Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-24498

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-17 Feb, 2021 | 13:41
Updated At-04 Aug, 2024 | 15:12
Rejected At-
Credits

Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable denial of service via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:17 Feb, 2021 | 13:41
Updated At:04 Aug, 2024 | 15:12
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable denial of service via local access.

Affected Products
Vendor
n/a
Product
Intel(R) E810 Ethernet Controllers
Versions
Affected
  • before version 1.4.1.13
Problem Types
TypeCWE IDDescription
textN/Adenial of service
Type: text
CWE ID: N/A
Description: denial of service
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00456.html
x_refsource_MISC
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00456.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00456.html
x_refsource_MISC
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00456.html
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:17 Feb, 2021 | 14:15
Updated At:22 Feb, 2021 | 17:09

Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable denial of service via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Intel Corporation
intel
>>ethernet_network_adapter_e810_firmware>>Versions before 1.4.1.13(exclusive)
cpe:2.3:o:intel:ethernet_network_adapter_e810_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-cqda1>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-cqda1_for_ocp>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-cqda1_for_ocp_3.0>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp_3.0:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-cqda2>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-cqda2_for_ocp_3.0>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2_for_ocp_3.0:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-xxvda2>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-xxvda2_for_ocp>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2_for_ocp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-xxvda2_for_ocp_3.0>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda2_for_ocp_3.0:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>ethernet_network_adapter_e810-xxvda4>>-
cpe:2.3:h:intel:ethernet_network_adapter_e810-xxvda4:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Primarynvd@nist.gov
CWE ID: CWE-120
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00456.htmlsecure@intel.com
Patch
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00456.html
Source: secure@intel.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

223Records found

CVE-2019-0147
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.32%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:23
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0120
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.11% / 30.80%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient key protection vulnerability in silicon reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_n4000celeron_n2830pentium_silver_n5000n5000celeron_n2840pentium_silver_n5000_firmwareceleron_n3350_firmwarej4205_firmwareceleron_n2940_firmwareceleron_n2930celeron_n2840_firmwareceleron_n3450n3540_firmwareceleron_j4105celeron_j3160j3710_firmwaren5000_firmwareceleron_n3350celeron_j3160_firmwareatom_330celeron_n3450_firmwareceleron_j4005_firmwareceleron_n4100celeron_j3060_firmwareatom_230_firmwarepentium_silver_j5005j5005_firmwareatom_x5-e3940celeron_n3000celeron_n2930_firmwaren3530celeron_j3355_firmwarej3710celeron_j4005j5005atom_x5-e3930celeron_j3060celeron_j3355celeron_n4100_firmwareatom_x5-e3940_firmwareatom_x7-e3950celeron_j4105_firmwareatom_230n3530_firmwareceleron_n2940celeron_n2830_firmwarepentium_silver_j5005_firmwareatom_x5-e3930_firmwareatom_330_firmwareatom_x7-e3950_firmwarej4205celeron_n3000_firmwareceleron_n4000_firmwaren3540celeron_j3455celeron_j3455_firmwareIntel(R) Unified Extensible Firmware Interface (UEFI)
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-0150
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.1||MEDIUM
EPSS-0.05% / 14.50%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:24
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in firmware Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CVE-2019-0113
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.05%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0154
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.26%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:19
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aCanonical Ltd.Intel Corporation
Product-xeon_e3-1230_v5core_i7-7700kcore_i7-8705gpentium_silver_n5000_firmwarecore_i7-8665uxeon_e-2276mxeon_e3-1558l_v5core_i7-7660ucore_i7-6600ucore_i7-8706gxeon_e3-1565l_v5_firmwarexeon_e3-1565l_v5xeon_e3-1501l_v6_firmwarexeon_e-2236core_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e-2124g_firmwarexeon_e-2126g_firmwareatom_x5-a3940xeon_e3-1240_v6xeon_e-2254me_firmwarecore_i7-8700core_i7-8665ue_firmwarexeon_e-2276me_firmwarexeon_e3-1220_v5_firmwarecore_i7-8705g_firmwareatom_x5-a3930_firmwarecore_i7-7700tcore_i7-8086kcore_i7-6600u_firmwarecore_i7-6770hqcore_i7-8700kcore_i7-6650u_firmwarexeon_e3-1280_v5core_i9-9900kfxeon_e-2226gxeon_e3-1270_v6_firmwarexeon_e3-1285_v6_firmwarecore_i7-6822eqxeon_e-2276m_firmwarexeon_e-2134core_i7-6700teceleron_j3455core_i7-6567u_firmwarexeon_e3-1501l_v6xeon_e-2226g_firmwarecore_i7-7600uxeon_e3-1285_v6xeon_e-2224xeon_e-2186m_firmwarexeon_e3-1225_v6core_i7-8569u_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarexeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_e-2134_firmwareceleron_n4100core_i7-7600u_firmwarecore_i7-7700hqxeon_e3-1240_v5_firmwarecore_i7-7820hkxeon_e3-1245_v5core_i7-6870hqxeon_e3-1558l_v5_firmwarecore_i7-6970hqceleron_n4000_firmwarexeon_e3-1505l_v6_firmwareceleron_j3455_firmwarexeon_e-2136xeon_e-2246gcore_i7-8500y_firmwareatom_x5-a3940_firmwarexeon_e3-1270_v5_firmwareatom_x7-a3950_firmwarecore_i7-8700b_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5xeon_e3-1535m_v5_firmwarecore_i7-7700core_i7-6820hq_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqxeon_e3-1575m_v5_firmwarecore_i7-7920hq_firmwarexeon_e3-1268l_v5core_i9-9900ks_firmwarexeon_e-2254mlxeon_e3-1545m_v5core_i7-8700k_firmwarexeon_e-2124_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240_v6_firmwarexeon_e3-1501m_v6_firmwarecore_i7-8700_firmwarecore_i7-8750hxeon_e3-1501m_v6xeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_e-2254ml_firmwareceleron_j4105_firmwarexeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5pentium_n4200_firmwarexeon_e3-1260l_v5xeon_e3-1270_v6pentium_silver_n5000xeon_e-2286mxeon_e3-1505m_v5core_i7-8557u_firmwarecore_i7-7820eq_firmwarexeon_e-2276gxeon_e-2186gxeon_e-2276mlxeon_e-2244gxeon_e-2174gcore_i9-9900kxeon_e-2176gcore_i7-8809gceleron_j4105core_i7-8709gcore_i7-8700bxeon_e3-1230_v6_firmwarecore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-7500u_firmwarexeon_e3-1275_v6_firmwarexeon_e3-1585_v5xeon_e3-1225_v6_firmwarecore_i7-6700k_firmwarecore_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-6560uxeon_e-2278ge_firmwareceleron_j3355core_i7-6820hk_firmwarecore_i7-8700txeon_e3-1280_v5_firmwarecore_i7-6820hqxeon_e3-1220_v6_firmwarecore_i7-8650uxeon_e3-1535m_v6_firmwarexeon_e-2286m_firmwarecore_i7-6700tcore_i7-6920hqcore_i9-9900ksxeon_e3-1230_v6atom_x7-a3950core_i7-6700_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1240l_v5_firmwarexeon_e-2234_firmwareatom_x5-a3930core_i7-8565u_firmwarecore_i7-6822eq_firmwarexeon_e-2224_firmwarexeon_e-2186g_firmwareceleron_n3350xeon_e-2274gxeon_e-2124gpentium_silver_j5005xeon_e-2278gelxeon_e3-1280_v6xeon_e-2288gcore_i7-6700t_firmwarexeon_e-2234xeon_e3-1245_v5_firmwarecore_i7-8709g_firmwarecore_i7-6500ucore_i7-6500u_firmwarecore_i7-6700kxeon_e3-1280_v6_firmwarexeon_e-2124celeron_n4100_firmwarecore_i9-9880hcore_i7-6820eq_firmwarepentium_silver_j5005_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarexeon_e-2276mecore_i7-8565uceleron_n3350_firmwarexeon_e-2274g_firmwarexeon_e-2126gcore_i7-7560ucore_i7-8706g_firmwarecore_i7-6920hq_firmwarecore_i7-7820eqxeon_e3-1535m_v6core_i9-9900celeron_n3450_firmwarexeon_e3-1220_v5core_i7-8650u_firmwarexeon_e-2146g_firmwarexeon_e3-1220_v6core_i7-6785r_firmwarecore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-6700hq_firmwarecore_i7-6700hqcore_i7-7700k_firmwarepentium_n4200core_i7-7567u_firmwarexeon_e-2186mxeon_e-2176mcore_i7-6970hq_firmwarecore_i7-6785rcore_i7-7700hq_firmwarecore_i7-6820hkcore_i7-6660u_firmwarexeon_e3-1230_v5_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uubuntu_linuxxeon_e-2276ml_firmwarexeon_e-2224gxeon_e-2286gxeon_e3-1268l_v5_firmwarecore_i7-6700te_firmwarepentium_j4205xeon_e3-1275_v6xeon_e-2226gexeon_e-2244g_firmwarecore_i7-6650uxeon_e3-1575m_v5xeon_e-2278gxeon_e3-1505l_v5xeon_e3-1245_v6core_i7-8559u_firmwarecore_i7-8850hcore_i7-8086k_firmwareceleron_j4005_firmwarexeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i7-8665u_firmwarecore_i7-6560u_firmwarecore_i7-6820eqcore_i7-8500ycore_i7-7567uxeon_e3-1505m_v6_firmwarecore_i9-9900tcore_i9-9900_firmwarexeon_e3-1545m_v5_firmwarexeon_e3-1235l_v5core_i7\+8700core_i7-7660u_firmwarepentium_j4205_firmwarexeon_e3-1585l_v5core_i7-7820hqcore_i7-8750h_firmwarexeon_e3-1275_v5core_i7-8665uecore_i7-8809g_firmwarexeon_e3-1240_v5xeon_e-2288g_firmwareceleron_n4000core_i7-7700t_firmwarecore_i9-9980hk_firmwarexeon_e-2246g_firmwarecore_i7-6567uxeon_e-2176m_firmwarexeon_e-2174g_firmwareceleron_n3450xeon_e3-1515m_v5xeon_e3-1505l_v5_firmwarexeon_e3-1225_v5core_i7-6870hq_firmwarexeon_e-2278gel_firmwarexeon_e-2144gxeon_e3-1245_v6_firmwarexeon_e3-1515m_v5_firmwarecore_i7-8569ucore_i7-7700_firmwarecore_i7-6770hq_firmwarexeon_e-2254mecore_i7-7y75celeron_j3355_firmwareceleron_j4005core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1505m_v6core_i9-9980hkcore_i7-8559ucore_i9-9900t_firmwarexeon_e-2146gxeon_e-2224g_firmwarexeon_e3-1578l_v5_firmware2019.2 IPU – Intel(R) Processor Graphics Update
CVE-2019-0115
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 32.05%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driverIntel(R) Graphics Driver KMD module
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0146
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.16% / 37.13%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:23
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2019-0165
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.13% / 33.81%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient Input validation in the subsystem for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33126
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 11.17%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:34
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the firmware for some Intel(R) 700 and 722 Series Ethernet Controllers and Adapters before versions 8.5 and 1.5.5 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_adapter_x722da4fhethernet_controller_v710_firmwareethernet_network_adapter_x722da2_firmwareethernet_controller_x710ethernet_network_adapter_x722da2ethernet_controller_x710_firmwareethernet_controller_xxv710_firmwareethernet_controller_v710ethernet_network_adapter_x722da4fh_firmwareethernet_network_adapter_x722da4g1p5_firmwareethernet_network_adapter_x722da4g1p5ethernet_controller_xl710_firmwareethernet_controller_xl710ethernet_controller_xxv710Intel(R) 700 and 722 Series Ethernet Controllers and Adapters
CVE-2023-24587
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 11.40%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-11 Oct, 2024 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_905poptane_ssd_900poptane_ssd_dc_p4801xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4800xoptane_ssd_905p_firmwareoptane_ssd_900p_firmwareIntel(R) Optane(TM) SSD products
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2016-8104
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.54%
||
7 Day CHG~0.00%
Published-08 Dec, 2016 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel PROSet/Wireless Software and Drivers in versions before 19.20.3 allows a local user to crash iframewrk.exe causing a potential denial of service.

