8600kcore_i5_9500tcore_i5_9600kfbioscore_i3_9100core_i7_8700core_i3_8100core_i7_1065g7core_i7_9700tcore_i3_9350kcore_i3_8100fIntel BIOS
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-39368
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.6||HIGH
EPSS-0.16% / 37.34%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:12
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of special elements used in an SQL command ('SQL Injection') in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Neural Compressor softwareneural_compressor_software
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2019-0096
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8||HIGH
EPSS-0.25% / 47.71%
||
7 Day CHG-0.01%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) Active Management Technology (AMT)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-25756
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.06% / 17.27%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-13 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7-1365u_firmwarepentium_gold_g4600core_i7-11850he_firmwarecore_i5-12600hecore_i7-1280pcore_i7-1068ng7core_i5-1035g7core_i5-12600tcore_i5-13600kcore_i3-8350k_firmwarecore_i3-9350k_firmwareceleron_5305upentium_gold_g6600_firmwareceleron_g3940pentium_gold_g6400t_firmwarepentium_n6415_firmwarecore_i9-12900te_firmwarecore_i5-11600_firmwareceleron_g1610t_firmwareceleron_4305uceleron_b800_firmwarecore_i7-1060g7_firmwareceleron_n2815core_i7-9700core_i7-1370pcore_i5-12500hl_firmwarecore_i9-9900kfceleron_2961ypentium_gold_g5400tcore_i5-1035g4core_i5-10400hceleron_4205uceleron_n5105core_i7-10700k_firmwareceleron_2002e_firmwareceleron_n3000_firmwarecore_i5-9600t_firmwarecore_i3-10100ycore_i5-1345ucore_i7-9700tecore_i5-10400tcore_i5-13500hcore_i7-11370hcore_i5-10310ucore_i5-9400f_firmwarecore_i7-1270pcore_i7-10700t_firmwarecore_i7-1270p_firmwareceleron_g1830core_i5-11600tcore_i5-1235ul_firmwarecore_i5-8269u_firmwarecore_i7-13700core_i5-12500te_firmwareceleron_b720core_i7-13800h_firmwareceleron_n4100celeron_g6900celeron_g3940_firmwareceleron_n3060core_i5-10400celeron_1020ecore_i5-12600k_firmwarepentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwareceleron_1020mcore_i5-10500teceleron_g5305ucore_i5-11600core_i7-12800hl_firmwareceleron_5305u_firmwarecore_i5-13505h_firmwarepentium_gold_g6405t_firmwarecore_i9-13980hx_firmwareceleron_g1820te_firmwareceleron_3865u_firmwarecore_i5-8600core_i7-12800he_firmwarecore_i5-1345ue_firmwarecore_i5-9400_firmwareceleron_5205ucore_i7-8500y_firmwareceleron_3865ucore_i5-1245ulceleron_g4930e_firmwarecore_i3-10100ecore_i5-13600hxcore_i7-1060g7core_i5-13500tecore_i9-10900celeron_n2930celeron_n2840_firmwarecore_i5-11600k_firmwareceleron_g4900tcore_i3-10100tceleron_g3900te_firmwarepentium_gold_g7400ecore_i9-10900kceleron_797_firmwarecore_i3-10325_firmwareceleron_g4932ecore_i5-8600kpentium_gold_g7400tcore_i7-10700te_firmwarecore_i9-10900fcore_i5-12600he_firmwarecore_i7-8700k_firmwarecore_i5-11500t_firmwarecore_i5-13400tcore_i7-8750hcore_i3-10105t_firmwarecore_i9-13900tceleron_927ueceleron_g465core_i5-10400_firmwarecore_i3-1115gre_firmwareceleron_2002eceleron_n4505_firmwarecore_i7-1180g7_firmwarecore_i7-9850he_firmwarecore_i3-1125g4core_i5-13600h_firmwarecore_i3-1000g4core_i3-12300_firmwareceleron_6600he_firmwareceleron_j6413_firmwarecore_i7-13700tcore_i7-8809gcore_i3-8145ueceleron_j4105celeron_887core_i5-10400h_firmwareceleron_807_firmwarecore_i9-12900h_firmwarecore_i5-10500_firmwarepentium_gold_g6505celeron_j6412_firmwareceleron_g5900t_firmwarecore_i9-13900kscore_i5-1245ul_firmwarecore_i7-1260u_firmwarecore_i7-13700_firmwarecore_i7-1370pe_firmwarecore_i7-1265uecore_i9-13900kf_firmwarepentium_gold_g6400te_firmwarecore_i5-10500eceleron_2970mcore_i5-9400tceleron_j3355core_i5-8600t_firmwarecore_i5-8300hcore_i7-12700e_firmwarecore_i9-13905h_firmwarecore_i3-10110yatom_x6414re_firmwarecore_i5-10600kfceleron_1005m_firmwareceleron_j3355eceleron_1047ue_firmwarecore_i7-12650h_firmwarecore_i5-11600kfceleron_j4125_firmwarecore_i7-11700kfpentium_gold_g5500tcore_i7-10870hcore_i5-12600t_firmwareceleron_3205ucore_i5-8600_firmwarecore_i5-1245u_firmwarecore_i3-13300hre_firmwarecore_i5-9600kf_firmwareatom_x6212re_firmwarecore_i7-1250uceleron_g4920celeron_3215u_firmwarecore_i7-13620h_firmwarecore_i5-11500tpentium_gold_g6405uceleron_n4504core_i5-9500core_i3-8145ue_firmwarecore_i5-1250pecore_i5-10500te_firmwarecore_i7-1366ure_firmwareceleron_n2807celeron_g540t_firmwarecore_i5-1130g7_firmwareceleron_g3902ecore_i7-1366urepentium_gold_7505_firmwarecore_i5-8300h_firmwarecore_i3-1220pepentium_gold_8505_firmwarecore_i7-8565ucore_i7-1365ureceleron_n3350_firmwarepentium_gold_g6400e_firmwareceleron_1019yceleron_n2820core_i3-10300_firmwareceleron_b815pentium_gold_g5420tcore_i3-8100t_firmwarecore_i5-8259ucore_i9-11900fceleron_787_firmwareceleron_g5900tcore_i7-11600hcore_i9-12900f_firmwarecore_i9-12900hk_firmwarepentium_gold_g5500core_i7-1370pecore_i7-13700kf_firmwarecore_i7-8850h_firmwareceleron_2980u_firmwarecore_i7-9700kf_firmwareceleron_g460_firmwarecore_i3-10105core_i7-9850h_firmwarepentium_gold_g6405_firmwareceleron_b830core_i3-13100celeron_b810e_firmwarepentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwareceleron_n3700_firmwarecore_i9-10900k_firmwarecore_i9-12900e_firmwarecore_i7-1280p_firmwarecore_i5-1350p_firmwareceleron_g540atom_x6211ecore_i7-1185g7_firmwareceleron_g530t_firmwarecore_i5-11320hceleron_b810celeron_j4115_firmwarecore_i3-10300t_firmwarecore_i7-13700hxcore_i5-9300hpentium_gold_g6500core_i5-13450hx_firmwareceleron_n4000c_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i7-10610uceleron_g540tcore_i5-1035g1_firmwarecore_i7-12850hx_firmwarecore_i7-8665u_firmwareceleron_g1620core_i5-9400hcore_i7-8500ycore_i9-9900tcore_i9-13900hxceleron_1037u_firmwarecore_i7-9700e_firmwarecore_i3-13100f_firmwarecore_i9-12900tecore_i7-12700kf_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n3060_firmwareceleron_3955ucore_i7-9700k_firmwareceleron_n4000celeron_n2830core_i5-13500hxceleron_7300core_i5-1145g7e_firmwarecore_i3-12100te_firmwarecore_i7-12800hcore_i3-10300tcore_i3-8100b_firmwareceleron_n3450celeron_n5100celeron_n2805_firmwarecore_i9-8950hk_firmwareceleron_g3930_firmwarecore_i7-1265ue_firmwarecore_i5-13600k_firmwareceleron_j6412pentium_j6425_firmwarepentium_gold_g6600celeron_n2810atom_x6200feceleron_g1610tcore_i5-8265ucore_i9-13905hcore_i5-13400t_firmwarecore_i7-13700k_firmwarepentium_gold_g6605celeron_g470_firmwareceleron_g5925atom_x6413e_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarecore_i5-13600hceleron_g3920_firmwarecore_i7-10700_firmwareceleron_g530tcore_i3-8350kcore_i5-13500_firmwarecore_i7-1365ue_firmwarecore_i3-9100core_i9-12900hxcore_i5-9600k_firmwarecore_i5-1250pcore_i7-12700h_firmwarepentium_gold_g5600celeron_j4125core_i5-1145gre_firmwarecore_i3-1215ue_firmwareceleron_g4950_firmwareceleron_j1750core_i7-8705gcore_i5-9500eceleron_7305lcore_i5-12450h_firmwarecore_i7-8706gcore_i7-12700hcore_i5-12500t_firmwarecore_i9-9880h_firmwarecore_i7-8700t_firmwarecore_i7-1185grepentium_gold_4415u_firmwarecore_i7-11375hcore_i3-13300hrecore_i5-12600hx_firmwareceleron_n6210core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarecore_i7-13800hre_firmwarecore_i7-8700atom_x6200fe_firmwarecore_i5-1245ue_firmwarecore_i7-8705g_firmwareceleron_b840_firmwarecore_i9-10900te_firmwarepentium_gold_8500core_i7-10700tceleron_g5205u_firmwarecore_i5-10210ucore_i5-12450hcore_i5-8257ucore_i7-8700kcore_i5-12500tecore_i7-1260pcore_i5-1345urepentium_gold_g6405tcore_i5-1155g7_firmwareceleron_n2830_firmwarecore_i7-10510u_firmwarecore_i5-13600he_firmwareceleron_g1610_firmwareceleron_3867u_firmwareceleron_g440_firmwarecore_i3-10100_firmwareceleron_2000ecore_i5-10505celeron_725ccore_i5-1030g7pentium_gold_g7400e_firmwarecore_i5-1345ure_firmwarecore_i7-8569u_firmwarepentium_n6415core_i7\+8700_firmwarecore_i3-13300hecore_i7-1185g7e_firmwareceleron_g1620t_firmwareceleron_g1820_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i9-12900fcore_i7-11800hceleron_1000m_firmwarecore_i5-12400celeron_867_firmwarecore_i5-10310u_firmwareceleron_g465_firmwareceleron_g4900t_firmwarecore_i3-10105fcore_i3-9100hl_firmwarecore_i3-8100hceleron_n4020c_firmwarepentium_gold_4415ycore_i5-13600t_firmwarecore_i9-11950hceleron_g5900tecore_i5-10300hcore_i7-13850hxcore_i5-1345ueceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_j3455_firmwarecore_i3-12300he_firmwareceleron_g550_firmwarecore_i5-8500tceleron_1017u_firmwarecore_i7-12700hl_firmwareceleron_n2910celeron_j1800_firmwarepentium_gold_g7400_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kceleron_877core_i5-8350u_firmwareceleron_g1820tceleron_g3930ecore_i9-10850kpentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarecore_i9-9900ks_firmwarecore_i7-12700tepentium_gold_g6400tceleron_1019y_firmwarecore_i3-9300_firmwarecore_i5-8400tpentium_gold_g5600tceleron_g3930tcore_i7-10700core_i7-11600h_firmwarecore_i3-9100te_firmwareceleron_g550tceleron_j4105_firmwarecore_i7-10750h_firmwareceleron_847_firmwareceleron_3965uceleron_g4920_firmwarecore_i5-1240p_firmwarecore_i3-10105tatom_x6211e_firmwarecore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i7-13700hcore_i9-12950hxcore_i3-12100ecore_i9-12900kscore_i7-10875hcore_i5-13500t_firmwarecore_i5-1340peceleron_n3350e_firmwarecore_i7-1370prepentium_gold_g5400_firmwarecore_i7-12700te_firmwarecore_i9-11900k_firmwareceleron_6305_firmwarecore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwareceleron_j1900celeron_6305core_i5-9400core_i3-8100tceleron_n4505core_i3-13100t_firmwarecore_i5-13400_firmwarecore_i7-12700fcore_i3-1210u_firmwareceleron_g4930t_firmwarecore_i5-13600hecore_i9-12900core_i7-8650ucore_i5-13500tcore_i9-13900_firmwarecore_i9-10900e_firmwarecore_i5-1145greatom_x6414recore_i5-1340pcore_i7-9750h_firmwarecore_i7-12700t_firmwarecore_i5-1345u_firmwareatom_x6425re_firmwarepentium_gold_g4620_firmwarecore_i7-13700te_firmwareceleron_j1850_firmwarepentium_gold_4415ucore_i5-1038ng7core_i9-13900h_firmwarecore_i5-11260h_firmwarecore_i7-10700e_firmwareceleron_g1850_firmwarecore_i3-10110y_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i5-8500bcore_i7-1185g7core_i7-1195g7core_i7-12700_firmwarecore_i7-13850hx_firmwarecore_i7-13800hrecore_i5-8269uceleron_927ue_firmwarecore_i5-12400f_firmwareceleron_n3520celeron_b810ecore_i7-10700tecore_i5-1350peceleron_n3000core_i7-1355u_firmwarecore_i9-13900fcore_i7-8709g_firmwarecore_i3-13100tcore_i7-11700_firmwarecore_i9-13900hx_firmwarecore_i7-1265ulceleron_n4100_firmwarecore_i5-10500e_firmwareceleron_1007uceleron_867celeron_g3900tcore_i5-11500he_firmwarecore_i5-8279u_firmwarecore_i5-1145g7_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarecore_i5-10210y_firmwarecore_i5-13400e_firmwarecore_i7-1250u_firmwarecore_i5-13600kfcore_i5-8250uatom_x6425recore_i3-10305celeron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700tcore_i5-12600hl_firmwarecore_i9-12900ks_firmwarecore_i5-1230u_firmwareceleron_n3450_firmwarecore_i3-1215u_firmwarecore_i3-1315u_firmwarecore_i5-13500hx_firmwareceleron_n2805core_i7-8650u_firmwarecore_i7-1365ure_firmwareceleron_j1750_firmwareceleron_4305uecore_i3-9350kfcore_i9-9900k_firmwareceleron_b820_firmwareceleron_g3902e_firmwarecore_i3-1115g4e_firmwareceleron_g530core_i5-1130g7core_i5-12400t_firmwarecore_i5-13500eceleron_1020m_firmwareceleron_4205u_firmwarecore_i5-1245ucore_i5-8365u_firmwarecore_i5-10500hceleron_2950mcore_i3-9300tcore_i3-8100h_firmwarecore_i3-1115g4_firmwareceleron_j6413core_i3-1320pre_firmwarecore_i7-10875h_firmwarecore_i5-10500t_firmwareceleron_j4005_firmwarecore_i5-8265u_firmwarecore_i7-12800h_firmwareceleron_j3060_firmwarecore_i7-1375pre_firmwarecore_i9-13900kpentium_gold_g6400eceleron_g5305u_firmwareceleron_n2920atom_x6413epentium_gold_7505core_i5-10600celeron_g3930te_firmwarecore_i3-12100tecore_i3-1115g4ecore_i7\+8700celeron_3755u_firmwarecore_i9-12900hcore_i5-13500core_i3-9350kceleron_7300_firmwarecore_i5-8500_firmwarecore_i5-13600kf_firmwarecore_i7-13700hx_firmwarecore_i9-11980hk_firmwarecore_i7-8665ueceleron_g4950celeron_6305eceleron_j3455ecore_i5-1145g7ecore_i7-1265u_firmwarecore_i5-11500heceleron_g5900e_firmwarecore_i3-10320core_i5-8200yceleron_g3900t_firmwareceleron_g470core_i5-12600kfceleron_n4020celeron_g4900_firmwareceleron_g1620tpentium_gold_g6405u_firmwarecore_i7-8569ucore_i5-13500te_firmwareceleron_g3900eceleron_g1820teceleron_g3950_firmwarecore_i5-10500tcore_i7-13700t_firmwarecore_i7-12850hxcore_i5-1350pcore_i7-1185g7ecore_i7-1265ul_firmwarecore_i9-13900ks_firmwareceleron_j3355_firmwarecore_i5-12600hxcore_i3-8100bcore_i5-9600tcore_i5-12600_firmwarecore_i3-9320core_i5-11400celeron_n2910_firmwarecore_i7-1065g7core_i5-13500h_firmwareceleron_g440core_i9-10900tecore_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230ucore_i3-8130ucore_i7-13700f_firmwareceleron_2957ucore_i5-13600hx_firmwarecore_i3-9100_firmwareceleron_847eceleron_3955u_firmwareceleron_n4504_firmwareceleron_g1620_firmwareceleron_g550core_i7-11370h_firmwareceleron_j1900_firmwarecore_i3-13300he_firmwarecore_i7-1160g7core_i3-10105f_firmwarecore_i9-13900k_firmwarepentium_gold_g5420core_i7-9700kfcore_i7-13700kfpentium_gold_g5420t_firmwarecore_i5-8305g_firmwarecore_i3-13100e_firmwarecore_i7-10870h_firmwarecore_i5-8400hceleron_j1850core_i7-1260uceleron_b815_firmwarepentium_gold_g5420_firmwarecore_i3-1110g4_firmwarecore_i3-1110g4core_i5-12500tcore_i5-10200hcore_i9-13900eceleron_g3920t_firmwarecore_i3-10100f_firmwarepentium_gold_g4560_firmwarecore_i5-12500hcore_i3-8145ucore_i7-11700core_i3-1220pcore_i5-9600_firmwarecore_i3-8109ucore_i5-1250pe_firmwarecore_i3-12300t_firmwarecore_i9-11900tcore_i7-9700f_firmwareceleron_n4500core_i7-1195g7_firmwarecore_i5-9500e_firmwarecore_i7-11850hcore_i5-12600hcore_i9-11900core_i7-12800hxcore_i5-10600_firmwarecore_i3-9100hlceleron_g550t_firmwareceleron_n3150core_i7-12700eceleron_n5100_firmwarecore_i3-12100tcore_i5-8400bcore_i7-13800he_firmwarecore_i3-9300t_firmwarecore_i7-10610u_firmwarecore_i9-13900hkcore_i5-9500_firmwarecore_i5-1240pcore_i5-12500pentium_gold_g5620core_i5-13600hre_firmwareceleron_1020e_firmwarecore_i7-11850hecore_i7-13650hxcore_i5-8400h_firmwareceleron_n4120pentium_gold_g7400te_firmwarecore_i3-9100tepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i5-1350pe_firmwarecore_i5-13420h_firmwareceleron_g3930tepentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kceleron_n2840core_i5-10400t_firmwarecore_i3-8100core_i9-13900kfcore_i9-11900hcore_i3-11100hecore_i7-1370pre_firmwarecore_i7-12700core_i5-1235u_firmwareceleron_3855u_firmwarecore_i7-11700k_firmwarepentium_gold_g6505t_firmwarecore_i9-13950hxcore_i5-13500e_firmwareceleron_2955uceleron_5205u_firmwarecore_i7-1160g7_firmwareceleron_6305e_firmwarecore_i7-8700_firmwareceleron_g3900_firmwarecore_i5-8365uceleron_g6900t_firmwareceleron_j3060core_i5-9600kfcore_i9-13900f_firmwarecore_i5-8500b_firmwareceleron_n3160core_i3-10100teceleron_7305core_i7-1255ul_firmwareceleron_g6900_firmwareceleron_g4930core_i7-10700fcore_i5-12400tcore_i5-1030g4_firmwareceleron_725c_firmwarecore_i5-12400_firmwarecore_i7-8557u_firmwarepentium_gold_g4600_firmwareceleron_n4000ccore_i5-1145g7core_i7-1068ng7_firmwarecore_i7-10750hceleron_3867ucore_i3-8300atom_x6427fecore_i9-13980hxcore_i3-1220pe_firmwareceleron_g4932e_firmwarecore_i5-13420hcore_i7-1360pcore_i5-12500e_firmwarecore_i7-8700bcore_i9-12950hx_firmwareceleron_j1800core_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-12650hcore_i3-1215ucore_i5-10210ycore_i5-1140g7core_i7-13650hx_firmwarecore_i5-12500hlcore_i3-1215ul_firmwarecore_i9-9900kf_firmwarecore_i5-9500fcore_i5-10210u_firmwareceleron_807uecore_i5-10600tcore_i7-9850hecore_i7-1375precore_i7-10700ecore_i5-1245uecore_i5-12600hlceleron_g4930epentium_gold_4410ycore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600pentium_gold_g6500t_firmwarecore_i3-1315upentium_gold_g7400tecore_i3-9100fceleron_827e_firmwarecore_i9-11900_firmwarepentium_gold_g5600t_firmwarecore_i3-12300hl_firmwarecore_i7-9750hfpentium_gold_6405uceleron_n3350core_i5-9300h_firmwarecore_i7-12700k_firmwarecore_i7-10700kceleron_g1820core_i9-12900k_firmwareceleron_g5925_firmwarecore_i9-12900kcore_i3-9320_firmwarecore_i3-13100fcore_i5-8400b_firmwarecore_i3-8100_firmwarecore_i7-11700kceleron_g555_firmwarecore_i3-1215ulcore_i3-12100_firmwarecore_i9-9880hcore_i3-13100ecore_i7-10710ucore_i5-8500t_firmwarecore_i7-10700kfcore_i3-11100he_firmwarecore_i7-1255u_firmwareceleron_g6900tcore_i7-13700teceleron_1047ueceleron_877_firmwarepentium_gold_g4560core_i9-13900tecore_i7-12800hecore_i9-13900hk_firmwarecore_i7-8706g_firmwarecore_i9-13900e_firmwarecore_i9-11900t_firmwareceleron_n4500_firmwareceleron_827epentium_gold_4415y_firmwarecore_i9-9900celeron_j3355e_firmwarecore_i7-10510y_firmwarecore_i5-12600core_i3-10100e_firmwarecore_i7-9850hl_firmwarecore_i7-11390h_firmwareceleron_n2806core_i3-13100_firmwareceleron_3765ucore_i3-8140ucore_i5-1038ng7_firmwareceleron_g5905tceleron_797core_i3-10100te_firmwarecore_i5-12400fcore_i5-1340pe_firmwarecore_i3-1120g4_firmwarecore_i5-13600tceleron_g1840_firmwarecore_i7-8550ucore_i7-13705hceleron_n3010core_i3-9100tceleron_j4025celeron_b820core_i5-8310y_firmwareceleron_g460core_i5-12600h_firmwareceleron_857core_i5-1235ulpentium_gold_4425yceleron_3205u_firmwarecore_i3-1320precore_i7-11375h_firmwarecore_i5-1335ueceleron_847core_i9-10900_firmwarecore_i5-10505_firmwarecore_i5-1334u_firmwareceleron_g6900tecore_i3-12300tcore_i9-12900t_firmwareceleron_g3900e_firmwarecore_i3-8145u_firmwarecore_i9-12900kfceleron_n3160_firmwareceleron_3755ucore_i3-1305ucore_i5-11260hcore_i3-1315urecore_i3-12100f_firmwarecore_i5-10300h_firmwarecore_i7-11850h_firmwareceleron_n2820_firmwareceleron_g3920tcore_i5-8210yceleron_n6211core_i7-8750h_firmwarecore_i5-10200h_firmwareceleron_1007u_firmwarecore_i9-11900f_firmwareceleron_2955u_firmwareceleron_2980uceleron_n6210_firmwarecore_i7-11700t_firmwareceleron_n6211_firmwareceleron_857_firmwareceleron_n3010_firmwarecore_i5-12600kf_firmwarecore_i5-13400fcore_i3-9100f_firmwarecore_i7-1185gre_firmwarepentium_gold_g6400_firmwarecore_i5-1350pre_firmwarecore_i5-11500core_i5-1135g7core_i5-8500core_i5-9500te_firmwarecore_i7-13800heceleron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarecore_i7-9750hceleron_n4020ccore_i7-12700f_firmwarepentium_gold_g6405core_i7-13700fceleron_787core_i3-10305tcore_i9-9900t_firmwarepentium_gold_g7400t_firmwarepentium_gold_g5500_firmwarecore_i5-13450hxcore_i7-13620hatom_x6212recore_i7-8665uceleron_n2940_firmwarecore_i3-8300tcore_i7-11700fcore_i7-12650hxceleron_b810_firmwarepentium_gold_g5620_firmwarecore_i7-10850hcore_i3-1210ucore_i3-1125g4_firmwareceleron_g1820t_firmwarecore_i7-11800h_firmwareceleron_g5905celeron_g3950celeron_2981ucore_i5-8400celeron_j4115celeron_7305l_firmwarecore_i3-10300core_i7-13705h_firmwarecore_i5-1140g7_firmwareceleron_n2930_firmwarecore_i7-8086kcore_i3-1320pe_firmwarepentium_gold_g5500t_firmwarepentium_gold_5405u_firmwareceleron_807core_i5-8365ue_firmwarecore_i5-1240u_firmwarecore_i5-12500h_firmwarecore_i9-11900kf_firmwareceleron_b710celeron_n2940core_i5-1335ucore_i5-8600k_firmwareceleron_b710_firmwarecore_i7-13800hceleron_j3455celeron_n5095_firmwareceleron_887_firmwareceleron_n2807_firmwarecore_i5-10310y_firmwarecore_i7-13700h_firmwarepentium_gold_4417ucore_i7-12700hlcore_i3-1000g1core_i7-10510yceleron_j3160core_i7-12700kcore_i5-8210y_firmwarecore_i9-13900te_firmwareceleron_n3150_firmwarecore_i3-9100e_firmwarecore_i7-1255ulceleron_g3900core_i5-9600kceleron_g5905t_firmwarecore_i3-10305t_firmwareceleron_n3520_firmwarecore_i3-12300hlceleron_7305e_firmwareceleron_n5105_firmwarecore_i5-1335ue_firmwarecore_i9-10900f_firmwarecore_i3-13100te_firmwarecore_i7-1270pecore_i9-12900hkcore_i9-12900ecore_i5-1155g7core_i3-9100t_firmwarecore_i5-11320h_firmwarecore_i9-12900_firmwareceleron_3215ucore_i3-1220p_firmwareceleron_g5900celeron_1005mcore_i5-8350uceleron_n4000_firmwareceleron_2950m_firmwareceleron_g1830_firmwarecore_i7-11700tcore_i3-13100teceleron_g3930celeron_g3930t_firmwarecore_i3-10100y_firmwareceleron_3965y_firmwareceleron_n2806_firmwarecore_i5-11400h_firmwarecore_i9-12900hx_firmwareceleron_g5900ecore_i5-13400ecore_i3-12100e_firmwarecore_i7-8700b_firmwarecore_i5-13600core_i9-8950hkcore_i9-10900ecore_i5-9300hf_firmwarecore_i7-12800hx_firmwarecore_i3-12100fceleron_g555celeron_b720_firmwarecore_i9-10885hpentium_j6425core_i3-1320peceleron_g1840t_firmwareceleron_g1840core_i3-12300hecore_i5-12500ecore_i3-9300celeron_1037ucore_i3-9350kf_firmwarecore_i9-9900kceleron_4305ue_firmwarecore_i9-12900tceleron_g1630core_i7-8709gceleron_j4025_firmwarepentium_gold_4417u_firmwarecore_m3-8100y_firmwarecore_i7-1355ucore_i3-12100core_i5-1335u_firmwarecore_i7-8557uceleron_g4930_firmwarecore_i5-9500tceleron_g1610core_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwareceleron_n2810_firmwarecore_i5-11400fcore_i5-11500_firmwarecore_i7-13700ecore_i7-1180g7celeron_2970m_firmwarecore_i5-13505hcore_i3-1215ueceleron_6600heceleron_n3700pentium_gold_g7400core_i9-11950h_firmwarecore_i9-13900core_i9-13900hceleron_2961y_firmwarecore_i5-1035g1core_i7-1370p_firmwarecore_i7-8565u_firmwareceleron_7305_firmwarepentium_gold_4425y_firmwarecore_i5-11400f_firmwarecore_i9-12900kf_firmwarecore_i7-12800hlceleron_b830_firmwarecore_i5-1250p_firmwarecore_i7-1165g7celeron_n3050celeron_n5095core_i5-11600katom_x6427fe_firmwarecore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4pentium_gold_8500_firmwarecore_i3-9100ecore_i3-12100t_firmwarecore_i5-10500celeron_b800atom_x6425eceleron_3965u_firmwareceleron_g3930e_firmwarecore_i5-1350precore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarecore_i5-13400f_firmwarecore_i7-1265uceleron_2981u_firmwarecore_i5-8279ucore_i3-8130u_firmwareceleron_g3920core_i5-13400core_i5-9300hfceleron_g1850pentium_gold_g6505_firmwarecore_i5-11400hcore_i7-13700e_firmwarecore_i3-8140u_firmwarecore_i3-1000g4_firmwarecore_i5-11400_firmwarecore_i7-1360p_firmwarecore_i7-9850hlceleron_g1840tcore_i7-13700kcore_i7-1255ucore_i5-13600_firmwarecore_i3-1315ueceleron_1017ucore_i9-11980hkcore_i5-10600kceleron_g5205uceleron_847e_firmwarecore_i3-1315ue_firmwarecore_m3-8100ycore_i7-1165g7_firmwarecore_i5-8250u_firmwarecore_i9-10900kfceleron_n4120_firmwarecore_i7-9700epentium_gold_g4620core_i5-8400_firmwareceleron_n3350ecore_i3-1120g4core_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwareceleron_4305u_firmwarecore_i7-12700tceleron_g540_firmwarecore_i5-8260ucore_i9-13900t_firmwareceleron_n2808celeron_b840core_i3-10100t_firmwarecore_i7-10810u_firmwarecore_i9-10900t_firmwarecore_i3-12300core_i5-11600kf_firmwarecore_i5-12450hx_firmwarecore_i5-1340p_firmwarecore_i7-10810ucore_i5-10400f_firmwarecore_i7-11700kf_firmwarecore_i5-12600kcore_i3-10105_firmwareceleron_j3160_firmwarecore_i3-1115greceleron_g5900te_firmwarecore_i7-8850hceleron_807ue_firmwareceleron_j3455e_firmwarecore_i5-11500hcore_i3-10100fcore_i3-8300_firmwareceleron_g4930tatom_x6425e_firmwarecore_i7-1365uecore_i7-12700kfcore_i7-1065g7_firmwarecore_i9-9900_firmwarecore_i5-1135g7_firmwarecore_i5-12500_firmwareceleron_n2815_firmwarecore_i5-8257u_firmwarecore_i9-10900kf_firmwareceleron_7305ecore_i5-11600t_firmwarecore_i5-12450hxceleron_g530_firmwarecore_i9-10850k_firmwareceleron_n4020_firmwarecore_i5-8365uecore_i7-8809g_firmwarecore_i9-10885h_firmwarecore_i5-1235uceleron_1000mcore_i7-12650hx_firmwarecore_i9-9980hk_firmwarecore_i5-1240uceleron_g4900core_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i9-10900tpentium_gold_g5400core_i7-1365ucore_i3-1305u_firmwarecore_i5-8310ycore_i3-1315ure_firmwarecore_i3-10110u_firmwarecore_i5-9500teceleron_2957u_firmwareceleron_2000e_firmwarecore_i5-9500t_firmwarecore_i7-9700te_firmwareceleron_3765u_firmwarecore_i3-10320_firmwareceleron_3965ypentium_gold_5405uceleron_g3900tecore_i3-1005g1celeron_j4005core_i9-13950hx_firmwareceleron_3855ucore_i5-8600tcore_i5-8305gcore_i7-10850h_firmwarecore_i5-9400t_firmwareceleron_g6900ecore_i7-8559ucore_i9-9980hkcore_i5-13600hreceleron_g6900te_firmwareceleron_g6900e_firmwarecore_i7-9700_firmwarepentium_gold_6500ypentium_gold_g6400core_i5-1334ucore_i7-1270pe_firmwareIntel(R) Processors
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-44611
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 9.90%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_w-1350_firmwarecore_i3-9100_firmwarecore_i7-11850he_firmwarecore_i7-11370h_firmwarexeon_e-2378gcore_i7-1068ng7core_i7-1160g7core_i5-1035g7core_i3-10105f_firmwarecore_i3-8350k_firmwarecore_i3-9350k_firmwarexeon_e-2124g_firmwarecore_i7-9700kfcore_i5-8305g_firmwarexeon_e-2314xeon_e-2254me_firmwarecore_i7-10870h_firmwarecore_i5-8400hpentium_n6415_firmwarexeon_e-2276me_firmwarecore_i3-1110g4_firmwarecore_i5-11600_firmwarecore_i3-1110g4core_i7-1060g7_firmwarecore_i7-9700core_i5-10200hxeon_e-2226gcore_i9-9900kfcore_i3-10100f_firmwarecore_i5-1035g4core_i3-8145ucore_i5-10400hcore_i7-10700k_firmwarecore_i7-11700xeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i3-10100ycore_i7-9700tecore_i5-10400tcore_i3-8109ucore_i7-11370hcore_i5-10310ucore_i5-9400f_firmwarecore_i9-11900txeon_e-2224xeon_e-2186m_firmwarecore_i7-10700t_firmwarecore_i7-9700f_firmwarecore_i7-1195g7_firmwarecore_i5-9500e_firmwarecore_i5-11600txeon_e-2378core_i7-11850hcore_i5-8269u_firmwarecore_i9-11900xeon_e-2278gexeon_e-2134_firmwarecore_i5-10600_firmwarecore_i3-9100hlcore_i5-10400core_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarecore_i7-10710u_firmwarecore_i5-10500tecore_i5-9500_firmwarecore_i7-11850hecore_i5-11600core_i5-8400h_firmwarecore_i3-9100tecore_i7-9700fcore