Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-8705

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-12 Nov, 2020 | 18:06
Updated At-04 Aug, 2024 | 10:03
Rejected At-
Credits

Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:12 Nov, 2020 | 18:06
Updated At:04 Aug, 2024 | 10:03
Rejected At:
▼CVE Numbering Authority (CNA)

Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access.

Affected Products
Vendor
n/a
Product
Intel(R) Boot Guard, Intel(R) CSME, Intel(R) TXE, Intel(R) SPS
Versions
Affected
  • Intel CSME(R) versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300
Problem Types
TypeCWE IDDescription
textN/Aescalation of privileges
Type: text
CWE ID: N/A
Description: escalation of privileges
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
x_refsource_MISC
https://security.netapp.com/advisory/ntap-20201113-0004/
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20201113-0005/
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20201113-0002/
x_refsource_CONFIRM
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
Resource:
x_refsource_MISC
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0004/
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0005/
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0002/
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
x_refsource_MISC
x_transferred
https://security.netapp.com/advisory/ntap-20201113-0004/
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20201113-0005/
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20201113-0002/
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0004/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0005/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0002/
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:12 Nov, 2020 | 18:15
Updated At:30 Nov, 2020 | 14:40

Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Intel Corporation
intel
>>converged_security_and_manageability_engine>>Versions before 11.8.80(exclusive)
cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_manageability_engine>>Versions from 11.12.0(inclusive) to 11.12.80(exclusive)
cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_manageability_engine>>Versions from 11.22.0(inclusive) to 11.22.80(exclusive)
cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_manageability_engine>>Versions from 12.0(inclusive) to 12.0.70(exclusive)
cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_manageability_engine>>Versions from 13.0(inclusive) to 13.0.40(exclusive)
cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_manageability_engine>>Versions from 13.30.0(inclusive) to 13.30.10(exclusive)
cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>converged_security_and_manageability_engine>>Versions from 14.0(inclusive) to 14.0.45(exclusive)
cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_technology>>3.1.80
cpe:2.3:a:intel:trusted_execution_technology:3.1.80:*:*:*:*:*:*:*
Intel Corporation
intel
>>trusted_execution_technology>>4.0.30
cpe:2.3:a:intel:trusted_execution_technology:4.0.30:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_platform_services>>sps_e3_04.01.04.200
cpe:2.3:a:intel:server_platform_services:sps_e3_04.01.04.200:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_platform_services>>sps_e5_04.01.04.400
cpe:2.3:a:intel:server_platform_services:sps_e5_04.01.04.400:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_platform_services>>sps_soc-a_04.00.04.300
cpe:2.3:a:intel:server_platform_services:sps_soc-a_04.00.04.300:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_platform_services>>sps_soc-x_04.00.04.200
cpe:2.3:a:intel:server_platform_services:sps_soc-x_04.00.04.200:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1188Primarynvd@nist.gov
CWE ID: CWE-1188
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.netapp.com/advisory/ntap-20201113-0002/secure@intel.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20201113-0004/secure@intel.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20201113-0005/secure@intel.com
Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391secure@intel.com
Vendor Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0002/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0004/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20201113-0005/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

369Records found

CVE-2018-3667
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.90%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 21:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Installation tool IPDT (Intel Processor Diagnostic Tool) 4.1.0.24 sets permissions of installed files incorrectly, allowing for execution of arbitrary code and potential privilege escalation.

Action-Not Available
Vendor-Intel Corporation
Product-processor_diagnostic_toolIntel Processor Diagnostic Tool
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2020-12336
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:15