Action-Not Available
Vendor-Intel Corporation
Product-proset\/wireless_software_and_driversIntel PROSet/Wireless Software and Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-3661
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.54%
||
7 Day CHG~0.00%
Published-15 May, 2018 | 14:00
Updated-16 Sep, 2024 | 23:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel system Configuration utilities selview.exe and syscfg.exe before version 14 build 11 allows a local user to crash these services potentially resulting in a denial of service.

Action-Not Available
Vendor-Intel Corporation
Product-selviewsyscfgSystem Configuration Utilities
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-18091
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 17.42%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-17 Sep, 2024 | 02:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-416
Use After Free
CVE-2018-18096
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-13 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper memory handling in Intel QuickAssist Technology for Linux (all versions) may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-quickassist_technology_for_linuxIntel QuickAssist Technology for Linux
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0152
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.58%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:21
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper verification of cryptographic signature in the installer for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ax1650ax1675_firmwareac_9462ac_8265ac_3165_firmwareac_9560_firmwareac_8265_firmwareac_7265_firmwareax1675ax200ac_3165ac_9461ac_8260ac_9260ax1650_firmwareac_9461_firmwareac_9462_firmwareac_3168ac_9560ax200_firmwareac1550_firmwareac_3168_firmwareax201ax210_firmwareax201_firmwareac_9260_firmwareac1550ac_7265ac_8260_firmwareax210Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-0051
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.50%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:02
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) SPS versions before SPS_E5_04.04.04.023.0, SPS_E5_04.04.03.228.0 or SPS_SoC-A_05.00.03.098.0 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-c629c624ac621c627atom_p5931bserver_platform_servicesatom_p5962bc626c624atom_p5942bc627ac629ac622c625atom_p5921bc628Intel(R) SPS versions
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8679
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:21
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers Advisory
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-46301
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-1.9||LOW
EPSS-0.05% / 13.36%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Initialization for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-665
Improper Initialization
CVE-2022-46298
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-1.9||LOW
EPSS-0.04% / 12.32%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incomplete cleanup for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-459
Incomplete Cleanup
CVE-2024-22390
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.82%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-01 Aug, 2024 | 22:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) FPGA products before version 2.9.1 may allow denial of service.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) FPGA productsagilex_7_fpga_f-series_023_firmwareagilex_7_fpga_f-series_006_firmwareagilex_7_fpga_f-series_008_firmwareagilex_7_fpga_f-series_019_firmwareagilex_7_fpga_i-series_023_firmwareagilex_7_fpga_i-series_022_firmwareagilex_7_fpga_i-series_019_firmwareagilex_7_fpga_i-series_035_firmwareagilex_7_fpga_i-series_040_firmwareagilex_7_fpga_f-series_022_firmwareagilex_7_fpga_i-series_041_firmwareagilex_7_fpga_f-series_012_firmwareagilex_7_fpga_f-series_027_firmwareagilex_7_fpga_i-series_027_firmwareagilex_7_fpga_f-series_014_firmwareagilex_7_fpga_m-series_039_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-43505
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.01% / 1.04%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_d-2796texeon_e7-8893_v3pentium_gold_g4600xeon_w-1350_firmwarexeon_bronze_3104_firmwarecore_i7-1280pxeon_e5-2608l_v4_firmwarepentium_j2850xeon_gold_6146xeon_gold_6126f_firmwarecore_i7-1068ng7xeon_e5-2660_v3atom_c3830_firmwarecore_i7-5930k_firmwarecore_i5-1035g7xeon_platinum_8168_firmwarecore_i3-8350k_firmwareatom_c3758rcore_i3-9350k_firmwarexeon_d-1527xeon_e5-2697_v4xeon_d-2766ntpentium_gold_g6600_firmwarexeon_platinum_8170xeon_gold_6138f_firmwarexeon_w-2125core_i9-10940xpentium_gold_g6400t_firmwarepentium_n6415_firmwarexeon_platinum_8352yxeon_gold_5217_firmwarexeon_e7-8890_v3_firmwarexeon_d-2163it_firmwareceleron_g1610t_firmwarecore_i7-1060g7_firmwarexeon_platinum_8164core_i7-9700celeron_n2815core_i7-3960xxeon_gold_6240_firmwarexeon_gold_6234core_i9-9900kfxeon_e5-2699r_v4xeon_w-1250p_firmwarexeon_silver_4116t_firmwarexeon_d-2766nt_firmwarexeon_e5-2658a_v3_firmwarepentium_gold_g5400txeon_gold_6238rcore_i5-1035g4xeon_w-2255xeon_d-1518core_i5-10400hceleron_n5105core_i7-10700k_firmwarexeon_e5-1680_v3_firmwareceleron_n3000_firmwarexeon_w-11555mlecore_i5-9600t_firmwarecore_i9-9940x_firmwarexeon_d-2799_firmwarecore_i3-10100ycore_i7-9700texeon_e7-4830_v3_firmwarexeon_gold_6248_firmwarecore_i5-10400txeon_gold_6348_firmwarecore_i5-10310ucore_i9-7920xcore_i7-7600uxeon_e5-2683_v4xeon_gold_5318s_firmwarexeon_e5-1660_v3_firmwarecore_i5-9400f_firmwarexeon_e5-2608l_v4core_i7-1270pcore_i7-10700t_firmwarexeon_gold_5218core_i7-1270p_firmwareceleron_g1830core_i3-7100ecore_i9-7940x_firmwarexeon_d-1567core_i5-8269u_firmwarexeon_e3-1505l_v6xeon_platinum_8380hxeon_gold_5220r_firmwarexeon_d-2173it_firmwarexeon_platinum_8368q_firmwarexeon_w-2245celeron_n4100celeron_g6900xeon_d-1746terceleron_n3060xeon_e5-2699_v3core_i5-10400xeon_gold_6126_firmwarexeon_gold_6314upentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwarecore_i5-10500tecore_i7-7820hkcore_i7-6900kxeon_w-3335core_i9-9940xxeon_gold_6240xeon_gold_6150_firmwarecore_i7-3970x_firmwarepentium_gold_g6405t_firmwarecore_i5-8600xeon_bronze_3106_firmwarecore_i5-9400_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarecore_i7-8500y_firmwarecore_i7-3930kxeon_e5-2667_v4_firmwarecore_i3-10100epentium_n4200e_firmwarecore_i7-7740x_firmwarecore_i7-1060g7xeon_gold_5220s_firmwarecore_i9-10900celeron_n2930celeron_n2840_firmwarexeon_platinum_8360ycore_i7-6800k_firmwarexeon_d-1539celeron_g4900tcore_i3-10100txeon_silver_4109t_firmwarexeon_w-1390t_firmwarexeon_gold_5220rpentium_gold_g7400exeon_gold_5318sxeon_d-2733nt_firmwarexeon_e7-4809_v3core_i9-10900kcore_i3-10325_firmwarexeon_gold_6230_firmwarexeon_d-2146ntcore_i5-8600kxeon_platinum_8160fpentium_gold_g7400txeon_e7-4820_v3_firmwarecore_i7-10700te_firmwarecore_i9-10900fcore_i7-8700k_firmwarepentium_n3520xeon_w-2223_firmwareatom_c3538_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i9-9960x_firmwarecore_i3-7100u_firmwarecore_i7-6850kcore_i5-10400_firmwarexeon_e5-4669_v4_firmwareceleron_n4505_firmwarexeon_d-2166ntxeon_e3-1270_v6xeon_d-1732te_firmwarecore_i7-3920xmcore_i7-9850he_firmwarexeon_gold_6328h_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_w-2195core_i7-7820eq_firmwareatom_c3336xeon_e5-2628l_v4xeon_gold_6130t_firmwarexeon_w-1290p_firmwarecore_i3-1000g4xeon_gold_5317core_i5-7267u_firmwarexeon_d-2183itxeon_w-3365_firmwareceleron_j6413_firmwarexeon_gold_6348h_firmwarecore_i3-7100core_i7-8809gxeon_gold_6246r_firmwarecore_i3-8145uexeon_e5-4667_v3xeon_e5-2609_v3_firmwareceleron_j4105core_i5-10400h_firmwarecore_i9-12900h_firmwarexeon_e3-1230_v6_firmwarecore_i5-10500_firmwarexeon_platinum_8360y_firmwarexeon_gold_6126t_firmwarepentium_gold_g6505core_i5-7267uceleron_j6412_firmwareceleron_g5900t_firmwarexeon_gold_5320tcore_i7-1260u_firmwarexeon_silver_4208pentium_gold_g6400te_firmwarecore_i5-10500exeon_gold_6312ucore_i5-9400txeon_w-2123xeon_gold_5220sceleron_j3355atom_x7-e3950xeon_d-1736core_i5-8600t_firmwarexeon_platinum_9282core_i5-8300hxeon_e3-1220_v6_firmwarexeon_e5-2683_v3core_i3-10110ycore_i5-10600kfxeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_e3-1535m_v6_firmwarepentium_j6426_firmwareceleron_j3355exeon_gold_6240r_firmwarexeon_e5-2428l_v3_firmwarexeon_silver_4108xeon_gold_6130tcore_i7-12650h_firmwarexeon_platinum_8256_firmwarexeon_silver_4210core_i7-9800xxeon_e5-2618l_v4_firmwareceleron_j4125_firmwarepentium_gold_g5500tcore_i7-10870hxeon_w-11555mre_firmwarexeon_e5-2650_v3_firmwarexeon_platinum_8352s_firmwarexeon_e5-2660_v3_firmwarecore_i5-8600_firmwarexeon_silver_4215r_firmwarecore_i5-1245u_firmwarecore_i5-9600kf_firmwarexeon_silver_4310_firmwarecore_i7-1250uceleron_g4920pentium_gold_g6405uxeon_d-2786nte_firmwarecore_i5-9500core_i3-8145ue_firmwarexeon_d-1540core_i5-10500te_firmwarexeon_platinum_8368xeon_e5-2698_v4xeon_platinum_8160tceleron_n2807core_i7-7740xxeon_d-1528pentium_j3710xeon_silver_4310txeon_e3-1280_