_i9-10980hkcore_i5-8600xeon_e-2136core_i7-9700kcore_i7-10510ucore_i5-9400_firmwarecore_i5-10400t_firmwarecore_i7-8500y_firmwarecore_i3-10100ecore_i3-8100core_i7-1060g7core_i9-11900hcore_i9-10900core_i5-11600k_firmwarexeon_w-1390p_firmwarecore_i3-11100hexeon_e-2374g_firmwarecore_i3-10100txeon_w-1390t_firmwarecore_i7-11700k_firmwarecore_i9-10900kcore_i3-10325_firmwarexeon_e-2386gcore_i5-8600kcore_i7-10700te_firmwarecore_i7-8700k_firmwarecore_i9-10900fxeon_e-2124_firmwarecore_i5-11500t_firmwarecore_i7-8700_firmwarecore_i7-1160g7_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i5-8365uxeon_e-2226ge_firmwarecore_i5-9600kfcore_i5-8500b_firmwarecore_i3-10100tecore_i5-10400_firmwarecore_i3-1115gre_firmwarecore_i7-10700fxeon_e-2286mcore_i5-1030g4_firmwarecore_i7-9850he_firmwarecore_i7-8557u_firmwarecore_i7-1180g7_firmwarecore_i5-1145g7core_i3-1125g4core_i7-1068ng7_firmwarecore_i7-10750hxeon_e-2276gxeon_w-1390core_i3-8300core_i3-1000g4xeon_e-2186gatom_x6427fexeon_e-2174gceleron_j6413_firmwarecore_i7-8809gcore_i3-8145uecore_i5-10400h_firmwarecore_i7-8700bcore_i5-10500_firmwarecore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarexeon_e-2334_firmwarecore_i5-10210ycore_i5-1140g7core_i5-10500ecore_i9-9900kf_firmwarecore_i5-9400tcore_i5-9500fcore_i5-10210u_firmwarecore_i5-8300hcore_i5-8600t_firmwarecore_i5-10600tcore_i7-9850hexeon_e-2356gcore_i3-10110yatom_x6414re_firmwarecore_i5-10600kfcore_i7-10700ecore_i5-11600kfcore_i9-9900kscore_i5-10500h_firmwarecore_i5-9600core_i7-11700kfcore_i7-10870hcore_i5-8600_firmwarecore_i3-9100fcore_i5-9600kf_firmwarecore_i9-11900_firmwareatom_x6212re_firmwarexeon_e-2224_firmwarecore_i7-9750hfcore_i5-9300h_firmwarexeon_e-2274gcore_i7-10700kcore_i5-11500tcore_i5-9500core_i3-9320_firmwarexeon_e-2278gelcore_i3-8145ue_firmwarecore_i5-10500te_firmwarecore_i5-8400b_firmwarecore_i3-8100_firmwarecore_i7-11700kcore_i5-1130g7_firmwarexeon_e-2124core_i9-9880hcore_i7-10710ucore_i5-8500t_firmwarexeon_w-1350p_firmwarecore_i7-10700kfcore_i3-11100he_firmwarecore_i5-8300h_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e-2276mecore_i7-8565uxeon_e-2274g_firmwarecore_i3-10300_firmwarecore_i7-8706g_firmwarecore_i9-11900t_firmwarecore_i3-8100t_firmwarecore_i5-8259ucore_i9-11900fcore_i9-9900core_i7-10510y_firmwarecore_i7-9850hl_firmwarecore_i3-10100e_firmwarecore_i7-11600hcore_i7-11390h_firmwarexeon_e-2146g_firmwarecore_i7-8850h_firmwarecore_i3-8140ucore_i5-1038ng7_firmwarexeon_e-2336xeon_e-2388gcore_i7-9700kf_firmwarecore_i3-10105core_i7-9850h_firmwarecore_i3-10100te_firmwarecore_i3-1120g4_firmwarecore_i9-10900k_firmwarexeon_e-2278g_firmwarecore_i7-8550uxeon_e-2276ml_firmwarexeon_e-2224gatom_x6211ecore_i3-9100tcore_i7-1185g7_firmwarecore_i5-8310y_firmwarecore_i5-11320hxeon_e-2226gecore_i3-10300t_firmwarecore_i5-9300hcore_i7-11375h_firmwarecore_i9-10900_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i7-10610ucore_i5-10505_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarexeon_e-2176g_firmwarecore_i7-8500ycore_i5-9400hcore_i9-9900tcore_i3-8145u_firmwarexeon_w-1390pcore_i5-11260hcore_i7-9700e_firmwarecore_i5-10300h_firmwarecore_i7-11850h_firmwarecore_i5-8210yceleron_n6211core_i7-8750h_firmwarecore_i5-10200h_firmwarecore_i9-11900f_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n6211_firmwarecore_i7-11700t_firmwarecore_i7-9700k_firmwarexeon_e-2288g_firmwarecore_i3-9100f_firmwarecore_i5-1145g7e_firmwarexeon_e-2246g_firmwarecore_i7-1185gre_firmwarexeon_e-2176m_firmwarecore_i3-10300txeon_e-2174g_firmwarecore_i3-8100b_firmwarecore_i5-11500core_i5-1135g7core_i9-8950hk_firmwarecore_i5-8500core_i5-9500te_firmwarepentium_j6425_firmwareatom_x6200fecore_i5-8265ucore_i7-10700kf_firmwarexeon_e-2254mecore_i7-9750hxeon_e-2336_firmwareatom_x6413e_firmwarexeon_e-2286g_firmwarecore_i3-10305tcore_i3-8350kcore_i7-10700_firmwarecore_i5-9600k_firmwarecore_i9-9900t_firmwarecore_i3-9100xeon_e-2224g_firmwarecore_i5-1145gre_firmwareatom_x6212rexeon_e-2276mcore_i7-8705gcore_i7-8665ucore_i5-9500ecore_i3-8300tcore_i7-8706gcore_i7-11700fxeon_e-2236core_i9-9880h_firmwarexeon_w-1370core_i7-8700t_firmwarecore_i7-10850hxeon_e-2236_firmwarecore_i7-1185grecore_i3-1125g4_firmwarecore_i7-11375hxeon_e-2126g_firmwarecore_i7-11800h_firmwarecore_i7-8700core_i5-8259u_firmwarecore_i5-10400fcore_i7-8665ue_firmwarecore_i5-8400atom_x6200fe_firmwarecore_i7-8705g_firmwarecore_i9-10900te_firmwarecore_i3-10300core_i7-10700tcore_i5-1140g7_firmwarecore_i7-8086kcore_i5-10210ucore_i5-8257ucore_i5-8365ue_firmwarecore_i7-8700kcore_i9-11900kf_firmwarecore_i5-1155g7_firmwarecore_i5-8600k_firmwarecore_i7-10510u_firmwarexeon_e-2134xeon_e-2226g_firmwarecore_i3-10100_firmwarecore_i5-10505xeon_w-1390tcore_i5-1030g7core_i5-10310y_firmwarecore_i7-8569u_firmwarepentium_n6415core_i7\+8700_firmwarexeon_e-2144g_firmwarecore_i3-1000g1core_i7-10510ycore_i7-1185g7e_firmwarecore_i5-10600kf_firmwarecore_i5-8210y_firmwarecore_i3-10110ucore_i7-11800hcore_i3-9100e_firmwarecore_i5-9600kcore_i3-10305t_firmwarecore_i5-10310u_firmwarecore_i9-10900f_firmwarecore_i3-9100hl_firmwarecore_i3-10105fcore_i5-1155g7core_i3-8100hcore_i3-9100t_firmwarecore_i5-11320h_firmwarecore_i9-11950hxeon_e-2386g_firmwarecore_i5-10300hcore_i5-8350ucore_i3-1005g1_firmwarecore_i7-11700txeon_e-2246gcore_i5-8500tcore_i3-10100y_firmwarecore_i5-11400h_firmwarecore_i5-11500h_firmwarecore_i9-11900kcore_i5-8350u_firmwarecore_i7-8700b_firmwarecore_i9-8950hkcore_i9-10900ecore_i9-10850kcore_i5-9300hf_firmwarexeon_e-2314_firmwarecore_i9-9900ks_firmwarexeon_e-2254mlcore_i5-8400tcore_i3-9300_firmwarecore_i7-10700core_i7-11600h_firmwarecore_i3-9100te_firmwarexeon_e-2254ml_firmwarecore_i7-10750h_firmwarexeon_e-2334core_i3-10105tcore_i9-10885hatom_x6211e_firmwarepentium_j6425core_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i3-9300core_i7-10875hxeon_e-2276mlxeon_e-2244gcore_i9-9900kcore_i3-9350kf_firmwarexeon_e-2176gxeon_e-2324gcore_i9-11900k_firmwarecore_i7-8709gcore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwarecore_i5-9400core_m3-8100y_firmwarecore_i3-8100tcore_i7-8557uxeon_e-2278ge_firmwarecore_i5-9500tcore_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwarecore_i7-8650ucore_i5-11400fcore_i5-11500_firmwarecore_i9-10900e_firmwarecore_i5-1145grexeon_e-2286m_firmwareatom_x6414recore_i7-1180g7xeon_e-2378g_firmwarecore_i7-9750h_firmwarexeon_w-1390_firmwareatom_x6425re_firmwarecore_i9-11950h_firmwarexeon_e-2234_firmwarecore_i5-1035g1core_i5-1038ng7core_i5-11260h_firmwarecore_i7-8565u_firmwarecore_i5-11400f_firmwarecore_i7-10700e_firmwarexeon_e-2186g_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarecore_i5-8500bcore_i7-1195g7core_i7-1185g7xeon_e-2124gcore_i7-1165g7core_i5-8269ucore_i5-11600katom_x6427fe_firmwarecore_i9-11900h_firmwarecore_i7-11390hcore_i5-1030g4core_i7-10700texeon_e-2288gcore_i3-9100exeon_e-2234core_i5-10500core_i7-8709g_firmwareatom_x6425ecore_i7-11700_firmwarexeon_e-2356g_firmwarecore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarecore_i5-10500e_firmwarecore_i5-11500he_firmwarecore_i5-8279ucore_i5-8279u_firmwarecore_i3-8130u_firmwarecore_i5-9500f_firmwarecore_i5-1145g7_firmwarecore_i5-10600t_firmwarecore_i5-9300hfcore_i5-10210y_firmwarecore_i5-11400hcore_i5-8250uatom_x6425recore_i3-8140u_firmwarecore_i3-10305core_i3-1000g4_firmwarexeon_e-2126gcore_i7-9700txeon_w-1370p_firmwarecore_i5-11400_firmwarecore_i7-9850hlcore_i7-8650u_firmwarecore_i9-11980hkcore_i5-10600kcore_i3-9350kfxeon_w-1370pxeon_e-2388g_firmwarecore_i9-9900k_firmwarecore_m3-8100ycore_i7-1165g7_firmwarecore_i5-8250u_firmwarecore_i9-10900kfxeon_e-2186mcore_i7-9700ecore_i3-1115g4e_firmwarecore_i5-8400_firmwarexeon_e-2176mcore_i5-1130g7core_i3-1120g4core_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwarexeon_e-2286gcore_i5-8365u_firmwarecore_i5-10500hcore_i5-8260ucore_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i3-10100t_firmwarecore_i5-11600kf_firmwarecore_i3-9300txeon_e-2244g_firmwarecore_i7-10810ucore_i5-10400f_firmwarecore_i3-8100h_firmwarecore_i7-11700kf_firmwarecore_i3-1115g4_firmwarecore_i3-10105_firmwareceleron_j6413xeon_w-1370_firmwarexeon_e-2278gcore_i7-10875h_firmwarecore_i3-1115grexeon_e-2378_firmwarecore_i7-8850hcore_i5-10500t_firmwarecore_i5-11500hcore_i5-8265u_firmwarexeon_e-2374gcore_i3-10100fcore_i3-8300_firmwareatom_x6425e_firmwarecore_i9-9900_firmwareatom_x6413ecore_i7-1065g7_firmwarecore_i5-1135g7_firmwarecore_i5-10600core_i7\+8700core_i5-8257u_firmwarecore_i3-1115g4ecore_i9-10900kf_firmwarexeon_w-1350core_i3-9350kcore_i5-8500_firmwarecore_i5-11600t_firmwarecore_i9-11980hk_firmwarecore_i9-10850k_firmwarecore_i5-8365uecore_i7-8665uecore_i7-8809g_firmwarecore_i9-10885h_firmwarecore_i5-1145g7ecore_i9-9980hk_firmwarecore_i5-11500hecore_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i3-10320core_i9-10900tcore_i5-8200ycore_i5-8310ycore_i3-10110u_firmwarecore_i5-9500texeon_e-2324g_firmwarexeon_e-2278gel_firmwarexeon_e-2144gxeon_w-1350pcore_i5-9500t_firmwarecore_i7-8569ucore_i7-9700te_firmwarecore_i5-10500tcore_i3-10320_firmwarecore_i7-1185g7ecore_i3-1005g1core_i3-8100bcore_i5-9600tcore_i3-9320core_i5-11400core_i7-10850h_firmwarecore_i7-1065g7core_i5-8600tcore_i5-8305gcore_i9-9980hkcore_i7-8559ucore_i5-9400t_firmwarecore_i9-10900tecore_i7-9700_firmwarecore_i9-10980hk_firmwarexeon_e-2146gcore_i3-8130uIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2022-21225