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_board_h27002-404nuc_8_mainstream-g_kit_nuc8i7inhnuc_8_pro_kit_nuc8i3pnknuc_8_pro_board_nuc8i3pnbnuc_8_pro_kit_nuc8i3pnhnuc_kit_h26998-402nuc_board_h27002-400nuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_board_nuc8cchbnuc_8_pro_mini_pc_nuc8i3pnknuc_kit_h26998-405_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inhnuc_8_mainstream-g_kit_nuc8i7inh_firmwarenuc_kit_h26998-500_firmwarenuc_kit_h26998-402_firmwarenuc_8_pro_board_nuc8i3pnb_firmwarenuc_8_rugged_kit_nuc8cchkrnuc_board_h27002-404_firmwarenuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_8_mainstream-g_kit_nuc8i5inhnuc_board_nuc8cchb_firmwarenuc_kit_h26998-500nuc_kit_h26998-404nuc_board_h27002-500_firmwarenuc_8_rugged_kit_nuc8cchkr_firmwarenuc_board_h27002-400_firmwarenuc_board_h27002-402_firmwarenuc_kit_h26998-403_firmwarenuc_kit_h26998-403nuc_board_h27002-402nuc_kit_h26998-401nuc_kit_h26998-405nuc_8_pro_mini_pc_nuc8i3pnk_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inh_firmwarenuc_board_h27002-401_firmwarenuc_8_pro_kit_nuc8i3pnh_firmwarenuc_board_h27002-401nuc_kit_h26998-401_firmwarenuc_board_h27002-500nuc_9_pro_kit_nuc9v7qnxnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_9_pro_kit_nuc9v7qnx_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_8_pro_kit_nuc8i3pnk_firmwarenuc_kit_h26998-404_firmwareIntel(R) NUCs
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2022-0004
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.22% / 44.61%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_j3355_firmwareceleron_n2815core_i7-8670t_firmwarepentium_gold_g5500tceleron_j4115core_i5-10610u_firmwarecore_i3-10100core_i9-10910_firmwarecore_i7-8850h_firmwarecore_i5-11400xeon_d-2733nt_firmwarecore_i7-10510yceleron_j4125core_i7-10710u_firmwareceleron_n3010_firmwarecore_i5-11500bcore_i9-11900_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwareceleron_n4120core_i9-10900_firmwarepentium_gold_g4560atom_p5942b_firmwarecore_i5-8500t_firmwarecore_i5-11260hcore_i7-8709g_firmwarepentium_gold_g6605c627pentium_gold_g6405u_firmwarepentium_gold_g5400tcore_i7-10875h_firmwarexeon_d-2163it_firmwarec627apentium_gold_4415u_firmwarecore_i7-8709gpentium_gold_g6505xeon_d-2177ntpentium_gold_g5600_firmwarecore_i9-11900kfcore_i5-10600t_firmwarexeon_d-2786nte_firmwarecore_i3-l13g4core_i7-11700k_firmwarecore_i5-10300h_firmwarepentium_gold_g6400xeon_d-2775te_firmwarecore_i9-10900tpentium_gold_g5400_firmwarecore_i5-8200ycore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarecore_i5-10500t_firmwareatom_x6425repentium_gold_g4620_firmwarepentium_silver_j5040_firmwarecore_i7-8809g_firmwarec246_firmwarecore_i5-8260uxeon_d2700core_i7-12700kfcore_i9-12900_firmwarecore_i5-11400fcore_i5-12600h_firmwarecore_i5-10400txeon_d-2796teceleron_6600hec246c628_firmwarecore_i9-10900xcore_i5-12400fceleron_n3350ecore_i9-11980hk_firmwarecore_i3-8000txeon_d-2142itcore_i5-8305g_firmwareceleron_j4005_firmwarecore_i5-10110y_firmwarecore_i3-8100b_firmwarecore_i5-8650k_firmwarecore_i5-8700bcore_i9-10900te_firmwarec232c624_firmwarecore_i9-11900kcore_i5-10500hcore_i9-11900kb_firmwarecore_i9-12900hkcore_i3-8300t_firmwarecore_i5-12450hcore_i5-10600kfcore_i7-10700_firmwareceleron_n2840_firmwareatom_x6413e_firmwarepentium_gold_g6600_firmwareceleron_j3060c626core_i9-10850hxeon_d-2752nte_firmwarexeon_d-2796nt_firmwarecore_i5-11500he_firmwarecore_i5-8210y_firmwarecore_i3-10100ec236pentium_gold_g5420tcore_i9-12900hxcore_i5-11320h_firmwarecore_i7-10700kf_firmwarecore_i9-12900core_i7-12650h_firmwarepentium_gold_g6400te_firmwareatom_x6413ecore_i5-12500core_i5-11600kfcore_i7-8550u_firmwarec624acore_i5-8365uxeon_d-2799core_i7-12700xeon_d-2145ntc422celeron_j4105_firmwarecore_i7-12700t_firmwarecore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uceleron_n2806_firmwarec621core_i3-11100he_firmwareatom_p5931b_firmwarepentium_gold_g7400xeon_d-2163itceleron_n4020c_firmwarepentium_gold_4417u_firmwarecore_i5-12500h_firmwarecore_i5-11400hcore_i9-11900hceleron_j3160_firmwarecore_i7-8665ue_firmwarecore_i3-12100tcore_i7-10810ucore_i3-10300tcore_i3-8100core_i3-8145uepentium_gold_4425ypentium_gold_g5500_firmwarepentium_gold_g5500t_firmwareceleron_j4025_firmwarecore_i9-11900pentium_gold_g4620core_i5-8265ucore_i7-10700tcore_i7-12700kf_firmwareatom_p5921bcore_i5-8650core_i3-12100f_firmwarepentium_gold_6500ycore_i5-10500ecore_i7-10750hcore_i9-10850kpentium_gold_g6405core_i5-8500bxeon_d-2143itxeon_d-2753ntcore_i5-8250u_firmwareceleron_n2840pentium_gold_g7400texeon_w-1390_firmwarecore_i3-8100hcore_i5-8400b_firmwarecore_i7-8706gceleron_n2810pentium_gold_g6400tcore_i7-11850h_firmwarecore_i7-12850hxceleron_j4115_firmwarecore_i3-8120core_i9-11900fxeon_d-2177nt_firmwareatom_x7-e3950_firmwarecore_i5-8365u_firmwarec242core_i9-10920xcore_i9-11950hceleron_n3450_firmwarexeon_w-1300_firmwarecore_i5-12450hxcore_i9-10885hcore_i5-10310ucore_i3-8130u_firmwareceleron_n4500core_i7-8557uceleron_n2910_firmwarecore_i5-11400_firmwarecore_i7-11850hecore_i3-8350k_firmwareceleron_6305celeron_n5105_firmwarepentium_gold_g6605_firmwarecore_i7-10750h_firmwarexeon_d-2142it_firmwarecore_i7-8557u_firmwarexeon_d-2779_firmwareceleron_j4025core_i9-10980hkxeon_d-2733ntcore_i7-12650hxceleron_n2808_firmwarecore_i7-10700k_firmwarecore_i9-10900t_firmwarepentium_gold_g6505_firmwarecore_i5-11400f_firmwarecore_i3-10305_firmwareceleron_n4100celeron_n3520core_i3-10325_firmwarecore_i7-10510y_firmwarecore_i9-11900k_firmwarecore_i7-11700b_firmwarecore_i7-11800h_firmwareceleron_6600he_firmwarexeon_d-2795ntceleron_4305ue_firmwarecore_i7-8500yxeon_d-2779core_i9-11900t_firmwarepentium_silver_n5030_firmwarepentium_silver_j5040celeron_j3060_firmwareceleron_n6211xeon_w-1370pentium_gold_6500y_firmwarecore_i5-8600tcore_i7-8510y_firmwarepentium_gold_g5420_firmwarecore_i5-12600tpentium_gold_g6405t_firmwareceleron_n6210_firmwarecore_i3-10320_firmwarecore_i5-12400xeon_w-1370pcore_i3-10320core_i3-8121uc625_firmwarecore_i5-8420t_firmwarexeon_d-2752ntecore_i3-12300t_firmwarepentium_gold_g5400core_i3-10105fceleron_n3700celeron_n5095_firmwarexeon_w-1390t_firmwareatom_x5-e3940core_i7-10875hceleron_n3060_firmwarecore_i3-8121u_firmwarecore_i3-11100hecore_i5-10400hceleron_n4000c_firmwarepentium_gold_7505core_i7-12700kxeon_d-2712t_firmwarecore_i5-10505_firmwareceleron_n3050_firmwarecore_i5-12600_firmwareceleron_n2810_firmwarepentium_gold_g6500_firmwarepentium_gold_g4600_firmwarepentium_gold_g5620_firmwareceleron_j3455_firmwarecore_i5-10110ycore_i5-12600hcore_i9-11900kf_firmwarecore_i7-8500y_firmwarecore_i7-12700hc627a_firmwareatom_p5962b_firmwarecore_i3-10105tcore_i5-11300hcore_i7-10510u_firmwarecore_i3-8100h_firmwarecore_i3-10105t_firmwarepentium_silver_n6000core_i5-10400h_firmwarecore_i9-12900kf_firmwarecore_i9-10900kfcore_i7-11390h_firmwarecore_i3-10100tpentium_gold_g6600xeon_d-2146ntceleron_n2805_firmwarecore_i5-8300h_firmwarexeon_d-2752terceleron_j4125_firmwarecore_i5-8279u_firmwarecore_i5-11500hecore_i5-8500b_firmwarecore_i5-12500hc622xeon_w-1390tcore_i7-12700k_firmwarecore_i7-11700kfpentium_gold_g5420xeon_d2700_firmwarecore_i7-11700_firmwarecore_i7-8706g__firmwarexeon_d-2795nt_firmwarecore_i7-11375hcore_i7-8559ucore_i9-10850h_firmwarecore_i5-8550_firmwarecore_i5-11500tpentium_gold_g7400_firmwareceleron_n3010core_i9-12900h_firmwarecore_i5-8700b_firmwarecore_i7-8670_firmwarecore_i7-8560ucore_i7-11600h_firmwarecore_i5-11400h_firmwarepentium_gold_g5600core_i3-10325core_i5-8500_firmwarecore_i7-8700core_i5-8400atom_x6200fe_firmwareceleron_n5100core_i3-10105f_firmwareceleron_n3000_firmwarecore_i5-12600xeon_d-2752ter_firmwareceleron_n2805core_i5-12600k_firmwarecore_i5-8650kcore_i3-10110u_firmwarexeon_w-1350core_i9-10980xecore_i7-8750hfceleron_n4505_firmwarecore_i7-11850hceleron_n2808core_i9-11900f_firmwarecore_i5-8310y_firmwarecore_i3-10110ucore_i7-8665u_firmwareceleron_n3060core_i9-10885h_firmwarecore_i7-8086k_firmwarepentium_gold_g7400te_firmwareceleron_n4500_firmwarecore_i3-10100y_firmwareceleron_n6211_firmwarecore_i5-11500_firmwarecore_i7-8569u_firmwareceleron_4305ucore_i5-12600hx_firmwarepentium_gold_6405ucore_i5-8420_firmwarexeon_w-1350pc629a_firmwarexeon_d-2143it_firmwarecore_i9-10900celeron_n5100_firmwarecore_i9-12900hatom_x6212re_firmwareatom_x5-e3930c627_firmwareatom_x6211ex299_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i7-11375h_firmwarecore_i3-10300core_i3-8100t_firmwarepentium_gold_4417ucore_i5-10310u_firmwarecore_i7-8565ucore_i7-8670core_i9-10940x_firmwarecore_i5-8400_firmwarecore_i5-11500h_firmwarecore_i7-8510ycore_i7-10870hcore_i7-10510ucore_i3-10100fpentium_gold_4425y_firmwarepentium_gold_g5500celeron_n2940core_i5-12500tcore_i5-8310ycore_i9-12900tcore_i3-10300_firmwarecore_i5-10500h_firmwareceleron_6305_firmwarexeon_d-2183it_firmwarecore_i5-12600t_firmwareatom_x6200fecore_i5-12400_firmwarec236_firmwarecore_i3-8000t_firmwarecore_i5-8265u_firmwarecore_i3-8000_firmwarecore_i5-10210uceleron_n3000pentium_gold_g4600pentium_gold_g5400t_firmwarecore_i5-10500core_i5-11300h_firmwarecore_i5-8400bpentium_gold_g6405tcore_i7-12800h_firmwarecore_i7-8850hcore_i9-8950hk_firmwareceleron_n2930celeron_n2830core_i5-8400h_firmwarecore_i5-11600_firmwarecore_i5-10400t_firmwarecore_i7-12650hceleron_n4020_firmwarecore_i3-10100_firmwareceleron_4205u_firmwarecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i3-10100ycore_i5-10600tcore_i5-10600kf_firmwareceleron_n3150_firmwarecore_i9-10900e_firmwareceleron_n4505c625celeron_n3520_firmwarexeon_d-2191_firmwarec621apentium_gold_g6505txeon_d-2146nt_firmwarecore_i9-10910core_i9-12900k_firmwarepentium_gold_g6500tcore_i7-10700f_firmwarecore_i3-10100t_firmwarepentium_gold_4415y_firmwarecore_i5-8269u_firmwarecore_i3-10105celeron_n6210celeron_j3455ecore_i3-12300_firmwarecore_i5-11400tceleron_n4020pentium_gold_6405u_firmwarecore_i7-11700kcore_i9-10900kf_firmwarecore_i7-8550ucore_i7-10810u_firmwarexeon_w-1350_firmwarecore_i9-10920x_firmwarecore_i9-10940xceleron_n2920_firmwarec629acore_i3-8300pentium_gold_g6400t_firmwarecore_i7-10700kfceleron_j4105core_i7-12850hx_firmwarecore_i5-8260u_firmwarecore_i5-8400tcore_i9-12900t_firmwarecore_i3-l13g4_firmwarecore_i5-12400t_firmwarecore_i7-12800hx_firmwarexeon_d-2187ntxeon_d-2775teceleron_4305u_firmwareceleron_n4100_firmwarecore_i5-11600kf_firmwarexeon_w-1370p_firmwarepentium_gold_4410y_firmwarepentium_gold_g7400tcore_i9-11900kbpentium_gold_7505_firmwarecore_i5-8257u_firmwarecore_i9-11900h_firmwarecore_i7-8700b_firmwareceleron_j3355eceleron_n2815_firmwareceleron_n4504core_i3-11100b_firmwarecore_i3-10305t_firmwarecore_i7-8706g_firmwarecore_i5-12400tcore_i7-12700tcore_i9-10850k_firmwarecore_i5-8365ue_firmwareceleron_n2910atom_x5-e3930_firmwarecore_i7-11600hcore_i7-10700core_i9-11950h_firmwarexeon_d-2753nt_firmwareceleron_n2940_firmwarexeon_w-1350p_firmwarecore_i5-10500e_firmwarepentium_gold_4410yc420_firmwarecore_i5-11600k_firmwareceleron_j3355core_i3-8145u_firmwarecore_i5-8600k_firmwarecore_i5-10400core_i3-8145uxeon_d-2173itceleron_j3355e_firmwarexeon_d-2161ixeon_d-2766ntcore_i7-8700kcore_i7-10870h_firmwarexeon_d-2123itcore_i7-11700kf_firmwarepentium_gold_g6405_firmwarecore_i5-8420tcore_i3-8109ucore_i5-8365uecore_i7-12650hx_firmwareceleron_j3455core_i9-12900hk_firmwarecore_i7-12700fcore_i3-12100fcore_i3-11100bpentium_silver_n6000_firmwareceleron_n3160xeon_d-2776ntcore_i5-8200y_firmwareceleron_n3160_firmwarec624a_firmwarecore_i7-10700te_firmwarecore_i7-10700eceleron_n2830_firmwarecore_i5-8350uatom_x6425e_firmwarepentium_gold_g7400exeon_d-2161i_firmwarecore_i7-8750h_firmwarecore_i3-10100teceleron_n4000_firmwareceleron_n2807pentium_gold_g5420t_firmwarecore_i5-10210u_firmwarecore_i7-11390hcore_i3-8140u_firmwarexeon_d-2786ntecore_i9-12900hx_firmwarexeon_d-2796te_firmwarexeon_d-2191pentium_silver_a1030_firmwarecore_i3-10100te_firmwarecore_i9-12900fcore_i5-10600k_firmwarepentium_gold_g5600tcore_i9-10900ecore_i5-8259u_firmwarecore_i5-10610uc624core_i3-10110y_firmwarecore_i5-8250ucore_i9-11980hkcore_i5-8600pentium_gold_g7400e_firmwarepentium_silver_n6005atom_p5931bcore_i5-l16g7_firmwarecore_i5-10500tecore_i7-12700f_firmwarecore_i7-12700_firmwarecore_i7-8559u_firmwarecore_i5-10210y_firmwarecore_i5-11500core_i3-8000core_i7-8700k_firmwareceleron_n4000ccore_i7-11700pentium_gold_g6400exeon_d-2798ntcore_i7-12800hxcore_i7-8700bcore_i5-10500tcore_i5-10600core_i5-10500_firmwareatom_x6425re_firmwarecore_i5-10310ycore_i3-12300core_i5-10310y_firmwarexeon_d-2738core_i5-12450hx_firmwarepentium_gold_g6500t_firmwarecore_i5-8259ucore_i5-11500t_firmwarepentium_gold_g6405ucore_i7-10700katom_x7-e3950pentium_gold_g5600t_firmwarecore_i3-12300tpentium_silver_a1030core_i3-8109u_firmwarecore_i5-12450h_firmwarecore_i5-11600t_firmwarecore_i7-8705g_firmwarecore_i7-11370hxeon_w-1300core_i7-8665uecore_i5-12500_firmwarecore_i3-8130ucore_i3-8300tcore_i5-11500hcore_i9-12900kcore_i5-l16g7core_i9-12950hx_firmwarecore_i5-11600tcore_i7-8650ucore_i5-10200hpentium_gold_g5620pentium_silver_n5030core_i7-8705gceleron_n2920c621a_firmwareceleron_n4000core_i5-10400fcore_i5-12600kfpentium_gold_g6400_firmwarecore_i3-12100t_firmwarecore_i9-12950hxcore_i7-8706g_core_i9-12900kfcore_i3-8145ue_firmwarecore_i5-8400t_firmwarepentium_silver_n5000_firmwarecore_i5-8400hceleron_n3150celeron_j4005atom_x5-e3940_firmwarepentium_silver_n5000core_i7-11850he_firmwarexeon_d-2141ipentium_gold_4415uceleron_6305e_firmwarexeon_d-2141i_firmwareatom_x6211e_firmwarecore_i3-10110yc422_firmwarepentium_gold_5405uxeon_d-2776nt_firmwareatom_p5921b_firmwareceleron_n3350core_i5-8305gatom_p5962bxeon_w-1390core_i7-11700t_firmwareceleron_n2820celeron_n2820_firmwarecore_i5-11600core_i7-11700fcore_i7-8750hatom_x6212recore_i7-8665uceleron_n5105core_i3-10305tcore_i3-10100e_firmwarexeon_d-2183itceleron_n2807_firmwarexeon_d-2123it_firmwarecore_i5-12500t_firmwarecore_i5-8300hxeon_w-1370_firmwarexeon_d-2712tceleron_n2806core_i5-8420pentium_silver_n6005_firmwarecore_i3-8140uceleron_n3350_firmwarecore_i3-8350kcore_i5-10600kcore_i7-8086kcore_i9-12900f_firmwarec628core_i7-10850hcore_i3-8120_firmwarecore_i3-12100_firmwarecore_i7-8560u_firmwarecore_i5-12600kf_firmwareatom_x6425ecore_i5-10500te_firmwarecore_i3-8020_firmwarecore_i3-10300t_firmwarex299xeon_d-2187nt_firmwarecore_i5-11500b_firmwarecore_i3-8100bxeon_w-1390p_firmwarecore_i5-8550core_i5-8279ucore_i9-10900f_firmwarecore_i5-12600hxcore_i3-10100f_firmwareatom_p5942bcore_i5-8600kcore_i7-12700h_firmwarecore_i7-8700tc242_firmwarexeon_d-2799_firmwarecore_i7-11700tceleron_n5095celeron_n2930_firmwarec232_firmwarecore_i7-8700t_firmwarecore_i7-10700e_firmwarec621_firmwarecore_i5-8600t_firmwarepentium_gold_g7400t_firmwarecore_i5-8500core_i9-11900tcore_i5-11260h_firmwarecore_i5-8210ycore_i5-10400f_firmwareceleron_n4120_firmwarepentium_silver_j5005_firmwarecore_i7-8565u_firmwarecore_i9-10980xe_firmwareatom_x6427fepentium_gold_5405u_firmwarecore_i5-8257ucore_i7-8569ucore_i5-11400t_firmwarecore_i7-10700t_firmwareceleron_4205upentium_gold_g4560_firmwarexeon_d-2796ntceleron_6305eceleron_n3350e_firmwareatom_x6427fe_firmwarecore_i5-8500tcore_i7-8809gcore_i3-10105_firmwarecore_i5-11320hcore_i7-8650u_firmwareceleron_n3700_firmwarecore_i7-11700bcore_i7-10850h_firmwarexeon_d-2766nt_firmwarecore_i3-10305xeon_d-2166ntcore_i7-8700_firmwarepentium_gold_4415yxeon_w-1390pcore_i3-8300_firmwarecore_i5-10505core_i5-8650_firmwarec629c626_firmwarecore_i3-12100core_i9-10900x_firmwarecore_i7-10710uc622_firmwarec420celeron_j3160core_i5-10300hcore_i5-10210ycore_i5-8350u_firmwarecore_i3-8020celeron_n4504_firmwarepentium_gold_g6500core_i5-12400f_firmwarecore_i7-11700f_firmwarecore_i9-10900fceleron_n4020cceleron_j3455e_firmwareceleron_n3450core_i5-10200h_firmwarecore_i3-8100txeon_d-2798nt_firmwarecore_i9-10980hk_firmwarecore_i5-12600kcore_i7-8670tpentium_gold_g6400texeon_d-2166nt_firmwarecore_i5-10400_firmwarecore_i7-12800hceleron_n3050c629_firmwarepentium_gold_g6400e_firmwarepentium_gold_g6505t_firmwarecore_i7-10700fcore_i9-10900k_firmwarecore_i7-8750hf_firmwareceleron_4305uexeon_d-2738_firmwarepentium_silver_j5005Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT
CVE-2020-0563
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.30%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 18:20
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for Intel(R) MPSS before version 3.8.6 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-manycore_platform_software_stackIntel(R) MPSS
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-0528
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.70%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:53