v6_firmwarexeon_gold_6230t_firmwarexeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_platinum_8380xeon_gold_6314u_firmwarecore_i7-3940xmpentium_gold_7505_firmwareatom_x5-e3930_firmwarecore_i3-7100h_firmwarecore_i5-8300h_firmwarexeon_silver_4208_firmwarecore_i7-4940mxxeon_platinum_8268xeon_e5-2650_v4_firmwarepentium_j2850_firmwarepentium_n3530core_i7-4930kpentium_gold_8505_firmwarecore_i7-8565uxeon_e5-2687w_v4xeon_e5-2630_v4_firmwareceleron_n3350_firmwarepentium_gold_g6400e_firmwarexeon_d-1747nte_firmwarecore_i9-9980xe_firmwareceleron_n2820core_i3-10300_firmwarecore_i5-7300hqcore_i7-7560uxeon_e5-4667_v3_firmwarepentium_gold_g5420tcore_i3-8100t_firmwarecore_i5-8259ucore_i7-4820kxeon_e5-2699a_v4_firmwarexeon_d-1529celeron_g5900txeon_w-1250_firmwarecore_i9-12900hk_firmwarepentium_gold_g5500xeon_w-3265m_firmwarexeon_w-11555mle_firmwarexeon_e5-4660_v4_firmwarecore_i7-8850h_firmwarepentium_n3710_firmwarecore_i7-9700kf_firmwarecore_i9-7900x_firmwarecore_i3-10105core_i7-9850h_firmwarexeon_d-1713ntxeon_gold_6146_firmwarepentium_gold_g6405_firmwarexeon_e5-2630l_v4_firmwarexeon_gold_5218_firmwarexeon_gold_6132xeon_d-2799xeon_e5-2618l_v3_firmwarecore_i5-7600tpentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwarexeon_e5-2618l_v4core_i9-10900k_firmwarexeon_w-1270_firmwarecore_i7-1280p_firmwarexeon_d-1736ntxeon_w-2135xeon_silver_4316_firmwarecore_i3-10300t_firmwarexeon_gold_6142core_i5-9300hpentium_gold_g6500xeon_d-1722necore_i3-7167u_firmwarecore_i7-8559u_firmwarexeon_e5-4610_v4_firmwarecore_i9-10920x_firmwarexeon_gold_5220t_firmwarecore_i7-8086k_firmwarecore_i7-10610uxeon_gold_5220_firmwarecore_i5-1035g1_firmwarecore_i7-12850hx_firmwarecore_i7-8665u_firmwareceleron_g1620core_i7-8500ycore_i5-9400hxeon_e5-4640_v3_firmwarexeon_gold_6338ncore_i9-9900txeon_e5-2680_v4_firmwareatom_c3436lxeon_gold_6208u_firmwarexeon_d-2796nt_firmwarexeon_e5-1630_v4_firmwarexeon_platinum_8360hxeon_w-1390pxeon_d-1749nt_firmwarexeon_gold_6250_firmwarecore_i7-9700e_firmwarecore_i7-7820hqxeon_e5-2620_v3xeon_e5-2648l_v3core_i3-8300t_firmwarecore_i3-8109u_firmwarecore_i5-7400_firmwarexeon_e5-2609_v3celeron_n3060_firmwarexeon_gold_6254_firmwarecore_i7-9700k_firmwarexeon_e5-2438l_v3core_i9-10980xe_firmwarexeon_platinum_8368qceleron_n4000celeron_n2830xeon_silver_4310xeon_e5-2650_v3xeon_e5-1650_v4_firmwarecore_i7-12800hcore_i3-10300txeon_gold_6258r_firmwarexeon_silver_4314_firmwarecore_i3-8100b_firmwareceleron_n3450core_i3-7101exeon_e5-2683_v3_firmwareceleron_n5100core_i9-7900xceleron_n2805_firmwarecore_i9-8950hk_firmwarexeon_gold_6209uceleron_g3930_firmwarexeon_d-1539_firmwarexeon_silver_4112xeon_w-3223celeron_j6412xeon_d-1559core_i7-3920xm_firmwarepentium_gold_g6600celeron_n2810xeon_w-3323xeon_w-2235_firmwareceleron_g1610tcore_i5-8265uxeon_platinum_8376h_firmwarepentium_gold_g6605core_i7-4930mxatom_c3558core_i7-5930kxeon_platinum_8352sceleron_g5925core_i7-7y75xeon_e5-2648l_v4_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarexeon_d-2183it_firmwareatom_c3308core_i5-7y57celeron_g3920_firmwarexeon_e5-4627_v3core_i7-10700_firmwarexeon_gold_6148core_i3-8350kxeon_e3-1505m_v6xeon_gold_6144core_i5-7500txeon_d-1736nt_firmwarecore_i3-9100core_i9-12900hxcore_i5-9600k_firmwarecore_i5-1250pxeon_platinum_9282_firmwarecore_i7-12700h_firmwareatom_c3758atom_c3558rpentium_gold_g5600celeron_j4125atom_c3830xeon_gold_5220txeon_platinum_8276latom_c3750celeron_g4950_firmwareceleron_j1750core_i7-7700kcore_i7-8705gxeon_platinum_9222core_i5-9500exeon_gold_6230tcore_i5-12450h_firmwarecore_i7-7660uxeon_d-1627_firmwarecore_i7-8706gxeon_gold_6126tatom_c3558r_firmwarexeon_w-3225core_i7-12700hcore_i9-9880h_firmwarexeon_w-1370core_i7-8700t_firmwarexeon_e5-2408l_v3pentium_gold_4415u_firmwareatom_c3950_firmwarexeon_e3-1240_v6core_i5-12600hx_firmwareceleron_n6210core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarexeon_w-2155_firmwarecore_i7-8700pentium_j3710_firmwarexeon_e7-4850_v3_firmwarexeon_platinum_8380h_firmwarecore_i7-8705g_firmwarexeon_d-1746ter_firmwarecore_i9-10900te_firmwarecore_i7-7700tcore_i3-7100tcore_i7-5960x_firmwarexeon_w-3225_firmwarepentium_gold_8500core_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_w-2295core_i5-10210ucore_i5-7260u_firmwarecore_i5-12450hcore_i5-7600k_firmwarexeon_e5-2697_v3_firmwarecore_i5-8257ucore_i7-8700kcore_i7-1260ppentium_gold_g6405tceleron_n2830_firmwarexeon_e3-1270_v6_firmwarexeon_e5-2658_v3_firmwarexeon_silver_4316core_i5-7200u_firmwarecore_i7-10510u_firmwarecore_i5-7442eqxeon_gold_5215xeon_e5-2667_v3xeon_d-2745nx_firmwarexeon_e7-4820_v3celeron_g1610_firmwarexeon_d-2143itcore_i3-10100_firmwarexeon_e5-2699_v4xeon_gold_6244_firmwarexeon_e3-1285_v6core_i5-10505xeon_d-2161i_firmwarecore_i5-1030g7pentium_gold_g7400e_firmwarexeon_e3-1225_v6core_i5-7442eq_firmwarecore_i7-8569u_firmwarepentium_n6415core_i7\+8700_firmwarexeon_e5-2699_v3_firmwarexeon_silver_4109txeon_bronze_3206r_firmwarexeon_e5-2643_v4_firmwarexeon_e5-2690_v3xeon_silver_4215rceleron_g1620t_firmwareceleron_g1820_firmwarecore_i3-10110ucore_i5-10600kf_firmwarexeon_gold_6138fxeon_e5-1630_v3xeon_gold_6136_firmwarexeon_gold_6330xeon_silver_4210txeon_platinum_8362_firmwarexeon_gold_6212u_firmwarexeon_e5-2680_v3core_i5-10310u_firmwarexeon_silver_4310t_firmwarexeon_gold_6212uxeon_e5-2697_v4_firmwarepentium_silver_n6000_firmwarecore_i9-7980xexeon_silver_4114xeon_gold_6240l_firmwarexeon_e5-4655_v3_firmwarexeon_d-2123it_firmwarecore_i3-9100hl_firmwarecore_i3-10105fceleron_g4900t_firmwarecore_i3-8100hpentium_gold_4415yxeon_bronze_3104core_i5-10300hxeon_gold_6238lxeon_e5-2637_v3xeon_e5-2699_v4_firmwarexeon_platinum_8353hxeon_w-11865mleceleron_n3050_firmwarecore_i3-1005g1_firmwarexeon_gold_6338_firmwarexeon_e7-8880l_v3_firmwarecore_i5-7300uxeon_e3-1505l_v6_firmwareceleron_j3455_firmwarecore_i5-8500txeon_w-3265mxeon_d-1627core_i5-7500xeon_d-2796ntceleron_n2910xeon_gold_5320hxeon_platinum_8260y_firmwareceleron_j1800_firmwarepentium_gold_g7400_firmwarexeon_d-2779xeon_d-1602pentium_gold_g6500tcore_i5-7200ucore_i5-8350u_firmwareceleron_g1820txeon_d-2796te_firmwareceleron_g3930exeon_gold_6338txeon_e5-2630l_v3_firmwarexeon_gold_6150xeon_gold_6240y_firmwarecore_i9-10850kxeon_e5-2690_v4pentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarexeon_e5-2658_v4_firmwarecore_i9-9900ks_firmwarepentium_gold_g6400tcore_i5-8400tcore_i3-9300_firmwarexeon_d-2145nt_firmwarepentium_gold_g5600tceleron_g3930txeon_w-1270pcore_i7-10700core_i9-10920xcore_i7-6950x_firmwarecore_i3-9100te_firmwareceleron_j4105_firmwarexeon_w-1290_firmwarexeon_d-2712tcore_i7-10750h_firmwarexeon_d-1541_firmwarexeon_w-1290e_firmwarexeon_gold_5318nceleron_g4920_firmwarecore_i5-1240p_firmwarecore_i3-10105txeon_w-1250epentium_silver_n5000core_i3-10325core_i9-12950hxxeon_d-1623n_firmwarecore_i3-7100hcore_i3-7101te_firmwarexeon_d-1548_firmwareatom_c3850_firmwarexeon_gold_6342_firmwarecore_i7-10875hxeon_gold_6130f_firmwarexeon_e5-2690_v3_firmwareceleron_n3350e_firmwarexeon_d-1559_firmwarexeon_platinum_8356hpentium_gold_g5400_firmwarexeon_e5-4648_v3_firmwarecore_i3-10100core_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarexeon_e5-2697a_v4_firmwarexeon_e5-4650_v3core_i7-10700f_firmwarecore_i5-7640x_firmwareceleron_j1900xeon_gold_5318h_firmwarexeon_d-1540_firmwarecore_i5-9400xeon_silver_4214y_firmwarexeon_d-1733nt_firmwarecore_i3-8100txeon_d-2733ntxeon_e5-1650_v3_firmwareceleron_n4505xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_gold_5320h_firmwareatom_x5-e3930xeon_d-2142it_firmwarecore_i5-7500t_firmwarecore_i3-1210u_firmwareceleron_g4930t_firmwarexeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_silver_4314xeon_gold_5318n_firmwarexeon_d-2753nt_firmwarexeon_e5-4627_v3_firmwarecore_i9-10900e_firmwarecore_m3-7y30_firmwarexeon_gold_5119txeon_gold_6246rcore_i7-9750h_firmwareatom_c3338rpentium_gold_g4620_firmwarexeon_w-11865mrexeon_gold_5217celeron_j1850_firmwarepentium_gold_4415uxeon_e5-2687w_v4_firmwarepentium_silver_n5030core_i5-1038ng7xeon_gold_5222_firmwarexeon_w-3245core_i7-10700e_firmwareceleron_n2920_firmwarecore_i3-10110y_firmwarecore_i5-1035g4_firmwareceleron_g1850_firmwarecore_i5-8500bxeon_e5-2618l_v3xeon_d-1523ncore_i5-8269uxeon_e5-2608l_v3xeon_d-2786ntexeon_e5-4660_v3_firmwarecore_i7-10700teceleron_n3000xeon_d-1653ncore_i7-8709g_firmwarexeon_silver_4114txeon_gold_6240yxeon_e5-4669_v4atom_x5-e3940_firmwareceleron_n4100_firmwarecore_i5-10500e_firmwarexeon_d-1543n_firmwareceleron_g3900txeon_w-1270p_firmwarexeon_w-2195_firmwarexeon_gold_6208ucore_i5-8279u_firmwarecore_i5-9500f_firmwarexeon_w-1290ecore_i5-10600t_firmwarexeon_gold_6252n_firmwarecore_i5-10210y_firmwarexeon_e5-1650_v3core_i3-7350kxeon_w-2265_firmwarecore_i7-1250u_firmwarexeon_e7-8891_v3xeon_gold_6230r_firmwarecore_i5-8250ucore_i3-10305xeon_d-1571_firmwareceleron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700txeon_w-1370p_firmwarecore_i7-7820eqatom_c3850xeon_gold_6252ncore_i5-1230u_firmwarexeon_gold_6244celeron_n3450_firmwarexeon_w-1290t_firmwarexeon_e5-2695_v3core_i3-1215u_firmwarexeon_gold_6330_firmwareceleron_n2805core_i7-8650u_firmwarexeon_w-3245