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8||HIGH
EPSS-0.21% / 43.05%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 00:00
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization in the Intel(R) Data Center Manager software before version 4.1 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managerIntel(R) Data Center Manager software
CVE-2022-26017
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8||HIGH
EPSS-0.35% / 56.77%
||
7 Day CHG-0.01%
Published-18 Aug, 2022 | 19:57
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) DSA software for before version 22.2.14 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-driver_\&_support_assistantIntel(R) DSA software for
CVE-2021-0126
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8||HIGH
EPSS-0.13% / 33.35%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for the Intel(R) Manageability Commander before version 2.2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-manageability_commanderIntel(R) Manageability Commander
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0101
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.14% / 34.63%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:00
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the BMC firmware for Intel(R) Server BoardM10JNP2SB before version EFI BIOS 7215, BMC 8100.01.08 may allow an unauthenticated user to potentially enable an escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-efi_bios_7215server_board_m10jnp2sbIntel(R) Server BoardM10JNP2SB
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8718
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.18% / 40.20%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:43
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8706
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.27% / 50.13%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:55
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-11178
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.1||HIGH
EPSS-0.75% / 72.19%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:37
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-0140
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.37% / 57.95%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:20
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow an unauthenticated user to potentially enable an escalation of privilege via an adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-0145
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.42%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:21
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel Corporation
Product-ethernet_controller_x710-at2_firmwarelinux_kernelethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-22661
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.09% / 26.86%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28741
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.09% / 26.07%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:06
Updated-02 Aug, 2024 | 13:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsquickassist_technology_libraryquickassist_technology_firmwarequickassist_technologyIntel(R) QAT drivers for Windows - HW Version 1.0
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8722
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.19% / 41.55%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:51
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-43507
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.08%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in the Intel(R) QAT Engine for OpenSSL before version 0.6.16 may allow a privileged user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technology_engineIntel(R) QAT Engine for OpenSSL
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-40261
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.03% / 6.62%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 17:35
Updated-28 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SMM memory corruption vulnerability in OverClockSmiHandler SMM driver

An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypasses SMM-based SPI flash protections against modifications, which can help an attacker to install a firmware backdoor/implant into BIOS. Such a malicious firmware code in BIOS could persist across operating system re-installs. Additionally, this vulnerability potentially could be used by malicious actors to bypass security mechanisms provided by UEFI firmware (for example, Secure Boot and some types of memory isolation for hypervisors). This issue affects: Module name: OverClockSmiHandler SHA256: a204699576e1a48ce915d9d9423380c8e4c197003baf9d17e6504f0265f3039c Module GUID: 4698C2BD-A903-410E-AD1F-5EEF3A1AE422

Action-Not Available
Vendor-AMIIntel Corporation
Product-nuc_m15_laptop_kit_lapbc510_firmwarenuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_lapbc710_firmwarenuc_m15_laptop_kit_lapbc710aptio_vAptio
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-12374
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 24.22%
||
7 Day CHG~0.00%
Published-19 Feb, 2021 | 15:17
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hns2600bpb24rr1304wftysrr2208wf0zsrr1208wftysr2208wftzsrr1304wf0ysr2312wf0nprhns2600bpbr1304wftyshns2600bpqr2224wfqzsr1000wfhns2600bpblc24rs2600bpqrhns2600bpbrs2600stqhns2600bpblcr2308wftzshns2600bpsrr1208wftysrr2208wf0zsr2208wftzsr2312wf0npr1208wfqysrr2224wftzsrr2208wfqzsrs2600stbr2224wftzsr2312wftzsrr2308wftzsrs2600wf0bmc_firmwarehns2600bps24rhns2600bpqrs2600wfqr2208wfqzshns2600bpshns2600bpq24rhns2600bpb24hns2600bps24r1304wf0ysrhns2600bpq24s2600wfts2600bpbrhns2600bpblc24s2600bpsrr2312wfqzsr2312wftzsIntel(R) Server Boards, Server Systems and Compute Modules
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-24498
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 20.16%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:41
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_e810-cqda1_for_ocp_3.0ethernet_network_adapter_e810-cqda1_for_ocpethernet_network_adapter_e810-cqda2ethernet_network_adapter_e810-xxvda2ethernet_network_adapter_e810-xxvda2_for_ocpethernet_network_adapter_e810-xxvda4ethernet_network_adapter_e810-cqda1ethernet_network_adapter_e810-xxvda2_for_ocp_3.0ethernet_network_adapter_e810_firmwareethernet_network_adapter_e810-cqda2_for_ocp_3.0Intel(R) E810 Ethernet Controllers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-24501
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.29% / 52.14%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:42
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_e810-cqda1_for_ocp_3.0ethernet_network_adapter_e810-cqda1_for_ocpethernet_network_adapter_e810-cqda2ethernet_network_adapter_e810-xxvda2ethernet_network_adapter_e810-xxvda2_for_ocpethernet_network_adapter_e810-xxvda4ethernet_network_adapter_e810-cqda1ethernet_network_adapter_e810-xxvda2_for_ocp_3.0ethernet_network_adapter_e810_firmwareethernet_network_adapter_e810-cqda2_for_ocp_3.0Intel(R) E810 Ethernet Controllers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-0115