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in BIOS firmware for 7th, 8th, 9th and 10th Generation Intel(R) Core(TM) Processor families may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i9-9900kscore_i7-7700kcore_i7-8705gcore_i7-8665ucore_i7-7660ucore_i7-8706gcore_i7-1068ng7core_i5-7300u_firmwarecore_i7-8565u_firmwarecore_i9-9880h_firmwarecore_i7-8700t_firmwarecore_i7-10850hcore_i7-10700e_firmwarecore_i5-7600t_firmwarecore_i5-7500_firmwarecore_i7-10700kcore_i7-8700core_i7-8665ue_firmwarecore_i5-7440hq_firmwarecore_i5-7y54core_i7-8705g_firmwarecore_i7-10700tecore_i7-7700tcore_i7-10700tcore_i7-8086kcore_i5-7260u_firmwarecore_i7-8709g_firmwarecore_i7-1060g7_firmwarecore_i5-7600k_firmwarecore_i7-8700kcore_i9-9880hcore_i9-9900kfcore_i5-7440eqcore_i5-7287ucore_i7-10710ucore_i7-10700kfcore_i5-7200u_firmwarecore_i7-10700k_firmwarecore_i5-7442eqcore_i7-10510u_firmwarecore_i7-8565ucore_i7-7600ucore_i5-7y57_firmwarecore_i5-7600kcore_i7-10700t_firmwarecore_i5-7300hq_firmwarecore_i5-7442eq_firmwarecore_i7-8569u_firmwarecore_i5-7300hqcore_i7-7560ucore_i7-8706g_firmwarecore_i7\+8700_firmwarecore_i7-10510ycore_i7-7820eqcore_i5-7400t_firmwarecore_i5-7360u_firmwarecore_i5-7360ucore_i9-9900core_i7-10510y_firmwarecore_i7-8650u_firmwarecore_i7-7600u_firmwarecore_i7-7700hqcore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_i7-10610u_firmwarecore_i7-10710u_firmwarecore_i7-7820hkcore_i7-7567u_firmwarecore_i7-7700hq_firmwarecore_i5-7600tcore_i5-7300ucore_i5-7440eq_firmwarecore_i7-7500ucore_i7-8550ucore_i7-10510ucore_i5-7500core_i7-8500y_firmwarecore_i7-1060g7core_i7-10810u_firmwarecore_i7-10810ucore_i5-7200ucore_i7-8700b_firmwarecore_i7-10875h_firmwarecore_i7-8559u_firmwarecore_i7-8850hcore_i5-7287u_firmwarecore_i7-7700core_i7-8086k_firmwarecore_i7-10610ucore_i7-8665u_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqcore_i7-8500ycore_i7-7920hq_firmwarecore_i7-7567ucore_i9-9900tcore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i9-9900ks_firmwarecore_i7-10700te_firmwarecore_i7-8700k_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i7-10700core_i7\+8700core_i7-7660u_firmwarecore_i7-7820hqcore_i7-10750h_firmwarecore_i7-8750h_firmwarecore_i5-7600core_i5-7400_firmwarecore_i7-8665uecore_i7-10700fcore_i7-8809g_firmwarecore_i7-8557u_firmwarecore_i7-1068ng7_firmwarecore_i7-10750hcore_i7-7700t_firmwarecore_i7-7820eq_firmwarecore_i5-7y54_firmwarecore_i9-9980hk_firmwarecore_i5-7400tcore_i5-7267u_firmwarecore_i7-10875hcore_i9-9900kcore_i7-8809gcore_i5-7440hqcore_i5-7600_firmwarecore_i5-7260ucore_i7-8709gcore_i7-8700bcore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-8569ucore_i7-7500u_firmwarecore_i5-7267ucore_i7-10700f_firmwarecore_i7-7700_firmwarecore_i7-10700kf_firmwarecore_i7-7y75core_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-7560u_firmwarecore_i5-7500t_firmwarecore_i5-7y57core_i7-8700tcore_i7-10700_firmwarecore_i7-10850h_firmwarecore_i5-7500tcore_i7-1065g7core_i5-7400core_i9-9980hkcore_i7-8559ucore_i7-8650ucore_i9-9900t_firmwarecore_i7-10700eBIOS
CVE-2020-0544
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:47
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the kernel mode driver for some Intel(R) Graphics Drivers before version 15.36.39.5145 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CVE-2020-0587
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 35.62%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:55
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lcore_i7-9800xxeon_gold_6222vxeon_platinum_9222core_i7-3930kxeon_gold_5217xeon_gold_6230txeon_gold_6242core_i7-6950xxeon_gold_6230ncore_i7-4960xxeon_gold_5218nxeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_5218txeon_silver_4215core_i9-9980xecore_i9-10940xxeon_gold_5220rcore_i7-6800kxeon_gold_5220xeon_gold_6246core_i9-10900xxeon_silver_4214core_i7-7740xxeon_silver_4214rcore_i7-5820kxeon_platinum_8276xeon_gold_6254xeon_gold_6238tcore_i7-3960xxeon_silver_4210rxeon_gold_6240yxeon_gold_6250lxeon_silver_4214yxeon_gold_6210ucore_i9-10920xxeon_gold_6234core_i9-10980xecore_i7-3940xmxeon_gold_5218bxeon_gold_6238rcore_i7-6850kcore_i7-3970xcore_i9-7940xxeon_gold_6208ucore_i7-4940mxxeon_platinum_8268xeon_gold_5215core_i9-9960xcore_i7-3920xmxeon_gold_6262vcore_i7-4930kxeon_silver_4216core_i9-7920xxeon_gold_6230xeon_platinum_8253xeon_gold_5222xeon_gold_6240rxeon_gold_5218xeon_silver_4209tcore_i5-7640xcore_i9-7900xxeon_gold_6209uxeon_gold_5215lxeon_silver_4215rxeon_gold_6252nxeon_gold_6226xeon_gold_6256core_i7-4820kxeon_platinum_9221core_i7-5960xxeon_gold_6244xeon_gold_6230rxeon_gold_6238xeon_gold_6252xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_gold_6248core_i7-7800xcore_i9-9920xxeon_gold_6212ucore_i7-4930mxxeon_silver_4208core_i9-7980xecore_i7-5930kxeon_gold_5218rxeon_platinum_8280xeon_gold_6248rxeon_gold_6226rxeon_bronze_3206rxeon_gold_5220score_i7-6900kxeon_platinum_9242xeon_platinum_9282core_i7-3820core_i9-9940xxeon_gold_6258rxeon_platinum_8260lxeon_platinum_8280lxeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_bronze_3204xeon_gold_6250biosxeon_platinum_8256core_i9-9820xxeon_gold_5220tcore_i9-9900xxeon_silver_4210Intel(R) Processors
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-0546
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.70%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 20:45
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unquoted service path in Intel(R) Optane(TM) DC Persistent Memory Module Management Software before version 1.0.0.3461 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access.