_firmwarexeon_gold_6226_firmwareceleron_j1750_firmwarecore_i3-9350kfxeon_w-1370pcore_i9-9900k_firmwarecore_i7-7700k_firmwarexeon_gold_5320_firmwarexeon_w-2135_firmwarecore_i7-4960x_firmwarexeon_gold_6152_firmwarexeon_d-2757nxxeon_gold_6354xeon_e5-1660_v3xeon_d-1520xeon_platinum_8176f_firmwarexeon_platinum_8354h_firmwarexeon_platinum_8256xeon_e5-2623_v3xeon_gold_6238l_firmwarecore_i7-6850k_firmwarexeon_platinum_8158core_i9-9900xxeon_e5-2418l_v3atom_c3508_firmwarexeon_d-1739_firmwarexeon_gold_5318hcore_i5-1245uxeon_w-2125_firmwarexeon_d-1520_firmwarecore_i5-8365u_firmwarecore_i5-10500hxeon_w-2175_firmwarexeon_silver_4112_firmwarexeon_e3-1275_v6xeon_d-1531core_i3-9300txeon_gold_6262v_firmwarecore_i3-8100h_firmwarexeon_platinum_8260yceleron_j6413xeon_w-1370_firmwarexeon_e7-8867_v3core_i9-9980xexeon_gold_6128core_i7-10875h_firmwarexeon_d-2142itcore_i5-10500t_firmwarecore_i3-7130uceleron_j4005_firmwarecore_i5-8265u_firmwarexeon_gold_6130fxeon_w-11955mcore_i7-12800h_firmwareceleron_j3060_firmwarexeon_silver_4210t_firmwarecore_i9-10900x_firmwarecore_i7-6800kpentium_gold_g6400eceleron_n2920xeon_e3-1505m_v6_firmwarepentium_gold_7505pentium_n3520_firmwareceleron_g3930te_firmwarecore_i5-10600xeon_platinum_8276pentium_n3700_firmwarecore_i7\+8700xeon_e5-1660_v4_firmwarexeon_gold_6348core_i9-12900hxeon_e5-4628l_v4core_m3-7y30core_i3-9350kxeon_w-1350core_i5-8500_firmwarexeon_platinum_8368_firmwarexeon_e5-2680_v3_firmwarexeon_w-11155mle_firmwarexeon_gold_6138pcore_i7-8665uexeon_gold_6138p_firmwareceleron_g4950core_i7-1265u_firmwareceleron_j3455ecore_i7-7700t_firmwarexeon_gold_5320t_firmwarexeon_w-3275_firmwarexeon_d-1748texeon_e7-8890_v3core_i3-10320xeon_e5-2623_v4_firmwarecore_i5-8200yxeon_w-11855m_firmwareatom_c3808celeron_g3900t_firmwarexeon_w-2275pentium_n3710xeon_d-1543nceleron_n4020xeon_d-1528_firmwareceleron_g4900_firmwarecore_i5-7440hqceleron_g1620txeon_e3-1245_v6_firmwarexeon_d-1521xeon_d-1702core_i7-5960xcore_i9-10940x_firmwarexeon_gold_6342xeon_w-1350pxeon_gold_6230rxeon_e5-2637_v3_firmwarecore_i7-8569upentium_gold_g6405u_firmwareatom_c3950core_i7-7700_firmwareceleron_g3950_firmwarexeon_platinum_8353h_firmwarecore_i5-10500txeon_d-1712tr_firmwarexeon_e5-4650_v4_firmwarecore_i7-12850hxxeon_d-2798nx_firmwarexeon_gold_5318yceleron_j3355_firmwarexeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rcore_i5-12600hxcore_i3-8100bcore_i5-9600tcore_i3-7101e_firmwarecore_i3-7020u_firmwarexeon_gold_6334_firmwarexeon_d-2775tecore_i3-9320xeon_silver_4110_firmwareceleron_n2910_firmwarecore_i7-1065g7core_i9-10900texeon_platinum_8180core_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230ucore_i3-8130uxeon_e5-2628l_v3_firmwarexeon_platinum_8276l_firmwarexeon_e5-2650l_v3xeon_platinum_8153atom_c3858_firmwarexeon_e5-1630_v3_firmwarexeon_w-10885m_firmwarepentium_silver_n5000_firmwarecore_i3-9100_firmwarexeon_w-3245mxeon_e5-4610_v4celeron_g1620_firmwarexeon_d-2738celeron_j1900_firmwarecore_i3-10105f_firmwarexeon_e3-1501l_v6_firmwarexeon_silver_4108_firmwarexeon_gold_6338xeon_e5-1680_v3pentium_gold_g5420xeon_d-2777nxcore_i7-9700kfxeon_e5-2608l_v3_firmwarecore_i7-3960x_firmwarepentium_gold_g5420t_firmwarexeon_gold_5115core_i5-8305g_firmwarecore_i5-7500_firmwarexeon_gold_6136core_i7-10870h_firmwarecore_i5-8400hceleron_j1850core_i7-1260uxeon_e5-4610_v3xeon_e7-8870_v3pentium_gold_g5420_firmwarecore_i5-7y54xeon_e5-4650_v4xeon_platinum_8360hl_firmwarexeon_gold_6138atom_c3336_firmwarexeon_e5-1660_v4xeon_e5-2699r_v4_firmwarexeon_gold_6326xeon_d-1521_firmwarecore_i7-4930mx_firmwarexeon_gold_5317_firmwarecore_i5-10200hxeon_d-1557_firmwarexeon_d-2775te_firmwarecore_i3-10100f_firmwarepentium_gold_g4560_firmwareatom_c3708_firmwarecore_i5-12500hcore_i3-8145ucore_i3-1220pxeon_gold_5318y_firmwarexeon_e5-1620_v3_firmwarecore_i5-9600_firmwarexeon_d-1714core_i3-7020uxeon_platinum_8268_firmwarexeon_e3-1501l_v6pentium_silver_n6000core_i3-8109uxeon_gold_6262vxeon_e5-2609_v4_firmwarexeon_platinum_8168xeon_d-1734nt_firmwarexeon_e5-2640_v3core_i5-7y57_firmwarexeon_e5-2418l_v3_firmwarecore_i7-9700f_firmwarexeon_e5-1620_v4xeon_e7-8880l_v3celeron_n4500core_i5-9500e_firmwarecore_i3-7100e_firmwarexeon_d-1567_firmwarecore_i3-7300core_i5-12600hxeon_e5-2630l_v3core_i7-12800hxxeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarecore_i5-10600_firmwarexeon_gold_5122xeon_platinum_8180_firmwarecore_i3-9100hlceleron_n3150xeon_silver_4210_firmwarexeon_platinum_8376hceleron_n5100_firmwarexeon_gold_6312u_firmwarexeon_w-3335_firmwareatom_c3436l_firmwarecore_i7-7600u_firmwareatom_c3338r_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarexeon_gold_6248rxeon_w-1250e_firmwarexeon_w-1250te_firmwarecore_i5-9500_firmwarexeon_e5-4627_v4_firmwarecore_i5-1240pxeon_silver_4214r_firmwarepentium_gold_g5620xeon_platinum_8276_firmwarexeon_w-1290tcore_i5-8400h_firmwareceleron_n4120xeon_w-11155mre_firmwarepentium_gold_g7400te_firmwarecore_i3-9100tepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i9-9820x_firmwarexeon_platinum_8156xeon_w-3345_firmwareceleron_g3930tepentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kceleron_n2840core_i5-10400t_firmwarexeon_d-1533n_firmwarecore_i3-8100xeon_w-2265xeon_silver_4309y_firmwarexeon_gold_5215_firmwarexeon_gold_5320xeon_e5-2667_v4pentium_n3540_firmwarexeon_w-10855mpentium_n3510xeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarexeon_gold_6126fxeon_d-1712trcore_i3-7300_firmwarecore_i5-1235u_firmwarexeon_w-3375_firmwarexeon_d-1713ntexeon_w-11555mrecore_i5-7287u_firmwarecore_i7-7700xeon_e5-1680_v4xeon_d-2752ter_firmwarepentium_j2900_firmwarexeon_silver_4114_firmwarepentium_n3700core_i7-7820hq_firmwarepentium_gold_g6505t_firmwarecore_i3-7102ecore_i7-7920hq_firmwarexeon_platinum_8280l_firmwarexeon_d-1577_firmwarexeon_e3-1240_v6_firmwarecore_i7-8700_firmwarexeon_e5-2658_v3xeon_e5-4660_v4xeon_gold_6250lceleron_g3900_firmwarecore_i5-8365uceleron_g6900t_firmwareceleron_j3060xeon_e3-1501m_v6xeon_gold_6210ucore_i7-5820k_firmwarecore_i5-9600kfxeon_d-2187ntcore_i5-8500b_firmwarexeon_d-1732teceleron_n3160core_i3-10100texeon_e5-2643_v3_firmwareceleron_g6900_firmwareceleron_g4930core_i5-7600xeon_platinum_8380hlpentium_n4200_firmwarecore_i9-7940xxeon_platinum_8158_firmwarexeon_w-3265_firmwarexeon_e5-2698_v3_firmwarecore_i7-10700fxeon_d-2776nt_firmwarecore_i9-9960xcore_i5-1030g4_firmwarexeon_gold_5120_firmwarexeon_w-1270te_firmwarecore_i7-8557u_firmwarepentium_gold_g4600_firmwarepentium_n3540core_i7-1068ng7_firmwarecore_i7-10750hxeon_platinum_8253xeon_e5-2630l_v4xeon_gold_6134_firmwarexeon_e5-4667_v4atom_c3958xeon_w-3235_firmwarecore_i3-8300xeon_w-1390xeon_gold_6242r_firmwarecore_i5-7400txeon_platinum_8358_firmwarexeon_silver_4116txeon_e5-2690_v4_firmwarexeon_e5-2630_v4xeon_d-1622xeon_e5-4610_v3_firmwarecore_i5-7260ucore_i7-8700bxeon_w-2145_firmwarexeon_e5-2643_v3xeon_d-2145ntcore_i9-12950hx_firmwarexeon_e5-1650_v4xeon_gold_6238celeron_j1800core_i7-7500u_firmwarexeon_e5-2630_v3xeon_w-1250pcore_i7-12650hcore_i7-7800xcore_i3-1215uxeon_e3-1275_v6_firmwarecore_i5-10210yxeon_e3-1225_v6_firmwarecore_i7-7820hk_firmwarexeon_e5-2623_v4core_i7-4930k_firmwarecore_i9-9900kf_firmwarexeon_e5-4620_v4_firmwarexeon_w-3275mcore_i5-9500fcore_i5-10210u_firmwarecore_i7-3820xeon_gold_5119t_firmwarecore_i5-10600txeon_d-1513n_firmwarecore_i7-9850hecore_i3-7300t_firmwarecore_i7-10700exeon_e5-1620_v4_firmwarepentium_gold_4410ycore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600pentium_gold_g6500t_firmwarexeon_gold_5315yxeon_e5-2637_v4_firmwarecore_i5-7300u_firmwarecore_i7-4960xcore_i3-9100fpentium_gold_g7400texeon_platinum_8354hpentium_gold_g5600t_firmwarexeon_bronze_3106core_i7-3940xm_firmwarexeon_gold_6338n_firmwarecore_i7-9750hfxeon_gold_6256_firmwarepentium_gold_6405uceleron_n3350atom_c3708core_i5-9300h_firmwarecore_i7-10700kceleron_g1820xeon_platinum_8351n_firmwarexeon_e7-8880_v3celeron_g5925_firmwarepentium_silver_j5005core_i3-9320_firmwarecore_i5-8400b_firmwarexeon_e3-1280_v6xeon_e7-8891_v3_firmwarecore_i7-9800x_firmwarecore_i3-8100_firmwarexeon_e5-2650l_v3_firmwarexeon_silver_4214rcore_i7-5820kxeon_e5-2697_v3xeon_d-1715ter_firmwarexeon_e5-4627_v4pentium_j2900core_i9-9880hcore_i7-10710ucore_i5-7287uxeon_d-1541core_i5-8500t_firmwarexeon_d-2141icore_i7-10700kfxeon_w-1350p_firmwarexeon_w-1250tecore_i7-1255u_firmwarexeon_d-1633n_firmwareceleron_g6900tpentium_gold_g4560xeon_d-2757nx_firmwarexeon_gold_6230n_firmwarexeon_e5-4620_v3_firmwarexeon_gold_5222core_i7-3930k_firmwarecore_m3-7y32_firmwarecore_i5-7300hq_firmwarecore_i7-8706g_firmwarexeon_w-2133_firmwareceleron_n4500_firmwarexeon_platinum_8360hlcore_i5-7400t_firmwarexeon_d-1548xeon_e5-4667_v4_firmwarepentium_gold_4415y_firmwarexeon_e3-1535m_v6xeon_platinum_8380_firmwarexeon_d-1649nxeon_platinum_9221core_i9-9900celeron_j3355e_firmwarexeon_w-11955m_firmwarexeon_e5-2603_v4_firmwareatom_c3308_firmwarecore_i7-10510y_firmwarecore_i3-10100e_firmwarecore_i7-9850hl_firmwarexeon_platinum_8160celeron_n2806xeon_gold_5115_firmwarexeon_platinum_8156_firmwareatom_x5-e3940xeon_w-11865mle_firmwarexeon_e5-2428l_v3xeon_gold_5118_firmwarecore_i5