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.17% / 38.15%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-core_i7-6870hqxeon_e-2286gatom_c3950core_i3-9100ecore_i3-10100xeon_silver_4109tcore_i3-7300core_i5-1038ng7core_i5-11400core_i9-7900xcore_i7-10510yxeon_d-1548xeon_bronze_3106xeon_platinum_8260yxeon_d-1633nxeon_d-1653nxeon_platinum_8153xeon_e-2246gcore_i5-6350hqcore_i9-9960xcore_i3-6300txeon_e-2374gxeon_gold_5218txeon_w-2123core_i5-11260hxeon_e-2236xeon_gold_5218nxeon_w-1270exeon_d-1531core_i5-6500tcore_i5-7500core_i5-6260uxeon_e-2278gecore_i5-7440hqxeon_platinum_8156core_i7-8709gatom_c3758xeon_d-2177ntxeon_gold_6142fxeon_silver_4214ycore_i9-11900kfxeon_w-10855mxeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_w-3235core_i9-10900txeon_e-2126gcore_i5-8200ycore_i7-10700tecore_i9-10900kxeon_gold_5220rcore_i5-8260ucore_i5-11400fxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-1185g7core_i7-9700kfcore_i9-10900xxeon_platinum_9221xeon_d-2142itcore_m7-6y75xeon_w-3335core_i9-11900kcore_i5-10500hxeon_w-11555mrecore_i5-10600kfxeon_e-2146gcore_i3-1005g1core_i7-1068ng7xeon_silver_4112xeon_gold_6140xeon_d-1637core_i5-9400fcore_i3-10100ecore_i7-6800kcore_i7-7560uatom_c3538core_i7-9700txeon_gold_5120xeon_gold_6238core_i5-11600kfcore_i5-7600tcore_i7-4820kxeon_d-1602core_i5-8365uatom_c3508xeon_w-2245core_i5-9600kfxeon_d-2145ntxeon_platinum_8256xeon_gold_6130fxeon_e-2276mxeon_e-2224gcore_i5-8269uxeon_d-2163itcore_i3-1120g4core_i7-3930kcore_i5-11400hcore_i9-11900hxeon_d-1623ncore_i7-1185g7ecore_i7-10810ucore_i3-10300txeon_d-1521core_i3-8100core_i3-8145uecore_i5-1130g7core_i9-11900core_i5-6585rcore_i5-9600kxeon_gold_6144core_i5-8265ucore_i7-10700tcore_i9-9900kfcore_i3-7100core_m5-6y54core_i5-6300hqxeon_gold_5118core_i5-1145g7core_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kxeon_silver_4114tcore_i5-8500bxeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_gold_6212ucore_i5-6600core_i3-8100hcore_i7-8706gcore_i3-6300core_i9-11900fxeon_silver_4215xeon_gold_6230ncore_i9-10920xcore_i9-11950hatom_c3750xeon_gold_6138pcore_i7-1195g7core_i5-10310ucore_i9-10885hcore_i7-8557ucore_i5-7440eqcore_i3-6320xeon_e-2386gcore_i7-1165g7core_m3-7y32core_i7-11850hexeon_e-2134xeon_w-1290tecore_i5-1145g7ecore_i5-6440eqcore_i5-1030g7core_i9-10980hkxeon_e-2176mxeon_w-11155mlexeon_gold_6130xeon_silver_4210txeon_e-2274gxeon_gold_6136core_i5-6287ucore_i7-8500yxeon_w-3323core_i5-9600tatom_c3558rcore_i9-7960xxeon_w-1370atom_c3808core_i5-9600xeon_d-1559xeon_gold_6134xeon_w-3375xeon_e-2174gcore_i5-8600txeon_d-1537xeon_gold_5218bxeon_gold_6128core_i7-1180g7xeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_gold_6146xeon_w-1370pxeon_gold_6254core_i3-10320xeon_gold_5218rcore_i3-10105fxeon_w-2235core_i3-6098pcore_i5-6400xeon_d-1649nxeon_w-3175xcore_i7-10875hxeon_w-3225core_i3-7101tecore_i7-7700xeon_d-1540core_i3-11100hecore_i5-10400hxeon_gold_6246rcore_i5-7300hqxeon_d-1513nxeon_w-10885mxeon_gold_6126xeon_d-1527core_i9-9940xcore_i9-9900xcore_i5-6600kcore_i9-7940xcore_i7-9700exeon_e-2254mecore_i7-9700tecore_i7-6700txeon_gold_6248rxeon_silver_4214xeon_w-2125xeon_platinum_9222core_i3-10105tcore_i5-11300hcore_i5-6500texeon_gold_5220sxeon_platinum_8260core_i5-6500core_i3-1000g4core_i3-9100hlcore_i9-10900kfcore_i3-10100tatom_c3858xeon_d-2146ntxeon_e-2144gcore_i9-9980hkxeon_w-11555mlecore_i5-11500hexeon_e-2244gcore_i3-7100tcore_i3-6102exeon_w-1390txeon_silver_4216core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqxeon_platinum_8180xeon_platinum_8276lxeon_gold_6138tcore_i7-7740xcore_i7-11375hcore_i7-7y75core_i7-8559ucore_i5-9500eatom_c3850core_i5-11500txeon_e-2124gcore_i7-4930kcore_i5-9400core_i7-4960xcore_i7-5960xcore_i7-6600uxeon_gold_6138core_i7-1185grecore_i3-10325xeon_gold_6138fxeon_e-2356gcore_i7-8700xeon_d-1557core_i3-7130ucore_i5-8400atom_c3436lxeon_w-3245mxeon_e-2334core_i7\+8700core_i7-9850hatom_c3708xeon_w-1350core_i5-7600core_i9-10980xecore_i7-6500ucore_i5-1035g1xeon_w-11865mlecore_i7-11850hxeon_w-1290xeon_e-2186gxeon_silver_4210core_i3-10110uxeon_gold_6234atom_c3336core_i7-4930mxxeon_w-1350pcore_i9-10900xeon_w-1250core_i5-9400tcore_i5-7360ucore_i5-7300ucore_i7-11800hcore_i3-10300core_i5-6600tcore_i7-8565uxeon_gold_6154xeon_silver_4110core_i7-7700katom_c3830xeon_platinum_8176core_i7-10870hcore_i3-10100fcore_i7-10510uxeon_bronze_3104xeon_w-1290pcore_i5-8310yxeon_gold_5217core_i5-6440hqcore_i7-6850kxeon_gold_5120txeon_e-2324gxeon_w-3245core_i7-6660ucore_i9-7980xecore_i3-6100exeon_gold_6210ucore_i5-7200uxeon_gold_5115core_i7-9700fxeon_w-3345core_i5-10210ucore_i7-6820hqxeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500core_i5-8400bcore_i3-7100hcore_i7-8850hxeon_gold_5215core_i3-6100ucore_i9-9900kscore_i9-7920xxeon_w-11865mrecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i5-6360ucore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_e-2378core_i7-7820xcore_i3-1115g4ecore_i5-10600tcore_i5-7640xcore_i7-7800xxeon_w-3275mxeon_gold_6250lcore_i5-9400hxeon_gold_6209ucore_i9-9920xxeon_platinum_8253xeon_gold_6252ncore_i7-7660ucore_i3-9320xeon_platinum_8158core_i7-7700hqatom_c3308xeon_platinum_8280core_i5-6402pcore_m3-7y30xeon_w-11155mrexeon_gold_6252xeon_w-2135core_i3-10105core_i5-11400tcore_i7-11700kcore_i7-4940mxcore_i7-8550uxeon_e-2276mlxeon_gold_6246xeon_silver_4214rcore_i9-10940xcore_i7-9700core_i7-6700hqcore_i3-8300core_i7-9850hexeon_gold_6230rcore_i7-10700kfcore_i5-8400tcore_i5-7500txeon_d-2187ntxeon_silver_4116tcore_i7-1065g7xeon_d-1518core_i7-9800xxeon_silver_4208core_i5-6267ucore_i3-1000g1xeon_gold_6126txeon_w-2225xeon_silver_4116xeon_e-2276mecore_i5-7y54xeon_w-1250ecore_i5-7400core_i7-6950xfas\/aff_biosxeon_platinum_8160fxeon_platinum_8164core_i7-6567uxeon_platinum_8176fxeon_gold_5215lcore_i5-7287uxeon_platinum_8168core_i7-3970xcore_i7-3960xcore_i7-11600hcore_i7-7920hqcore_i7-10700core_i5-1145grecore_i3-7020uxeon_d-1533nxeon_gold_6240lxeon_w-3265mxeon_gold_6248core_i5-1135g7xeon_w-2195xeon_e-2136core_i5-9300hfxeon_w-1270pcore_i3-1115g4xeon_gold_6258rxeon_platinum_9282core_i3-8145ucore_i3-9300core_i5-10400xeon_d-2173itxeon_d-2161icore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_d-2123itxeon_platinum_8160tcore_i3-8109ucore_i5-8365uexeon_gold_6142core_i3-1110g4xeon_bronze_3206rxeon_gold_6148core_i7-3820xeon_w-3275xeon_gold_6240core_i3-7320core_i7-10700ecore_i5-8350ucore_i7-3940xmxeon_gold_5220xeon_gold_6126fcore_i3-10100tecore_m5-6y57xeon_e-2388gcore_i7-11390hxeon_platinum_8268xeon_e-2226gcore_i5-7y57core_i7-6700texeon_gold_6240rcore_i7-3920xmcore_i5-7260uxeon_e-2278gxeon_silver_4215rcore_i9-10900ecore_i3-9100core_i7-9750hxeon_e-2124core_i5-8250ucore_i5-8600core_i9-11980hkxeon_w-3265core_i5-10500tecore_i5-11500core_i3-6100tecore_i7-11700xeon_platinum_8160xeon_gold_5119tcore_i7-8700bcore_i5-10500txeon_gold_6148fcore_i5-10600core_i5-10310yxeon_w-1250texeon_gold_6208ucore_i3-9100teatom_c3338core_i5-8259uxeon_gold_6242core_i7-10700kxeon_e-2336xeon_d-1627xeon_e-2186mxeon_e-2286mcore_i9-9880hcore_i7-6650ucore_i7-11370hcore_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i5-1035g4core_i5-11600tcore_i7-8650ucore_i5-10200hcore_i9-9900kcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220tcore_i7-5930kcore_i5-10400fcore_i7-1160g7core_i7-7600uxeon_gold_6244xeon_gold_6242rcore_i3-7100exeon_w-2275xeon_w-2265core_i5-9500xeon_gold_6226rcore_i3-7101ecore_i9-9900xeon_bronze_3204core_i9-9820xxeon_d-1567xeon_w-3365core_i7-9850hlcore_i5-8400hcore_i5-6300ucore_m3-6y30core_i7-9750hfxeon_d-2141ixeon_w-2175xeon_silver_4108core_i3-10110ycore_i5-1035g7core_i7-7820hkxeon_e-2254mlxeon_w-11855mcore_i5-8305gcore_i3-6100xeon_gold_6240ycore_i3-9350kxeon_gold_6238lxeon_w-1390cloud_backupcore_i3-1115grecore_i5-11600core_i5-7400tcore_i7-11700fcore_i3-6100tcore_i7-8750hcore_i7-8665ucore_i3-10305txeon_d-2183itcore_i5-8300hcore_i3-8140ucore_i3-8350kcore_i5-10600kcore_i7-8086kxeon_gold_5222core_i7-10850hxeon_d-1523nxeon_gold_6256core_i5-9500teatom_c3958xeon_gold_6130tatom_c3338rxeon_d-1520core_i3-8100bcore_i3-6167ucore_i5-8279uxeon_platinum_8280lcore_m3-8100ycore_i5-7267ucore_i5-8600kcore_i3-7100uxeon_d-1543ncore_i5-6442eqcore_i7-8700txeon_silver_4114xeon_d-1541core_i7-11700txeon_d-1622xeon_platinum_9242core_i7-6700kcore_i7-6970hqxeon_w-2223core_i7-6822eqcore_i3-7300txeon_gold_6238tatom_c3955core_i5-8500core_i9-11900tcore_i5-8210ycore_i7-6785rcore_i7-6560ucore_i7-1060g7core_i5-8257ucore_i7-8569ucore_i7-5820kcore_i9-9900tcore_i7-6900kcore_i7-7700tcore_i9-9980xeatom_c3558core_i5-6685rxeon_w-2133xeon_gold_6250core_i3-9350kfxeon_platinum_8260lxeon_platinum_8270xeon_w-1290tcore_i5-8500tcore_i7-8809gxeon_gold_6226core_i5-11320hxeon_d-1577xeon_gold_6132xeon_e-2314core_i5-6400tcore_i3-10305xeon_d-2166ntcore_i3-7350kxeon_w-1390pcore_i5-10505xeon_d-1539core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i5-7600kcore_i7-6820hkxeon_w-2255xeon_gold_6262vcore_i3-6006ucore_i7-10710ucore_i5-10210ycore_i5-10300hxeon_w-1270texeon_e-2224xeon_gold_5218xeon_w-2145xeon_gold_6238rcore_i3-9100fxeon_platinum_8170core_i9-10900fcore_i3-1125g4xeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_e-2378gcore_i3-8100tcore_i5-9500txeon_w-3223xeon_w-2155xeon_gold_6152core_i3-7102exeon_gold_6150xeon_e-2276gcore_i5-6200uxeon_gold_6222vcore_i7-10700fxeon_d-1571xeon_gold_5122atom_c3758rxeon_gold_6230Intel(R) Processors