Action-Not Available
Vendor-Microsoft CorporationIntel Corporation
Product-optane_dc_persistent_memory_module_managementwindows_server_2019Intel® Optane(TM) DC Persistent Memory Module Management Software
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2020-0592
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 32.57%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:56
Updated-04 Aug, 2024 | 06:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lxeon_w-2223core_i7-9800xxeon_platinum_9222xeon_e7-4860_v2xeon_w-3245mxeon_gold_5217xeon_gold_6230txeon_e7-8894_v4xeon_e7-8867_v4core_i7-6950xxeon_gold_6230ncore_i7-4960xxeon_w-3225xeon_w-3265xeon_e7-8880l_v2xeon_gold_5218nxeon_e7-2850_v2xeon_w-3245xeon_d-1527xeon_w-2125core_i9-10940xxeon_d-1523nxeon_d-1540xeon_e7-8880_v4xeon_e7-8880_v2xeon_gold_5220xeon_gold_6246xeon_d-1653ncore_i7-7740xxeon_d-1528xeon_silver_4214rcore_i7-5820kxeon_d-1577xeon_gold_6254xeon_d-1637xeon_w-2295xeon_e7-8891_v4core_i7-3960xxeon_gold_6240yxeon_gold_6234xeon_d-2141ixeon_d-1541xeon_e7-4830_v4core_i7-3940xmxeon_e7-4809_v2xeon_gold_6238rxeon_w-1250xeon_d-1518xeon_w-1250texeon_w-2255xeon_gold_6208ucore_i7-4940mxxeon_platinum_8268xeon_gold_5215xeon_e7-4830_v2xeon_e7-8893_v4xeon_w-1290exeon_d-2143itxeon_gold_6262vcore_i7-4930kxeon_d-2163itcore_i9-7920xxeon_gold_5222xeon_w-3275xeon_gold_5218xeon_d-1553nxeon_w-1270xeon_silver_4209txeon_d-1567xeon_w-1270exeon_d-1633nxeon_gold_5215lxeon_silver_4215rxeon_gold_6252nxeon_d-1548core_i7-4820kxeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_w-2245xeon_e7-4820_v4xeon_gold_6244xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_gold_6248xeon_gold_6212uxeon_w-1270tecore_i9-7980xexeon_platinum_8280xeon_gold_6248rxeon_e7-4809_v4core_i7-6900kcore_i9-9940xxeon_gold_6258rxeon_d-1520xeon_e7-8870_v4xeon_w-1290txeon_d-1571xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6250biosxeon_platinum_8256core_i9-9820xxeon_d-2173itxeon_w-2155core_i9-9900xxeon_d-2123itxeon_w-1290pxeon_w-3265mxeon_e7-8857_v2xeon_w-2135xeon_gold_6222vxeon_d-1627xeon_e7-2890_v2core_i7-3930kxeon_gold_6242xeon_e7-8893_v2xeon_w-2265xeon_d-1623nxeon_w-2145xeon_d-1531xeon_e7-4820_v2xeon_d-1602xeon_w-10855mxeon_platinum_8260yxeon_platinum_8270xeon_e7-8890_v4xeon_d-1539xeon_d-1533nxeon_e7-8870_v2xeon_gold_6242rxeon_gold_5218txeon_silver_4215core_i9-9980xexeon_d-2142itxeon_w-2235xeon_gold_5220rcore_i7-6800kxeon_e7-8891_v2xeon_d-2146ntxeon_e7-4850_v2core_i9-10900xxeon_silver_4214xeon_e7-8890_v2xeon_platinum_8276xeon_gold_6238txeon_w-1270pxeon_silver_4210rxeon_gold_6250lxeon_d-2161ixeon_silver_4214yxeon_gold_6210ucore_i9-10920xcore_i9-10980xexeon_d-2187ntxeon_e7-4870_v2xeon_gold_5218bxeon_e7-8860_v4core_i7-6850kcore_i7-3970xcore_i9-7940xcore_i9-9960xxeon_d-2166ntxeon_w-1250exeon_w-1290core_i7-3920xmxeon_e7-4880_v2xeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6240rxeon_w-10885mxeon_w-2195xeon_d-2183itxeon_e7-2870_v2xeon_d-1513nxeon_d-1537xeon_w-2275xeon_d-1622xeon_w-1290tecore_i5-7640xcore_i9-7900xxeon_d-1543nxeon_gold_6209uxeon_w-3223xeon_gold_6226xeon_d-1559xeon_gold_6256xeon_d-1521core_i7-5960xxeon_e7-4890_v2xeon_d-2145ntxeon_gold_6230rxeon_w-3175xxeon_gold_6238xeon_gold_6252xeon_w-1250pcore_i7-7800xcore_i9-9920xcore_i7-4930mxxeon_w-3235xeon_silver_4208xeon_e7-8850_v2core_i7-5930kxeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_w-2225xeon_w-2123xeon_gold_5220sxeon_w-2133xeon_w-3275mxeon_platinum_9242xeon_platinum_9282core_i7-3820xeon_d-1557xeon_e7-4850_v4xeon_platinum_8260lxeon_platinum_8280lxeon_bronze_3204xeon_d-2177ntxeon_w-2175xeon_gold_5220txeon_e7-2880_v2xeon_silver_4210Intel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0541
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 22.89%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:59
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0583
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.34% / 56.33%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 21:08
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.

Action-Not Available
Vendor-Intel Corporation
Product-core_m3core_i5core_i9smart_sound_technologycore_i7core_i3Intel® Smart Sound Technology
CVE-2020-0542
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.82%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:57
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CVE-2020-0559
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.69%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:27
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-celeron_n3010celeron_j1750windows_8.1celeron_n2840ac_3165_firmwareac_9560_firmwarepentium_j6426ac_8265_firmwareceleron_n2808pentium_j2850celeron_j4025celeron_n2910pentium_j4205celeron_n2930pentium_n3510celeron_j6413celeron_n3350ac_3168_firmwareceleron_n3050ac_9260_firmwareceleron_j1850celeron_n6210ac_8260_firmwarepentium_n3700celeron_n2920celeron_n3000celeron_n2807ac_7265_firmwarepentium_n3520celeron_n2815pentium_j3710pentium_j2900celeron_j3060celeron_n3160ac_9461_firmwareac_9462_firmwareceleron_n2940celeron_n6211celeron_n5105pentium_n3530celeron_j3455pentium_n3540celeron_n4000celeron_j3455eceleron_n2830pentium_n4200eceleron_n4500celeron_n2820pentium_n6415celeron_n3450celeron_n5100pentium_n3710celeron_n4020celeron_j4105celeron_j3160celeron_j6412celeron_n3150celeron_n2810celeron_n4100celeron_j1800celeron_n2805celeron_n2806celeron_j1900celeron_n3060atom_x5-e3940celeron_n4505celeron_j4005atom_x5-e3930celeron_j3355pentium_n4200atom_x7-e3950ax200_firmwareceleron_n4120celeron_n3350ewindows_7ax201_firmwareceleron_j3355eceleron_j4125Intel(R) PROSet/Wireless WiFi Advisory
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-0513
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:18
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers Advisory
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0533
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.48%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:58
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2020-0521
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:48
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in some Intel(R) Graphics Drivers before version 15.45.32.5145 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers
CVE-2020-0515
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 22.96%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 19:59
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-0572