-1038ng7_firmwarecore_i3-8140uxeon_d-2738_firmwareceleron_g5905txeon_e5-2667_v3_firmwarexeon_e5-4648_v3core_i7-7800x_firmwarexeon_w-2225_firmwarexeon_platinum_8360h_firmwarecore_i3-10100te_firmwarexeon_gold_6148fxeon_d-2752terxeon_gold_6238t_firmwarecore_i3-7100_firmwareatom_c3338core_i9-9820xxeon_d-2795ntxeon_w-2155core_i7-7500ucore_i7-8550uceleron_g1840_firmwarexeon_e5-2623_v3_firmwarexeon_e5-2650l_v4_firmwareceleron_n3010core_i3-9100txeon_platinum_8160_firmwarexeon_d-2798nt_firmwareceleron_j4025xeon_d-1623npentium_j4205xeon_w-2145core_i5-8310y_firmwarecore_i5-12600h_firmwarepentium_gold_4425ycore_i9-9900x_firmwarexeon_e5-4650_v3_firmwarexeon_gold_6148_firmwarexeon_w-3323_firmwarecore_i9-10900_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_d-1718t_firmwarexeon_d-1622_firmwarecore_i5-10505_firmwarecore_i3-7167ucore_i7-7567uxeon_w-2295_firmwarecore_i3-8145u_firmwarexeon_silver_4214celeron_n3160_firmwarexeon_gold_5315y_firmwarexeon_d-2161iatom_c3858xeon_platinum_8164_firmwarexeon_silver_4210rxeon_d-2141i_firmwarecore_i5-10300h_firmwarepentium_silver_n6005core_i7-7660u_firmwareceleron_n2820_firmwareatom_c3558_firmwarecore_i5-8210yceleron_n6211xeon_e5-2670_v3xeon_gold_5218bxeon_e5-4640_v4_firmwarecore_i7-8750h_firmwarecore_i5-10200h_firmwareatom_x7-e3950_firmwarecore_i3-7300txeon_e5-1680_v4_firmwarexeon_silver_4216_firmwareceleron_n6210_firmwareceleron_n6211_firmwareceleron_n3010_firmwarecore_i3-9100f_firmwarecore_i5-7y54_firmwarexeon_e5-2648l_v4pentium_gold_g6400_firmwarexeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_w-1290tecore_i5-8500core_i5-7600_firmwarecore_i5-9500te_firmwarexeon_gold_6130_firmwarexeon_w-3275m_firmwarepentium_n3510_firmwarexeon_e5-2630_v3_firmwarexeon_gold_5120txeon_w-3175xxeon_gold_6134celeron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarexeon_e5-2628l_v3xeon_w-3235xeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarecore_i7-9750hxeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_e5-4669_v3xeon_w-2225pentium_gold_g6405core_i7-7560u_firmwarexeon_w-2133xeon_d-2753ntxeon_d-1557core_i3-10305tpentium_silver_j5040xeon_gold_6328hlxeon_d-1726core_i9-9900t_firmwarepentium_gold_g5500_firmwarepentium_gold_g7400t_firmwarexeon_e7-8860_v3_firmwarexeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_e5-2687w_v3_firmwarexeon_w-2223xeon_silver_4210r_firmwarecore_i9-7920x_firmwarexeon_platinum_8170_firmwarecore_i7-8665uceleron_n2940_firmwarecore_i3-8300txeon_platinum_8362core_i7-12650hxxeon_gold_6140_firmwarecore_i7-6950xpentium_gold_g5620_firmwarecore_i7-10850hxeon_gold_6338t_firmwarecore_i3-1210uceleron_g1820t_firmwarexeon_gold_6238_firmwareceleron_g5905core_i9-7960x_firmwareceleron_g3950xeon_silver_4309ycore_i3-7130u_firmwarexeon_w-1290te_firmwarexeon_e5-2640_v4_firmwarecore_i5-8400core_i3-10300xeon_gold_6354_firmwareatom_c3955_firmwarexeon_gold_6246celeron_n2930_firmwarecore_i7-8086kpentium_gold_g5500t_firmwarexeon_e5-2603_v3_firmwarexeon_d-2776ntxeon_d-1527_firmwarexeon_d-2798ntxeon_d-1733ntpentium_gold_5405u_firmwarecore_i5-8365ue_firmwarexeon_e5-2683_v4_firmwarexeon_w-3245m_firmwarecore_i5-1240u_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-4628l_v4_firmwareatom_c3758r_firmwarecore_i5-12500h_firmwarexeon_e5-2603_v3celeron_n2940core_i5-8600k_firmwarexeon_e7-8870_v3_firmwarexeon_e3-1285_v6_firmwareceleron_j3455xeon_e5-4655_v3xeon_e5-2620_v4_firmwarexeon_d-2163itxeon_d-2779_firmwarexeon_w-1390tceleron_n2807_firmwarexeon_w-1270atom_c3538core_i5-10310y_firmwarepentium_gold_4417uxeon_d-2777nx_firmwarecore_i7-10510ycore_i3-1000g1xeon_e5-4655_v4xeon_gold_5215lxeon_gold_5122_firmwarexeon_silver_4215_firmwarecore_i5-7360u_firmwarexeon_w-2275_firmwarecore_i5-8210y_firmwareceleron_j3160xeon_e5-2658_v4celeron_n3150_firmwarecore_i3-9100e_firmwarexeon_gold_6132_firmwarecore_i9-7960xxeon_e7-8893_v3_firmwarecore_i7-7820xceleron_g3900core_i5-9600kceleron_g5905t_firmwarecore_i3-10305t_firmwarexeon_d-1531_firmwarecore_i7-7700hqxeon_w-1270texeon_e7-4830_v3atom_c3750_firmwareceleron_n5105_firmwarecore_i9-10900f_firmwarecore_i9-12900hkxeon_e5-2698_v3core_i3-9100t_firmwarexeon_e7-8880_v3_firmwarexeon_gold_6250l_firmwarexeon_d-1715teratom_c3508core_i3-1220p_firmwareceleron_g5900xeon_e5-2648l_v3_firmwarexeon_gold_6258rxeon_d-1571xeon_gold_6240lxeon_d-1736_firmwarexeon_e5-1620_v3xeon_gold_6250core_i5-8350uxeon_gold_6348hceleron_n4000_firmwarexeon_w-3223_firmwarexeon_d-2173itceleron_g1830_firmwarexeon_w-11855mceleron_g3930xeon_d-2123itceleron_g3930t_firmwarecore_i3-10100y_firmwareceleron_n2806_firmwarexeon_gold_5218n_firmwarecore_i9-12900hx_firmwarexeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_w-2255_firmwarexeon_platinum_8358p_firmwarexeon_gold_6144_firmwarexeon_e5-2695_v4_firmwarexeon_e5-2687w_v3xeon_e5-1428l_v3_firmwarexeon_gold_6330h_firmwarexeon_e5-2680_v4core_i7-8700b_firmwarexeon_gold_5218tcore_i9-8950hkxeon_e5-2697a_v4core_i9-10900exeon_e7-4809_v3_firmwarexeon_gold_6242_firmwarexeon_gold_6140xeon_d-1649n_firmwarexeon_e5-2609_v4core_i7-7920hqcore_i5-9300hf_firmwarexeon_w-2123_firmwarexeon_gold_6148f_firmwarexeon_platinum_8356h_firmwarexeon_e3-1501m_v6_firmwarecore_i7-12800hx_firmwarexeon_d-1726_firmwarexeon_d-1537_firmwarecore_i3-7350k_firmwarexeon_gold_6126xeon_d-2166nt_firmwarecore_i9-10885hxeon_platinum_8358pxeon_d-2712t_firmwareceleron_g1840t_firmwarexeon_w-3375xeon_e5-2643_v4xeon_e5-2699a_v4celeron_g1840xeon_d-1713nte_firmwarexeon_gold_6328hl_firmwarecore_i3-9300xeon_gold_5218r_firmwarexeon_w-3365xeon_platinum_8352m_firmwarexeon_e7-8860_v3core_i9-9900kcore_i3-9350kf_firmwarexeon_e5-2698_v4_firmwarexeon_gold_6142fceleron_g1630core_i7-8709gceleron_j4025_firmwarexeon_platinum_8153_firmwarepentium_silver_j5040_firmwarexeon_gold_6130xeon_e5-2650l_v4xeon_d-1529_firmwarepentium_gold_4417u_firmwarexeon_d-1637_firmwarecore_i9-9920xcore_m3-8100y_firmwarecore_i7-8557uxeon_silver_4214_firmwareceleron_g4930_firmwarecore_i5-9500tceleron_g1610core_i5-8260u_firmwarexeon_d-2143it_firmwarecore_i7-8700txeon_platinum_9242core_i3-10305_firmwarexeon_d-1735trcore_m3-7y32core_i5-7400xeon_d-2795nt_firmwarexeon_platinum_8280lxeon_e7-4850_v3celeron_n2810_firmwarexeon_d-1523n_firmwarexeon_d-2752ntecore_i3-7102e_firmwarexeon_platinum_8352y_firmwarexeon_platinum_8280_firmwarecore_i3-7320xeon_e5-2408l_v3_firmwarexeon_e5-4669_v3_firmwarexeon_platinum_8358xeon_w-1390_firmwarexeon_e3-1230_v6atom_c3758_firmwarexeon_e7-8867_v3_firmwarepentium_gold_g7400core_i5-1035g1xeon_gold_6230nxeon_w-3265core_i7-8565u_firmwarexeon_gold_6246_firmwarexeon_gold_5218nxeon_gold_6138tpentium_gold_4425y_firmwarexeon_e5-2620_v4xeon_d-1718txeon_gold_6248r_firmwarexeon_platinum_9221_firmwarexeon_gold_5120core_i5-7600t_firmwarecore_i5-1250p_firmwarexeon_gold_6326_firmwareceleron_n3050core_i9-7980xe_firmwarecore_i5-7440hq_firmwarecore_i5-1030g4pentium_gold_8500_firmwarecore_i3-9100exeon_gold_6154_firmwarexeon_gold_5220core_i5-10500xeon_d-1637xeon_d-1577celeron_g3930e_firmwarexeon_gold_6254xeon_silver_4209t_firmwarecore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarexeon_platinum_8176_firmwarexeon_gold_6154core_i5-7440eqpentium_silver_j5005_firmwarexeon_gold_5215l_firmwarexeon_platinum_8351ncore_i7-7820x_firmwarexeon_w-1250xeon_platinum_8376hl_firmwarecore_i7-1265uxeon_e5-2640_v4xeon_gold_6330n_firmwarecore_i5-8279ucore_i3-8130u_firmwarexeon_d-1722ne_firmwarexeon_gold_6336yceleron_g3920xeon_platinum_8352vcore_i3-7100ucore_i5-9300hfxeon_d-1747ntexeon_gold_5120t_firmwareceleron_g1850xeon_d-1653n_firmwarepentium_gold_g6505_firmwarecore_i3-7101texeon_d-1734ntxeon_w-3275xeon_d-1735tr_firmwarecore_i5-7600kcore_i7-4820k_firmwarexeon_platinum_8270_firmwarexeon_e5-2640_v3_firmwarexeon_d-1553ncore_i3-8140u_firmwarecore_i3-1000g4_firmwareatom_c3808_firmwareatom_c3955xeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_gold_6234_firmwarexeon_gold_6210u_firmwarecore_i3-7100t_firmwarexeon_d-1633ncore_i7-9850hlceleron_g1840tcore_i5-7360ucore_i7-1255uxeon_gold_5218t_firmwarexeon_gold_6248core_i5-10600kxeon_platinum_8260l_firmwarexeon_d-1518_firmwarepentium_n3530_firmwarexeon_e3-1220_v6xeon_platinum_8280core_m3-8100yxeon_platinum_8380hl_firmwarecore_i5-8250u_firmwarexeon_w-11155mrecore_i9-10900kfpentium_n4200xeon_e5-2438l_v3_firmwarepentium_gold_g4620core_i3-7320_firmwareceleron_n4120_firmwarecore_i7-7567u_firmwarexeon_gold_6336y_firmwarecore_i7-9700ecore_i5-8400_firmwarecore_i7-7700hq_firmwarexeon_platinum_8352mceleron_n3350exeon_d-2146nt_firmwarexeon_gold_6152core_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarexeon_e5-2658a_v3core_i5-10310yxeon_gold_5218b_firmwarexeon_gold_6330hcore_i5-8400t_firmwarexeon_w-1290pxeon_gold_6222vxeon_d-1713nt_firmwarexeon_w-11155mlepentium_j6426core_i7-3820_firmwarexeon_platinum_8176xeon_platinum_8376hlcore_i5-8260uxeon_gold_6242celeron_n2808core_i7-10810u_firmwarecore_i3-10100t_firmwarecore_i9-10900t_firmwarecore_i5-12450hx_firmwarepentium_silver_n6005_firmwarecore_i7-10810upentium_silver_n5030_firmwarecore_i5-10400f_firmwarexeon_e5-2660_v4_firmwarexeon_e5-2650_v4xeon_platinum_8270core_i3-10105_firmwarexeon_