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-24500
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 20.16%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:43
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_e810-cqda1_for_ocp_3.0ethernet_network_adapter_e810-cqda1_for_ocpethernet_network_adapter_e810-cqda2ethernet_network_adapter_e810-xxvda2ethernet_network_adapter_e810-xxvda2_for_ocpethernet_network_adapter_e810-xxvda4ethernet_network_adapter_e810-cqda1ethernet_network_adapter_e810-xxvda2_for_ocp_3.0ethernet_network_adapter_e810_firmwareethernet_network_adapter_e810-cqda2_for_ocp_3.0Intel(R) E810 Ethernet Controllers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8729
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.85%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:56
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8710
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.19% / 41.55%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:31
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8719
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.19% / 41.55%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:29
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-0576
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.35% / 56.83%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 16:58
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel(R) Modular Server MFS2600KISPP Compute Module may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_mfs2600ki_firmwarecompute_module_mfs2600kiIntel(R) Modular Server Compute Module
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-0504
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 23.13%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 17:42
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-0530
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.84%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 20:55
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html

Action-Not Available
Vendor-Intel Corporation
Product-nuc_kit_nuc7i5bnknuc_board_d34010wybnuc_kit_nuc8i7beknuc_kit_nuc7i5dnhenuc_8_enthusiast_pc_nuc8i7bekqa_firmwarenuc_7_enthusiast_pc_nuc7i7bnhxgnuc_kit_nuc7i3bnhx1_firmwarenuc_7_home_a_mini_pc_nuc7i3bnhxfnuc_8_mainstream-g_kit_nuc8i7inh_firmwarenuc_kit_nuc6i5syk_firmwarenuc_kit_nuc5i5ryk_firmwarecompute_stick_stk1a32sc_firmwarenuc_kit_nuc6i3syh_firmwarenuc_kit_nuc5i5myhenuc_8_mainstream-g_kit_nuc8i5inhnuc_kit_nuc5i5ryknuc_kit_nuc7i5bnhnuc_kit_nuc5i3myhenuc_kit_nuc7i7dnkenuc_kit_nuc7i3bnknuc_board_nuc5i3mybe_firmwarenuc_kit_nuc7i5dnke_firmwarenuc_kit_nuc5i7ryh_firmwarenuc_kit_nuc7i7bnhnuc_kit_nuc7i3bnh_firmwarenuc_8_home_pc_nuc8i3cysmnuc_kit_nuc7i3bnhx1nuc_8_business_pc_nuc8i7hnkqcnuc_kit_nuc6i7kyk_firmwarenuc_kit_de3815tykhenuc_7_home_a_mini_pc_nuc7i5bnhxf_firmwarenuc_board_nuc7i7dnbenuc_kit_nuc7i5bnh_firmwarenuc_board_de3815tybe_firmwarenuc_board_d54250wyb_firmwarecompute_stick_stk2m3w64cc_firmwarenuc_kit_nuc5i3ryhsnuc_kit_d34010wyknuc_7_home_a_mini_pc_nuc7i3bnhxf_firmwarecompute_stick_stck1a8lfc_firmwarecompute_stick_stk1aw32sc_firmwarecompute_stick_stk1aw32scnuc_kit_nuc6cayh_firmwarenuc_kit_nuc7i5bnhx1_firmwarenuc_kit_nuc7i3bnk_firmwarenuc_kit_nuc5i5ryh_firmwarenuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_kit_nuc7i7bnhx1nuc_kit_nuc5i5myhe_firmwarenuc_kit_nuc5i3ryh_firmwarenuc_8_rugged_kit_nuc8cchkr_firmwarecompute_stick_stk2m364ccnuc_kit_nuc6cays_firmwarecompute_stick_stk2m364cc_firmwarenuc_kit_nuc7i7dnke_firmwarenuc_kit_nuc6i3syhnuc_board_nuc7i3dnbe_firmwarenuc_kit_nuc7i7dnhenuc_kit_d54250wyknuc_kit_nuc7i3dnhe_firmwarenuc_kit_nuc5i3myhe_firmwarecompute_stick_stck1a32wfcnuc_kit_nuc7i5dnkenuc_7_home_a_mini_pc_nuc7i5bnkp_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_kit_d54250wyk_firmwarenuc_kit_nuc7pjyhnuc_kit_de3815tykhe_firmwarecompute_stick_stk1a32scnuc_kit_nuc5i3ryknuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_kit_nuc5i3ryhs_firmwarenuc_board_nuc8cchbnuc_board_nuc5i5mybenuc_kit_nuc8i7hnknuc_7_essential_pc_nuc7cjysalnuc_board_d54250wybcompute_stick_stk2m3w64ccnuc_board_nuc5i3mybenuc_7_essential_pc_nuc7cjysal_firmwarenuc_kit_nuc7i5bnhx1nuc_kit_nuc6i3syk_firmwarenuc_kit_nuc7i3dnhenuc_kit_nuc5i3ryk_firmwarenuc_board_nuc8cchb_firmwarenuc_kit_nuc7i5dnhe_firmwarenuc_kit_nuc8i7hnk_firmwarecompute_stick_stck1a8lfcnuc_8_home_pc_nuc8i3cysm_firmwarenuc_kit_d34010wykhnuc_kit_nuc7cjyhnuc_board_nuc5i5mybe_firmwarenuc_kit_d54250wykh_firmwarenuc_board_nuc7i5dnbenuc_kit_nuc5cpyhnuc_kit_nuc6caysnuc_board_nuc7i7dnbe_firmwarenuc_kit_nuc7i7bnh_firmwarenuc_kit_nuc7i3dnke_firmwarenuc_8_business_pc_nuc8i7hnkqc_firmwarenuc_8_enthusiast_pc_nuc8i7bekqanuc_kit_nuc6i5syhnuc_board_nuc7i3dnbenuc_kit_nuc5i3ryhnuc_kit_nuc6cayhnuc_kit_nuc5ppyhnuc_kit_nuc8i7bek_firmwarenuc_8_mainstream-g_kit_nuc8i7inhnuc_board_nuc7i5dnbe_firmwarenuc_board_d34010wyb_firmwarenuc_kit_nuc5i3ryhsn_firmwarenuc_kit_nuc5i7ryhnuc_kit_nuc5pgyh_firmwarenuc_kit_nuc7i5bnk_firmwarenuc_kit_nuc5i5ryhsnuc_kit_nuc7i7bnhx1_firmwarenuc_kit_nuc5pgyhnuc_8_rugged_kit_nuc8cchkrnuc_kit_nuc6i5syknuc_kit_nuc5i5ryhs_firmwarenuc_kit_nuc7cjyh_firmwarenuc_kit_nuc7pjyh_firmwarenuc_7_enthusiast_pc_nuc7i7bnhxg_firmwarenuc_kit_nuc6i5syh_firmwarenuc_kit_nuc5cpyh_firmwarenuc_kit_nuc5ppyh_firmwarenuc_kit_d54250wykhcompute_stick_stck1a32wfc_firmwarenuc_kit_d34010wyk_firmwarenuc_kit_nuc6i7kyknuc_kit_nuc7i7dnhe_firmwarenuc_7_home_a_mini_pc_nuc7i5bnhxfnuc_kit_nuc5i5ryhnuc_kit_nuc6i3syknuc_board_de3815tybenuc_kit_d34010wykh_firmwarenuc_7_home_a_mini_pc_nuc7i5bnkpnuc_kit_nuc7i3dnkenuc_kit_nuc7i3bnhnuc_kit_nuc5i3ryhsnIntel(R) NUC Firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-0501
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.39%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 17:42
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-0584
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.22% / 45.20%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:59
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in firmware for Intel(R) SSD DC P4800X and P4801X Series, Intel(R) Optane(TM) SSD 900P and 905P Series may allow an unauthenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ssd_dc_p4800xssd_dc_p4801x_firmwaressd_dc_p4800x_firmwareoptane_ssd_905poptane_ssd_900poptane_ssd_905p_firmwaressd_dc_p4801xoptane_ssd_900p_firmwareIntel(R) SSD DC P4800X and P4801X Series, Intel(R) Optane(TM) SSD 900P and 905P Series
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-38581
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.77%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-02 Aug, 2024 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Power Gadget software for Windowspower_gadget_software
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8712
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.67%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:42
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8707
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.27% / 50.13%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:27
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8720
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.19% / 40.59%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:11
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-46431
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-10 Feb, 2025 | 00:00
Updated-25 Mar, 2025 | 18:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tenda W18E V16.01.0.8(1625) is vulnerable to Buffer Overflow. An attacker with access to the web management portal can exploit this vulnerability by sending specially crafted data to the delWewifiPic function.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-w18e_firmwarew18en/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-41588
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.07% / 22.45%
||
7 Day CHG~0.00%
Published-03 Oct, 2024 | 00:00
Updated-11 Jun, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The CGI endpoints v2x00.cgi and cgiwcg.cgi of DrayTek Vigor3910 devices through 4.3.2.6 are vulnerable to buffer overflows, by authenticated users, because of missing bounds checking on parameters passed through POST requests to the strncpy function.