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 16.75%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:56
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s2600stqrserver_board_s2600wf0rserver_board_s2600wf_firmwareserver_board_s2600stbrserver_board_s2600st_firmwareserver_board_s2600wfqrserver_board_s2600wftrIntel(R) Server Board S2600ST and S2600WF families
CWE ID-CWE-20
Improper Input Validation
CVE-2020-0586
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.88%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:56
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_platform_servicesIntel(R) SPS
CWE ID-CWE-665
Improper Initialization
CVE-2020-0557
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.29%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 16:58
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-wireless-ac_9461wireless-ac_9560wi-fi_6_ax201dual_band_wireless-ac_3165dual_band_wireless-ac_7265_\(rev_d\)dual_band_wireless-ac_8260wireless-ac_9260dual_band_wireless-ac_3168wi-fi_6_ax200dual_band_wireless-ac_8265wireless-ac_9462proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi Software
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2020-0561
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.11%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 18:21
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncopenSUSEIntel CorporationMicrosoft Corporation
Product-linux_kernelsoftware_guard_extensions_sdkwindowsbackportsleapIntel(R) SGX SDK
CWE ID-CWE-665
Improper Initialization
CVE-2020-0591
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.33%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:55
Updated-04 Aug, 2024 | 06:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationSiemens AG
Product-xeon_gold_6246rxeon_platinum_8276lxeon_w-2223core_i7-9800xxeon_platinum_9222xeon_w-3245mxeon_gold_5217xeon_gold_6230tcore_i7-6950xxeon_gold_6230ncore_i7-4960xxeon_w-3225xeon_w-3265xeon_gold_5218nxeon_w-3245xeon_d-1527xeon_w-2125core_i9-10940xxeon_d-1523nxeon_d-1540xeon_gold_5220xeon_gold_6246xeon_d-1653ncore_i7-7740xxeon_d-1528xeon_silver_4214rcore_i7-5820kxeon_d-1577xeon_gold_6254xeon_d-1637xeon_w-2295core_i7-3960xxeon_gold_6240yxeon_gold_6234xeon_d-2141ixeon_d-1541core_i7-3940xmxeon_gold_6238rxeon_w-1250xeon_d-1518xeon_w-1250texeon_w-2255xeon_gold_6208ucore_i7-4940mxxeon_platinum_8268xeon_gold_5215xeon_w-1290exeon_d-2143itxeon_gold_6262vcore_i7-4930kxeon_d-2163itcore_i9-7920xxeon_gold_5222xeon_w-3275xeon_gold_5218simatic_cpu_1518-4xeon_d-1553nxeon_w-1270xeon_silver_4209txeon_d-1567simatic_cpu_1518f-4_firmwarexeon_w-1270exeon_d-1633nxeon_gold_5215lxeon_silver_4215rxeon_gold_6252nxeon_d-1548core_i7-4820kxeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_w-2245xeon_gold_6244xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_gold_6248xeon_gold_6212uxeon_w-1270tecore_i9-7980xexeon_platinum_8280xeon_gold_6248rcore_i7-6900kcore_i9-9940xxeon_gold_6258rxeon_d-1520xeon_w-1290txeon_d-1571xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6250biosxeon_platinum_8256core_i9-9820xxeon_d-2173itxeon_w-2155core_i9-9900xxeon_d-2123itxeon_w-1290pxeon_w-3265mxeon_w-2135xeon_gold_6222vxeon_d-1627core_i7-3930kxeon_gold_6242xeon_w-2265xeon_d-1623nxeon_w-2145xeon_d-1531xeon_d-1602xeon_w-10855mxeon_platinum_8260yxeon_platinum_8270xeon_d-1539xeon_d-1533nxeon_gold_6242rxeon_gold_5218txeon_silver_4215core_i9-9980xexeon_d-2142itxeon_w-2235xeon_gold_5220rcore_i7-6800kxeon_d-2146ntcore_i9-10900xxeon_silver_4214xeon_platinum_8276xeon_gold_6238txeon_w-1270pxeon_silver_4210rxeon_gold_6250lxeon_d-2161ixeon_silver_4214yxeon_gold_6210ucore_i9-10920xcore_i9-10980xexeon_d-2187ntxeon_gold_5218bcore_i7-6850kcore_i7-3970xcore_i9-7940xcore_i9-9960xxeon_d-2166ntxeon_w-1250exeon_w-1290core_i7-3920xmxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6240rxeon_w-10885mxeon_w-2195simatic_cpu_1518-4_firmwarexeon_d-2183itxeon_d-1513nxeon_d-1537xeon_w-2275xeon_d-1622xeon_w-1290tecore_i5-7640xcore_i9-7900xxeon_d-1543nxeon_gold_6209uxeon_w-3223xeon_gold_6226xeon_d-1559xeon_gold_6256xeon_d-1521core_i7-5960xxeon_d-2145ntxeon_gold_6230rxeon_w-3175xxeon_gold_6238xeon_gold_6252xeon_w-1250pcore_i7-7800xcore_i9-9920xcore_i7-4930mxxeon_w-3235xeon_silver_4208core_i7-5930kxeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_w-2225xeon_w-2123xeon_gold_5220sxeon_w-2133xeon_w-3275mxeon_platinum_9242xeon_platinum_9282core_i7-3820xeon_d-1557xeon_platinum_8260lxeon_platinum_8280lxeon_bronze_3204simatic_cpu_1518f-4xeon_d-2177ntxeon_w-2175xeon_gold_5220txeon_silver_4210Intel(R) Processors
CVE-2020-0560
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.30%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 16:41
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for the Intel(R) Renesas Electronics(R) USB 3.0 Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-renesas_electronics_usb_3.0_driverIntel(R) Renesas Electronics(R) USB 3.0 Driver
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-0529
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.77%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:54
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in BIOS firmware for 8th, 9th and 10th Generation Intel(R) Core(TM) Processor families may allow an unauthenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i9-9900kscore_i7-7700kcore_i7-8705gcore_i7-8665ucore_i7-7660ucore_i7-8706gcore_i7-1068ng7core_i5-7300u_firmwarecore_i7-8565u_firmwarecore_i9-9880h_firmwarecore_i7-8700t_firmwarecore_i7-10850hcore_i7-10700e_firmwarecore_i5-7600t_firmwarecore_i5-7500_firmwarecore_i7-10700kcore_i7-8700core_i7-8665ue_firmwarecore_i5-7440hq_firmwarecore_i5-7y54core_i7-8705g_firmwarecore_i7-10700tecore_i7-7700tcore_i7-10700tcore_i7-8086kcore_i5-7260u_firmwarecore_i7-8709g_firmwarecore_i7-1060g7_firmwarecore_i5-7600k_firmwarecore_i7-8700kcore_i9-9880hcore_i9-9900kfcore_i5-7440eqcore_i5-7287ucore_i7-10710ucore_i7-10700kfcore_i5-7200u_firmwarecore_i7-10700k_firmwarecore_i5-7442eqcore_i7-10510u_firmwarecore_i7-8565ucore_i7-7600ucore_i5-7y57_firmwarecore_i5-7600kcore_i7-10700t_firmwarecore_i5-7300hq_firmwarecore_i5-7442eq_firmwarecore_i7-8569u_firmwarecore_i5-7300hqcore_i7-7560ucore_i7-8706g_firmwarecore_i7\+8700_firmwarecore_i7-10510ycore_i7-7820eqcore_i5-7400t_firmwarecore_i5-7360u_firmwarecore_i5-7360ucore_i9-9900core_i7-10510y_firmwarecore_i7-8650u_firmwarecore_i7-7600u_firmwarecore_i7-7700hqcore_i7-8