d-1533nxeon_w-1270e_firmwarexeon_gold_6242rxeon_e3-1245_v6celeron_j3160_firmwarexeon_silver_4215xeon_w-3175x_firmwarexeon_gold_6346xeon_w-2235core_i7-8850hceleron_j3455e_firmwarexeon_e5-2695_v4xeon_gold_5118core_i3-10100fcore_i3-8300_firmwareceleron_g4930tcore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i9-10900xceleron_n2815_firmwarexeon_gold_6142f_firmwarexeon_d-1702_firmwarexeon_gold_6238txeon_silver_4214yxeon_e5-2603_v4core_i5-8257u_firmwarecore_i9-10980xexeon_e5-2695_v3_firmwarecore_i9-10900kf_firmwarepentium_j4205_firmwarexeon_gold_6330ncore_i5-12450hxcore_i7-3970xceleron_n4020_firmwarecore_i9-10850k_firmwarecore_i5-8365uexeon_d-2798nxxeon_w-1290atom_c3338_firmwarecore_i7-8809g_firmwarexeon_platinum_8176fxeon_platinum_8352v_firmwarexeon_w-3345xeon_d-2745nxcore_i5-1235ucore_i9-10885h_firmwarecore_i7-12650hx_firmwarecore_i9-9980hk_firmwarepentium_n4200exeon_gold_6240rxeon_w-10885mceleron_g4900core_i5-1240ucore_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i9-10900tpentium_gold_g5400xeon_gold_6334core_i5-8310yxeon_d-2752nte_firmwarecore_i5-7640xxeon_d-1739core_i3-10110u_firmwarecore_i5-9500texeon_gold_6226xeon_gold_6256xeon_gold_6238r_firmwarecore_i5-9500t_firmwarecore_i7-6900k_firmwarexeon_gold_6252core_i7-9700te_firmwarexeon_d-1749ntxeon_d-1748te_firmwarexeon_e5-4640_v3core_i3-10320_firmwarepentium_gold_5405uxeon_gold_6346_firmwarecore_i3-1005g1celeron_j4005xeon_w-11865mre_firmwarexeon_gold_6328hxeon_gold_6252_firmwarecore_i7-4940mx_firmwarexeon_gold_6209u_firmwarecore_i9-9920x_firmwarecore_i5-8600tcore_i5-8305gcore_i7-10850h_firmwarexeon_e5-1428l_v3core_i5-9400t_firmwarecore_i7-8559uxeon_platinum_8260lxeon_d-1714_firmwarecore_i9-9980hkxeon_d-1602_firmwarecore_i7-9700_firmwarexeon_d-2177ntatom_c3958_firmwarepentium_gold_6500ypentium_gold_g6400xeon_w-2175Intel(R) Processors
CWE ID-CWE-691
Insufficient Control Flow Management
CVE-2022-41984
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 6.21%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-02 Oct, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure for some Intel(R) Arc(TM) graphics cards A770 and A750 Limited Edition sold between October of 2022 and December of 2022 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-arc_a750arc_a750_firmwarearc_a770arc_a770_firmwareIntel(R) Arc(TM) graphics cards A770 and A750 Limited Edition
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-41659
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-1.9||LOW
EPSS-0.04% / 9.67%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-03 Aug, 2024 | 12:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-unisonIntel Unison software
CWE ID-CWE-284
Improper Access Control
CVE-2022-36794
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.05% / 13.84%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper condition check in some Intel(R) SPS firmware before version SPS_E3_06.00.03.300.0 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_platform_servicesIntel(R) SPS firmware
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2022-36382
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.04% / 9.77%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 1.7.0.8 and some Intel(R) Ethernet 700 Series Controllers and Adapters before version 9.101 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_controller_e810-cam1ethernet_network_controller_e810-cam1_firmwareethernet_controller_xl710-am2_firmwareethernet_controller_x710-am2ethernet_controller_x710-bm2_firmwareethernet_converged_network_adapter_x710-da2_firmwareethernet_controller_x710-am2_firmwareethernet_controller_xxv710-am1ethernet_converged_network_adapter_xl710-da2_firmwareethernet_controller_xl710-am1ethernet_controller_xl710-bm2ethernet_converged_network_adapter_x710-da2ethernet_converged_network_adapter_x710-da4ethernet_controller_xxv710-am2_firmwareethernet_controller_xl710-am1_firmwareethernet_controller_x710-bm2ethernet_converged_network_adapter_xl710-da1_firmwareethernet_controller_xl710-bm1ethernet_network_controller_e810-cam2_firmwareethernet_controller_xl710-bm1_firmwareethernet_network_controller_e810-xxvam2ethernet_controller_xxv710-am2ethernet_network_controller_e810-cam2ethernet_converged_network_adapter_x710-da4_firmwareethernet_controller_xxv710-am1_firmwareethernet_network_controller_e810-xxvam2_firmwareethernet_converged_network_adapter_xl710-da2ethernet_converged_network_adapter_xl710-da1ethernet_controller_xl710-am2ethernet_controller_xl710-bm2_firmwareIntel(R) Ethernet Network Controllers and Adapters E810 Series and some Intel(R) Ethernet 700 Series Controllers and Adapters
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-34849
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 19.35%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncaught exception in the Intel(R) Iris(R) Xe MAX drivers for Windows before version 100.0.5.1436(v2) may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsiris_xe_max_dedicated_graphicsIntel(R) Iris(R) Xe MAX drivers for Windows
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2022-32582
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.57%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in firmware for some Intel(R) NUC Boards, Intel(R) NUC 11 Performance Kit, Intel(R) NUC 11 Performance Mini PC, Intel(R) NUC Pro Compute Element may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_11_pro_kit_nuc11tnki3_firmwarenuc_11_pro_kit_nuc11tnki70znuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnhi3nuc_11_pro_board_nuc11tnbi30z_firmwarenuc_11_performance_kit_nuc11pahi3_firmwarenuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_11_pro_board_nuc11tnbi3nuc_11_performance_kit_nuc11pahi3nuc_11_performance_mini_pc_nuc11paqi50wanuc_11_pro_kit_nuc11tnhi30znuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_11_pro_kit_nuc11tnhi30lnuc_11_performance_kit_nuc11pahi7nuc_11_performance_kit_nuc11pahi50z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_11_pro_kit_nuc11tnhi70qnuc_11_pro_board_nuc11tnbi50z_firmwarenuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarenuc_11_pro_kit_nuc11tnhi5nuc_11_performance_kit_nuc11pahi50znuc_9_pro_compute_element_nuc9v7qnbnuc_11_pro_kit_nuc11tnhi70q_firmwarenuc_11_performance_kit_nuc11pahi30znuc_11_pro_kit_nuc11tnhi7nuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnhi50lnuc_11_pro_kit_nuc11tnki7nuc_11_pro_board_nuc11tnbi7nuc_9_pro_kit_nuc9vxqnxnuc_11_performance_kit_nuc11pahi30z_firmwarenuc_11_performance_kit_nuc11paki5nuc_11_pro_board_nuc11tnbi50znuc_9_pro_kit_nuc9v7qnx_firmwarenuc_11_performance_kit_nuc11paki3_firmwarenuc_11_performance_kit_nuc11paki5_firmwarenuc_11_performance_kit_nuc11pahi70z_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_11_pro_kit_nuc11tnhi3_firmwarenuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_11_pro_board_nuc11tnbi5nuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_9_pro_compute_element_nuc9vxqnbnuc_11_pro_board_nuc11tnbi70z_firmwarenuc_11_performance_kit_nuc11pahi5_firmwarenuc_11_performance_kit_nuc11paki7nuc_11_performance_kit_nuc11pahi70znuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_11_performance_kit_nuc11pahi5nuc_11_performance_kit_nuc11paki3nuc_11_performance_kit_nuc11pahi7_firmwarenuc_11_pro_board_nuc11tnbi70znuc_11_pro_kit_nuc11tnhi30pnuc_11_pro_kit_nuc11tnhi7_firmwarenuc_11_pro_kit_nuc11tnhi70z_firmwarenuc_11_pro_kit_nuc11tnhi30z_firmwarenuc_11_pro_kit_nuc11tnki30znuc_11_performance_mini_pc_nuc11paqi70qanuc_11_pro_kit_nuc11tnhi70znuc_11_pro_kit_nuc11tnki50z_firmwarenuc_11_pro_kit_nuc11tnki50znuc_11_pro_kit_nuc11tnki5nuc_11_pro_kit_nuc11tnki30z_firmwarenuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_pro_board_nuc11tnbi30znuc_11_pro_kit_nuc11tnhi50z_firmwarenuc_9_pro_kit_nuc9v7qnxnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_pro_kit_nuc11tnhi50w_firmwarenuc_11_pro_kit_nuc11tnhi30l_firmwarenuc_11_pro_kit_nuc11tnki3nuc_11_pro_kit_nuc11tnhi70lnuc_11_pro_kit_nuc11tnhi50znuc_11_pro_kit_nuc11tnki70z_firmwarenuc_11_pro_kit_nuc11tnhi50wIntel(R) NUC Boards, Intel(R) NUC 11 Performance Kit, Intel(R) NUC 11 Performance Mini PC, Intel(R) NUC Pro Compute Element
CWE ID-CWE-284
Improper Access Control
CVE-2020-24480
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 17.06%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:45
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the Intel(R) XTU before version 6.5.3.25 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-extreme_tuning_utilityIntel(R) XTU
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-12154
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.32% / 54.77%
||
7 Day CHG~0.00%
Published-15 Oct, 2018 | 18:00
Updated-16 Sep, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel Graphics Driver
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2018-12210
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 32.05%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-17 Sep, 2024 | 03:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.