Action-Not Available
Vendor-n/aDrayTek Corp.
Product-vigor3910_firmwarevigor2915_firmwarevigor2866vigor2135_firmwarevigor2133vigor3220vigor2832vigor2915vigor2765_firmwarevigor3910vigor2133_firmwarevigor165_firmwarevigorlte200vigor2862vigor2926vigor2952vigor2865vigor2860vigorlte200_firmwarevigor2860_firmwarevigor2952_firmwarevigor2766vigor2766_firmwarevigor2962vigor2620vigor2135vigor2763_firmwarevigor166_firmwarevigor1000bvigor2962_firmwarevigor3912_firmwarevigor166vigor2866_firmwarevigor1000b_firmwarevigor3912vigor2765vigor2925_firmwarevigor2762_firmwarevigor2762vigor2620_firmwarevigor2865_firmwarevigor2832_firmwarevigor2862_firmwarevigor2925vigor3220_firmwarevigor2926_firmwarevigor165vigor2763n/avigor3910_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-41596
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.07% / 21.71%
||
7 Day CHG~0.00%
Published-03 Oct, 2024 | 00:00
Updated-11 Jun, 2025 | 13:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerabilities exist in DrayTek Vigor310 devices through 4.3.2.6 (in the Vigor management UI) because of improper retrieval and handling of the CGI form parameters.

Action-Not Available
Vendor-n/aDrayTek Corp.
Product-vigor3910_firmwarevigor2915_firmwarevigor2866vigor2135_firmwarevigor2133vigor3220vigor2832vigor2915vigor2765_firmwarevigor3910vigor2133_firmwarevigor165_firmwarevigorlte200vigor2862vigor2926vigor2952vigor2865vigor2860vigorlte200_firmwarevigor2860_firmwarevigor2952_firmwarevigor2766vigor2766_firmwarevigor2962vigor2620vigor2135vigor2763_firmwarevigor166_firmwarevigor1000bvigor2962_firmwarevigor3912_firmwarevigor166vigor2866_firmwarevigor1000b_firmwarevigor3912vigor2765vigor2925_firmwarevigor2762_firmwarevigor2762vigor2620_firmwarevigor2865_firmwarevigor2832_firmwarevigor2862_firmwarevigor2925vigor3220_firmwarevigor2926_firmwarevigor165vigor2763n/avigor3910_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-3182
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.08% / 24.01%
||
7 Day CHG~0.00%
Published-19 Jan, 2021 | 14:40
Updated-03 Aug, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dcs-5220_firmwaredcs-5220n/adcs-5220_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-20712
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.24% / 47.19%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 15:35
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7000v2 before 1.0.0.53, D8500 before 1.0.3.44, DGN2200v4 before 1.0.0.110, DGND2200Bv4 before 1.0.0.109, R6250 before 1.0.4.34, R6300v2 before 1.0.4.32, R6400 before 1.0.1.46, R6400v2 before 1.0.2.62, R6700 before 1.0.2.6, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R7000 before 1.0.9.60, R7000P before 1.3.1.64, R7100LG before 1.0.0.52, R7300DST before 1.0.0.70, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, WNDR3400v3 before 1.0.1.24, and WNR3500Lv2 before 1.2.0.56.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-r8000r6400_firmwarer6900pr7100lgr7900r8000pr6900p_firmwarewndr3400d6220r8300r7100lg_firmwarer7300dst_firmwarer8500_firmwaredgn2200r7000_firmwarer8000p_firmwared6400_firmwarer7300dstd6220_firmwarer6300_firmwared8500_firmwarer6250_firmwarer7900pr7000p_firmwaredgnd2200b_firmwarer8500d7000d8500wndr3400_firmwared7000_firmwarer6700r8300_firmwarer7000wnr3500l_firmwarer6900d6400r7000pwnr3500ldgnd2200bdgn2200_firmwarer6900_firmwarer7900_firmwarer6300r6400r6700_firmwarer7900p_firmwarer8000_firmwarer6250n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-20657
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.73% / 71.71%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 18:44
Updated-05 Aug, 2024 | 02:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.24, JR6150 before 1.0.1.24, R6120 before 1.0.0.48, R6220 before 1.1.0.86, R6230 before 1.1.0.86, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, and WNR2020 before 1.1.0.62.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-d7000wnr2020_firmwarer6120r6080d7000_firmwarewnr2020r6230r6700r6220_firmwarepr2000r6080_firmwarer6230_firmwarer6900r6120_firmwared6200_firmwarer6800r6900_firmwarer6050_firmwarer6050pr2000_firmwarer6260r6260_firmwarer6220r6020d6200jr6150_firmwarejr6150r6700_firmwarer6020_firmwarer6800_firmwaren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-20754
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.24% / 47.19%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 21:07
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects DGN2200 before 1.0.0.58, DGN2200B before 1.0.0.58, D8500 before 1.0.3.42, D7000v2 before 1.0.0.51, D6400 before 1.0.0.80, D6220 before 1.0.0.44, EX7000 before 1.0.0.66, EX6200 before 1.0.3.88, EX6150 before 1.0.0.42, EX7500 before 1.0.0.46, JNDR3000 before 1.0.0.24, R8000 before 1.0.4.18, R8500 before 1.0.2.122, R8300 before 1.0.2.122, R7900P before 1.4.0.10, R8000P before 1.4.0.10, R7900 before 1.0.2.16, R7000P before 1.3.1.44, R7300DST before 1.0.0.68, R7100LG before 1.0.0.46, R6900P before 1.3.1.44, R7000 before 1.0.9.32, R6900 before 1.0.1.46, R6700 before 1.0.1.46, R6400v2 before 1.0.2.56, R6400 before 1.0.1.42, R6300v2 before 1.0.4.28, R6250 before 1.0.4.26, WNDR4500v2 before 1.0.0.72, and WNR3500Lv2 before 1.2.0.54.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-ex7500r8000r6400_firmwareex7000ex6200r7100lgr7900r6900pr8000pr6900p_firmwared6220ex7500_firmwarer8500_firmwarer8300r7300dst_firmwarer7100lg_firmwaredgn2200r7000_firmwarer8000p_firmwared6400_firmwarewndr4500r7300dstd6220_firmwarer6300_firmwared8500_firmwaredgn2200b_firmwarer7900pr6250_firmwarer7000p_firmwarer8500d7000d8500dgn2200bd7000_firmwarer8300_firmwarer6700r7000wndr4500_firmwarewnr3500l_firmwareex6200_firmwareex6150d6400jndr3000_firmwarejndr3000r7000pr6900dgn2200_firmwarer6900_firmwarewnr3500lr7900_firmwareex7000_firmwarer6300r6400r6700_firmwarer7900p_firmwareex6150_firmwarer8000_firmwarer6250n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-7208
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8||HIGH
EPSS-0.66% / 70.22%
||
7 Day CHG~0.00%
Published-07 Jan, 2024 | 07:00
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Totolink X2000R_V2 boa formTmultiAP buffer overflow

A vulnerability classified as critical was found in Totolink X2000R_V2 2.0.0-B20230727.10434. This vulnerability affects the function formTmultiAP of the file /bin/boa. The manipulation leads to buffer overflow. VDB-249742 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-TOTOLINK
Product-x2000rx2000r_firmwareX2000R_V2x2000r_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-20758
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.33% / 55.39%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 21:10
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NETGEAR R7000 devices before 1.0.9.42 are affected by a buffer overflow by an authenticated user.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-r7000_firmwarer7000n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-20762
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.30% / 52.85%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 21:13
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D8500 before 1.0.3.43, R8500 before 1.0.2.128, R8300 before 1.0.2.128, R8000 before 1.0.4.28, R7300DST before 1.0.0.68, R7100LG before 1.0.0.48, R6900P before 1.3.1.44, R7900P before 1.4.1.30, R8000P before 1.4.1.30, R7000P before 1.3.1.44, R7000 before 1.0.9.34, R6900 before 1.0.2.4, R6700 before 1.0.2.6, and R6400 before 1.0.1.44.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-d8500_firmwarer8500d8500r6700r8300_firmwarer8000r6400_firmwarer6900pr7000r7100lgr6900r8000pr7000pr6900p_firmwarer8500_firmwarer8300r7300dst_firmwarer7100lg_firmwarer6900_firmwarer7000_firmwarer8000_firmwarer8000p_firmwarer7300dstr6400r6700_firmwarer7900pr7900p_firmwarer7000p_firmwaren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-20719
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 30.56%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 15:46
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D8500 before 1.0.3.43, R6250 before 1.0.4.34, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R7000P before 1.4.1.30, R7100LG before 1.0.0.48, R7300DST before 1.0.0.68, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, and R8500 before 1.0.2.128.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-r8500d7000d8500d7000_firmwarer8300_firmwarer8000r7900pr6400_firmwarer7100lgr7900r8000pr7000pd6400r6250d6220r8300r7100lg_firmwarer7300dst_firmwarer8500_firmwarer7900_firmwarer8000_firmwarer8000p_firmwared6400_firmwarer7300dstd6220_firmwarer6400d8500_firmwarer6250_firmwarer7900p_firmwarer7000p_firmwaren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-9908
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.35% / 56.49%
||
7 Day CHG~0.00%
Published-13 Oct, 2024 | 12:00
Updated-16 Oct, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
D-Link DIR-619L B1 formSetMACFilter buffer overflow

A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formSetMACFilter of the file /goform/formSetMACFilter. The manipulation of the argument curTime leads to buffer overflow. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-619ldir-619l_firmwareDIR-619L B1dir-619l_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-21151
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.17% / 38.48%
||
7 Day CHG~0.00%
Published-22 Apr, 2020 | 19:57
Updated-05 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.54, and WNDR4500v3 before 1.0.0.54.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-r7500_firmwared7800_firmwarer7800r8900r9000_firmwarewndr4500r9000r8900_firmwarewndr4300r7800_firmwarewndr4500_firmwared7800r7500wndr4300_firmwaren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-35788
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.6||HIGH
EPSS-0.14% / 34.99%
||
7 Day CHG~0.00%
Published-29 Dec, 2020 | 23:40
Updated-04 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NETGEAR WAC104 devices before 1.0.4.13 are affected by a buffer overflow by an authenticated user.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-wac104_firmwarewac104n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • Next
Details not found