Action-Not Available
Vendor-Microsoft CorporationIntel Corporation
Product-graphics_driverwindowsIntel(R) Graphics Driver for Windows
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12166
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.50%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 20:00
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient write protection in firmware for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-optane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4800xIntel(R) Optane(TM) SSD DC P4800X
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12159
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.87%
||
7 Day CHG~0.00%
Published-18 Feb, 2019 | 17:00
Updated-16 Sep, 2024 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset\/wirelessn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12213
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.16% / 37.15%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 22:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12215
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.13% / 33.81%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-17 Sep, 2024 | 01:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12167
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.50%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 20:00
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Firmware update routine in bootloader for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-optane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4800xIntel(R) Optane(TM) SSD DC P4800X
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12151
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.87%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 21:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in installer for Intel Extreme Tuning Utility before 6.4.1.21 may allow an authenticated user to potentially cause a buffer overflow potentially leading to a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-extreme_tuning_utilityIntel(R) Extreme Tuning Utility
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-11139
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.12% / 31.15%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:18
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel CorporationopenSUSEDebian GNU/Linux
Product-xeon_8170mxeon_6132xeon_8160xeon_6126xeon_8158_firmwarexeon_8176fxeon_6154_firmwarexeon_8156xeon_6136_firmwarexeon_6134_firmwarexeon_8180_firmwarexeon_5120_firmwarexeon_8158xeon_8176f_firmwarexeon_6148fxeon_8168xeon_8168_firmwarexeon_8176_firmwarexeon_6138f_firmwarexeon_5118_firmwarexeon_8153_firmwarexeon_6130xeon_4110_firmwarexeon_6142leapxeon_6130_firmwarexeon_5119txeon_6126t_firmwarexeon_4114t_firmwarexeon_8160txeon_6126fxeon_8170_firmwarexeon_8160f_firmwarexeon_6138txeon_6152_firmwarexeon_8160t_firmwarexeon_6144_firmwarexeon_6128_firmwarexeon_8156_firmwarexeon_6126txeon_6148xeon_4109t_firmwaredebian_linuxxeon_8164xeon_3106xeon_8160m_firmwarexeon_5118xeon_6140m_firmwarexeon_5120t_firmwarexeon_8170xeon_8160mxeon_5115xeon_5122_firmwarexeon_4116txeon_5119t_firmwarexeon_6134m_firmwarexeon_4108_firmwarexeon_4112xeon_4109txeon_8176xeon_6128xeon_8170m_firmwarexeon_6130fxeon_8180xeon_6138fxeon_5122xeon_8160fxeon_4114txeon_4110xeon_3104xeon_6142fxeon_6144xeon_8180m_firmwarexeon_6130t_firmwarexeon_6140mxeon_5115_firmwarexeon_6130f_firmwarexeon_6150_firmwarexeon_6148_firmwarexeon_6146_firmwarexeon_6142f_firmwarexeon_6148f_firmwarexeon_6142_firmwarexeon_6138_firmwarexeon_8164_firmwarexeon_6154xeon_6138xeon_4116xeon_8176mxeon_6152xeon_6126_firmwarexeon_3106_firmwarexeon_4108xeon_4112_firmwarexeon_4116t_firmwarexeon_8176m_firmwarexeon_6150xeon_4114xeon_6140xeon_8180mxeon_6138t_firmwarexeon_5120xeon_6134mxeon_6146xeon_8160_firmwarexeon_6130txeon_6136xeon_4116_firmwarexeon_6140_firmwarexeon_6134xeon_8153xeon_3104_firmwarexeon_6132_firmwarexeon_6126f_firmwarexeon_4114_firmwarexeon_5120t2019.2 IPU – Intel(R) Xeon(R) Scalable Processors Voltage Setting Modulation
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2022-30339
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.58%
||
7 Day CHG+0.01%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in firmware for the Intel(R) Integrated Sensor Solution before versions 5.4.2.4579v3, 5.4.1.4479 and 5.0.0.4143 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-integrated_sensor_solutionIntel(R) Integrated Sensor Solution
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-28709
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 15.93%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:35
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the firmware for some Intel(R) E810 Ethernet Controllers before version 1.6.1.9 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_e810ethernet_controller_e810_firmwareIntel(R) E810 Ethernet Controllers
CVE-2020-12295
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:37
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Thunderbolt(TM) controllers may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-jhl7440_thunderbolt_3_firmwarejhl6240_thunderbolt_3_firmwarejhl7540_thunderbolt_3jhl8010r_usb_retimer_firmwarejhl6340_thunderbolt_3jhl7340_thunderbolt_3_firmwarejhl7040_thunderbolt_3_retimerdsl6540_thunderbolt_3dsl6340_thunderbolt_3_firmwarejhl6540_thunderbolt_3_firmwaredsl5320_thunderbolt_2_firmwaredsl6540_thunderbolt_3_firmwarejhl8010r_usb_retimerjhl7040_thunderbolt_3_retimer_firmwaredsl5520_thunderbolt_2jhl7540_thunderbolt_3_firmwarejhl6540_thunderbolt_3jhl8040r_thunderbolt_4_retimerjhl7340_thunderbolt_3dsl5320_thunderbolt_2jhl6240_thunderbolt_3jhl8040r_thunderbolt_4_retimer_firmwarejhl6340_thunderbolt_3_firmwaredsl6340_thunderbolt_3jhl7440_thunderbolt_3dsl5520_thunderbolt_2_firmwareIntel(R) Thunderbolt(TM) controllers
CWE ID-CWE-20
Improper Input Validation
CVE-2020-12363
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 30.99%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 00:00
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel Corporation
Product-graphics_driverslinux_kernelIntel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and
CWE ID-CWE-20
Improper Input Validation
CVE-2020-12291
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:37
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled resource consumption in some Intel(R) Thunderbolt(TM) controllers may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-jhl7440_thunderbolt_3_firmwarejhl6240_thunderbolt_3_firmwarejhl7540_thunderbolt_3jhl8010r_usb_retimer_firmwarejhl6340_thunderbolt_3jhl7340_thunderbolt_3_firmwarejhl7040_thunderbolt_3_retimerdsl6540_thunderbolt_3dsl6340_thunderbolt_3_firmwarejhl6540_thunderbolt_3_firmwaredsl5320_thunderbolt_2_firmwaredsl6540_thunderbolt_3_firmwarejhl8010r_usb_retimerjhl7040_thunderbolt_3_retimer_firmwaredsl5520_thunderbolt_2jhl7540_thunderbolt_3_firmwarejhl6540_thunderbolt_3jhl8040r_thunderbolt_4_retimerjhl7340_thunderbolt_3dsl5320_thunderbolt_2jhl6240_thunderbolt_3jhl8040r_thunderbolt_4_retimer_firmwarejhl6340_thunderbolt_3_firmwaredsl6340_thunderbolt_3jhl7440_thunderbolt_3dsl5520_thunderbolt_2_firmwareIntel(R) Thunderbolt(TM) controllers
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-12290
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:42
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in some Intel(R) Thunderbolt(TM) controllers may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-jhl7440_thunderbolt_3_firmwarejhl6240_thunderbolt_3_firmwarejhl7540_thunderbolt_3jhl8010r_usb_retimer_firmwarejhl6340_thunderbolt_3jhl7340_thunderbolt_3_firmwarejhl7040_thunderbolt_3_retimerdsl6540_thunderbolt_3dsl6340_thunderbolt_3_firmwarejhl6540_thunderbolt_3_firmwaredsl5320_thunderbolt_2_firmwaredsl6540_thunderbolt_3_firmwarejhl8010r_usb_retimerjhl7040_thunderbolt_3_retimer_firmwaredsl5520_thunderbolt_2jhl7540_thunderbolt_3_firmwarejhl6540_thunderbolt_3jhl8040r_thunderbolt_4_retimerjhl7340_thunderbolt_3dsl5320_thunderbolt_2jhl6240_thunderbolt_3jhl8040r_thunderbolt_4_retimer_firmwarejhl6340_thunderbolt_3_firmwaredsl6340_thunderbolt_3jhl7440_thunderbolt_3dsl5520_thunderbolt_2_firmwareIntel(R) Thunderbolt(TM) controllers
CVE-2020-12292
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:42
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in some Intel(R) Thunderbolt(TM) controllers may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-jhl7440_thunderbolt_3_firmwarejhl6240_thunderbolt_3_firmwarejhl7540_thunderbolt_3jhl8010r_usb_retimer_firmwarejhl6340_thunderbolt_3jhl7340_thunderbolt_3_firmwarejhl7040_thunderbolt_3_retimerdsl6540_thunderbolt_3dsl6340_thunderbolt_3_firmwarejhl6540_thunderbolt_3_firmwaredsl5320_thunderbolt_2_firmwaredsl6540_thunderbolt_3_firmwarejhl8010r_usb_retimerjhl7040_thunderbolt_3_retimer_firmwaredsl5520_thunderbolt_2jhl7540_thunderbolt_3_firmwarejhl6540_thunderbolt_3jhl8040r_thunderbolt_4_retimerjhl7340_thunderbolt_3dsl5320_thunderbolt_2jhl6240_thunderbolt_3jhl8040r_thunderbolt_4_retimer_firmwarejhl6340_thunderbolt_3_firmwaredsl6340_thunderbolt_3jhl7440_thunderbolt_3dsl5520_thunderbolt_2_firmwareIntel(R) Thunderbolt(TM) controllers
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-12358
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 13.42%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:50
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel CorporationSiemens AG
Product-xeon_platinum_8153xeon_e3-1230_v5xeon_e3-1558l_v5xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7e-series_bioscore_i7-1160g7xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-1660_v4simatic_ipc547g_firmwarexeon_e7-8891_v4xeon_platinum_8164xeon_e-2226gxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_w-2255xeon_d-1518core_i7-11700core_i7-6822eqcore_i7-6700texeon_e3-1501l_v6xeon_gold_6262vcore_i7-11370hxeon_e5-2683_v4xeon_platinum_8168core_i7-7600uxeon_e5-2608l_v4xeon_e5-2640_v3xeon_e-2224xeon_gold_5218xeon_e5-1620_v4core_i7-11850hxeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122xeon_w-2245xeon_d-1587xeon_e5-2699_v3xeon_d-2191xeon_gold_6248rcore_i7-7820hkxeon_e5-2689_v4xeon_e7-8870_v4xeon_w-1290tcore_i5-l16g7xeon_gold_6240core_i7-6970hqxeon_gold_6262xeon_platinum_8156xeon_e-2136core_i7-10510ucore_i7-1060g7xeon_w-2265xeon_e5-2667_v4xeon_platinum_8274xeon_w-10855mxeon_gold_6126fxeon_d-1539xeon_e3-1535m_v5xeon_e5-1680_v4core_i7-7700xeon_gold_5220rxeon_d-2146ntxeon_e3-1268l_v5xeon_platinum_8160fxeon_e5-2658_v3xeon_e5-4660_v4core_i7-8750hxeon_e3-1501m_v6xeon_gold_6250lxeon_gold_6210uxeon_d-2187ntxeon_platinum_8160mcore_i7-10700fxeon_d-2166ntxeon_e3-1270_v6xeon_e-2286mxeon_e3-1505m_v5core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_e5-2630l_v4xeon_w-2195xeon_e5-4667_v4xeon_e5-2628l_v4xeon_e-2276gxeon_e5-2685_v3xeon_w-1390xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622core_i7-8809gxeon_e5-4667_v3xeon_platinum_8160hcore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pxeon_silver_4208xeon_e3-1585_v5xeon_w-2104xeon_e5-2623_v4core_i7-6560uxeon_w-2123xeon_gold_5220sxeon_w-3275mxeon_platinum_9282xeon_e5-2683_v3core_i7-10700exeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-11700kfcloud_backupcore_i7-10870hxeon_e7-8867_v4xeon_bronze_3106xeon_w-2102xeon_e-2274gcore_i7-10700kxeon_e-2278gelxeon_d-1540xeon_e3-1280_v6hci_compute_node_biosxeon_e5-2698_v4xeon_platinum_8160tcore_i7-11700kxeon_d-1528xeon_silver_4214rcore_i7-6500uxeon_e5-2697_v3xeon_e5-4627_v4xeon_e-2124core_i7-10710uxeon_d-2141icore_i7-10700kfxeon_d-1541xeon_e5-2660_v4xeon_e7-4830_v4xeon_w-1250texeon_platinum_8268xeon_platinum_8176mxeon_e-2276mecore_i7-8565uxeon_gold_5222xeon_e5-2687w_v4xeon_e5-1603_v3core_i7-7560uxeon_gold_5117fxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e5-2428l_v3core_i7-6700hqxeon_e7-4809_v4xeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fxeon_gold_6132biosxeon_e5-2618l_v4xeon_w-2155xeon_gold_6137core_i7-7500ucore_i7-8550uxeon_e-2224gxeon_w-2135xeon_d-1623nxeon_w-2145xeon_e-2226gecore_i7-6650uxeon_gold_6142core_i7-10610ucore_i7-8500ycore_i7-7567uxeon_silver_4214xeon_w-1390pxeon_d-2161ixeon_silver_4210rxeon_d-1632core_i7-7820hqxeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_gold_5218bxeon_e5-2648l_v3xeon_gold_6142mxeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1240_v5xeon_e5-2650_v3xeon_gold_6222core_i7-6567uxeon_e5-2648l_v4xeon_e5-4620_v4xeon_e7-8855_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5xeon_w-1290texeon_e3-1225_v5xeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223xeon_gold_5120txeon_w-3175xxeon_gold_6134xeon_gold_6162xeon_e5-2628l_v3xeon_e-2254mexeon_w-3235core_i7-7y75xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133core_i7-6700xeon_d-1557xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6148xeon_e3-1505m_v6xeon_gold_6144xeon_gold_6140mxeon_gold_5220txeon_platinum_8276lxeon_w-2223xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_gold_6129xeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-6600ucore_i7-8706gxeon_gold_6126tcore_i7-11700fxeon_platinum_8165xeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_e-2236xeon_w-1370core_i7-10850hxeon_e5-1603_v4core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i7-8700core_i7-7700tcore_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_gold_6246core_i7-8086kxeon_w-2295core_i7-6770hqcore_i7-8700kxeon_e5-2603_v3fas_biosxeon_e-2134xeon_e5-2667_v3xeon_gold_5215xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_w-1390txeon_w-1270xeon_e3-1225_v6xeon_platinum_8284xeon_silver_4109tcore_i7-10510yxeon_e3-1240l_v5xeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5215lxeon_silver_4215rxeon_e5-2658_v4xeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_silver_4210txeon_e5-2680_v3xeon_gold_6212uxeon_e3-1205_v6core_i7-7700hqxeon_w-1270texeon_silver_4114xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5core_i7-6870hqxeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_gold_6250xeon_d-2173itcore_i7-11700txeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_w-3265mxeon_d-1627xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_5218txeon_e5-2697a_v4xeon_gold_6150xeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i7-10700core_i9-10920xxeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_gold_6126xeon_e3-1260l_v5xeon_w-1250exeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4core_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2176gxeon_gold_6142fcore_i3-l13g4core_i7-8709gxeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_e-2104gxeon_platinum_8260core_i7-8557usimatic_ipc547gcore_i7-8700txeon_platinum_9242core_i7-6820hqxeon_platinum_8280lxeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_gold_5119tcore_i7-1180g7core_i7-6700tcore_i7-6920hqxeon_gold_6246rxeon_e3-1230_v6xeon_gold_5217xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_w-3245xeon_gold_5120core_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3core_i7-10700texeon_e-2288gxeon_d-1653nxeon_gold_5220xeon_e-2234xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269yxeon_silver_4114tcore_i7-6700kxeon_gold_6240yxeon_e5-4669_v4aff_biosxeon_gold_6154xeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208uxeon_e7-8893_v4xeon_w-1290exeon_e5-1650_v3xeon_w-3275core_i7-11700bxeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633ncore_i7-7820eqxeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_e5-2695_v3xeon_gold_6248xeon_e3-1220_v6xeon_w-1370pxeon_platinum_8280xeon_e-2186mxeon_e5-1660_v3xeon_d-1520xeon_e-2176mcore_i7-6785rcore_i7-6820hkxeon_platinum_8256xeon_gold_6152core_i7-1060ng7xeon_e5-2623_v3xeon_platinum_8158xeon_e5-2658a_v3xeon_e5-2418l_v3xeon_w-1290pxeon_e-2286gxeon_gold_6222vxeon_platinum_8176xeon_gold_6242xeon_e3-1275_v6xeon_d-1531core_i7-10810uxeon_e3-1575m_v5xeon_e-2278gxeon_e5-2650_v4xeon_platinum_8260yxeon_e3-1505l_v5xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_platinum_8180mcore_i7-8850hxeon_gold_5118xeon_w-2235xeon_e5-2695_v4xeon_gold_6130fxeon_w-11955mcore_i7-6820eqxeon_gold_6134mcore_i9-10900xxeon_platinum_8276xeon_gold_6238txeon_e3-1235l_v5xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-4628l_v4xeon_e7-8860_v4xeon_w-1350xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_w-1290xeon_platinum_8176fxeon_d-1524nsolidfire_biosxeon_gold_6240rxeon_w-10885mxeon_w-2275xeon_d-1543nxeon_gold_6226xeon_e-2144gxeon_gold_6256xeon_d-1521xeon_w-1350pxeon_gold_6230rcore_i7-8569uxeon_gold_6252xeon_e5-4640_v3core_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_platinum_8170mxeon_e-2146gxeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175Intel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12372
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:53
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unchecked return value in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CWE ID-CWE-252
Unchecked Return Value
CVE-2020-12365
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 14:03
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted pointer dereference in some Intel(R) Graphics Drivers before versions 15.33.51.5146, 15.45.32.5145, 15.36.39.5144 and 15.40.46.5143 may allow an authenticated user to potentially denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-12296
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:37
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled resource consumption in some Intel(R) Thunderbolt(TM) controllers may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-jhl7440_thunderbolt_3_firmwarejhl6240_thunderbolt_3_firmwarejhl7540_thunderbolt_3jhl8010r_usb_retimer_firmwarejhl6340_thunderbolt_3jhl7340_thunderbolt_3_firmwaredsl6540_thunderbolt_3jhl7040_thunderbolt_3_retimerdsl6340_thunderbolt_3_firmwarejhl6540_thunderbolt_3_firmwaredsl5320_thunderbolt_2_firmwaredsl6540_thunderbolt_3_firmwarejhl8010r_usb_retimerjhl7040_thunderbolt_3_retimer_firmwaredsl5520_thunderbolt_2jhl7540_thunderbolt_3_firmwarejhl6540_thunderbolt_3jhl8040r_thunderbolt_4_retimerjhl7340_thunderbolt_3dsl5320_thunderbolt_2jhl6240_thunderbolt_3jhl8040r_thunderbolt_4_retimer_firmwarejhl6340_thunderbolt_3_firmwaredsl6340_thunderbolt_3jhl7440_thunderbolt_3dsl5520_thunderbolt_2_firmwareIntel(R) Thunderbolt(TM) controllers
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2020-12288
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:42
Updated-04 Aug, 2024 | 11:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in some Intel(R) Thunderbolt(TM) controllers may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-jhl7440_thunderbolt_3_firmwarejhl6240_thunderbolt_3_firmwarejhl7540_thunderbolt_3jhl8010r_usb_retimer_firmwarejhl6340_thunderbolt_3jhl7340_thunderbolt_3_firmwarejhl7040_thunderbolt_3_retimerdsl6540_thunderbolt_3dsl6340_thunderbolt_3_firmwarejhl6540_thunderbolt_3_firmwaredsl5320_thunderbolt_2_firmwaredsl6540_thunderbolt_3_firmwarejhl8010r_usb_retimerjhl7040_thunderbolt_3_retimer_firmwaredsl5520_thunderbolt_2jhl7540_thunderbolt_3_firmwarejhl6540_thunderbolt_3jhl8040r_thunderbolt_4_retimerjhl7340_thunderbolt_3dsl5320_thunderbolt_2jhl6240_thunderbolt_3jhl8040r_thunderbolt_4_retimer_firmwarejhl6340_thunderbolt_3_firmwaredsl6340_thunderbolt_3jhl7440_thunderbolt_3dsl5520_thunderbolt_2_firmwareIntel(R) Thunderbolt(TM) controllers
CVE-2020-12371
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.16%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:53
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Divide by zero in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CWE ID-CWE-369
Divide By Zero
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found