850h_firmwarecore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_i7-10610u_firmwarecore_i7-10710u_firmwarecore_i7-7820hkcore_i7-7567u_firmwarecore_i7-7700hq_firmwarecore_i5-7600tcore_i5-7300ucore_i5-7440eq_firmwarecore_i7-7500ucore_i7-8550ucore_i7-10510ucore_i5-7500core_i7-8500y_firmwarecore_i7-1060g7core_i7-10810u_firmwarecore_i7-10810ucore_i5-7200ucore_i7-8700b_firmwarecore_i7-10875h_firmwarecore_i7-8559u_firmwarecore_i7-8850hcore_i5-7287u_firmwarecore_i7-7700core_i7-8086k_firmwarecore_i7-10610ucore_i7-8665u_firmwarecore_i7-7820hq_firmwarecore_i7-7920hqcore_i7-8500ycore_i7-7920hq_firmwarecore_i7-7567ucore_i9-9900tcore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i9-9900ks_firmwarecore_i7-10700te_firmwarecore_i7-8700k_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i7-10700core_i7\+8700core_i7-7660u_firmwarecore_i7-7820hqcore_i7-10750h_firmwarecore_i7-8750h_firmwarecore_i5-7600core_i5-7400_firmwarecore_i7-8665uecore_i7-10700fcore_i7-8809g_firmwarecore_i7-8557u_firmwarecore_i7-1068ng7_firmwarecore_i7-10750hcore_i7-7700t_firmwarecore_i7-7820eq_firmwarecore_i5-7y54_firmwarecore_i9-9980hk_firmwarecore_i5-7400tcore_i5-7267u_firmwarecore_i7-10875hcore_i9-9900kcore_i7-8809gcore_i5-7440hqcore_i5-7600_firmwarecore_i5-7260ucore_i7-8709gcore_i7-8700bcore_i7-7y75_firmwarecore_i7-8550u_firmwarecore_i7-8569ucore_i7-7500u_firmwarecore_i5-7267ucore_i7-10700f_firmwarecore_i7-7700_firmwarecore_i7-10700kf_firmwarecore_i7-7y75core_i7-7820hk_firmwarecore_i7-8557ucore_i9-9900kf_firmwarecore_i7-7560u_firmwarecore_i5-7500t_firmwarecore_i5-7y57core_i7-8700tcore_i7-10700_firmwarecore_i7-10850h_firmwarecore_i5-7500tcore_i7-1065g7core_i5-7400core_i9-9980hkcore_i7-8559ucore_i7-8650ucore_i9-9900t_firmwarecore_i7-10700eBIOS
CWE ID-CWE-665
Improper Initialization
CVE-2020-0588
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.47%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 17:56
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lxeon_gold_6222vxeon_platinum_9222xeon_gold_5217xeon_gold_6230txeon_gold_6242xeon_gold_6230nxeon_gold_5218nxeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_5218txeon_silver_4215xeon_gold_5220rxeon_gold_5220xeon_gold_6246xeon_silver_4214xeon_silver_4214rxeon_platinum_8276xeon_gold_6254xeon_gold_6238txeon_silver_4210rxeon_gold_6250lxeon_gold_6240yxeon_silver_4214yxeon_gold_6210uxeon_gold_6234xeon_gold_5218bxeon_gold_6238rxeon_gold_6208uxeon_platinum_8268xeon_gold_5215xeon_gold_6262vxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_5222xeon_gold_6240rxeon_gold_5218xeon_silver_4209txeon_gold_6209uxeon_gold_5215lxeon_silver_4215rxeon_gold_6226xeon_gold_6252nxeon_gold_6256xeon_platinum_9221xeon_gold_6244xeon_gold_6230rxeon_gold_6238xeon_gold_6252xeon_silver_4210txeon_gold_6248xeon_gold_6212uxeon_silver_4208xeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_gold_6248rxeon_platinum_8280xeon_gold_5220sxeon_platinum_9242xeon_platinum_9282xeon_gold_6258rxeon_platinum_8260lxeon_platinum_8280lxeon_gold_6240xeon_bronze_3204xeon_gold_6238lxeon_gold_6240lxeon_gold_6250biosxeon_platinum_8256xeon_gold_5220txeon_silver_4210Intel(R) Processors
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-0520
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.16%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 20:00
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-0547
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.30%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 16:58
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for Intel(R) Data Migration Software versions 3.3 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_migrationIntel(R) Data Migration Software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-0510
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:17
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds read in some Intel(R) Graphics Drivers before versions 15.45.31.5127 and 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers Advisory
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0504
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.46%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 17:42
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-0566
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.22% / 44.92%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:59
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control in subsystem for Intel(R) TXE versions before 3.175 and 4.0.25 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-trusted_execution_engine_firmwareIntel(R) TXE
CVE-2021-44454
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in a third-party component for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quartus_primeIntel(R) Quartus(R) Prime Pro Edition
CWE ID-CWE-20
Improper Input Validation
CVE-2020-0110
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-8
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 20:10
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel

Action-Not Available
Vendor-n/aIntel CorporationGoogle LLC
Product-core_i5-1145gre_firmwarecore_i7-11850he_firmwarecore_i7-11370h_firmwarecore_i7-11700fcore_i7-1068ng7core_i7-1160g7core_i5-1035g7core_i3-10105f_firmwarecore_i7-10850hcore_i7-1185grecore_i3-1125g4_firmwarecore_i7-11375hcore_i7-11800h_firmwarejhl8540_firmwarecore_i7-10870h_firmwarecore_i5-10400fcore_i3-1110g4_firmwarecore_i5-11600_firmwarecore_i3-10300core_i9-10900te_firmwarecore_i7-10700tcore_i5-1140g7_firmwarecore_i3-1110g4core_i5-10210ucore_i7-1060g7_firmwarecore_i5-10200hcore_i9-11900kf_firmwarecore_i3-10100f_firmwarecore_i5-1155g7_firmwarecore_i5-1035g4core_i5-10400hcore_i7-11700core_i7-10700k_firmwarecore_i7-10510u_firmwarecore_i3-10100ycore_i5-10400tcore_i7-11370hcore_i3-10100_firmwarecore_i5-10310ucore_i9-11900tcore_i5-10505core_i5-1030g7core_i7-10700t_firmwarecore_i7-1195g7_firmwarecore_i5-11600tcore_i5-10310y_firmwarecore_i7-11850hcore_i9-11900core_i3-1000g1core_i7-10510ycore_i7-1185g7e_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i5-10600_firmwarecore_i7-11800hcore_i3-10305t_firmwarecore_i5-10310u_firmwarecore_i5-10400core_i7-10610u_firmwarecore_i9-10900f_firmwarecore_i5-1155g7core_i3-10105fcore_i5-10500tecore_i7-10710u_firmwarecore_i5-11320h_firmwarecore_i9-11950hcore_i7-11850hecore_i5-11600core_i5-10300hcore_i9-10980hkcore_i3-1005g1_firmwarecore_i7-11700tcore_i3-10100y_firmwarecore_i7-10510ucore_i5-10400t_firmwarejhl6540core_i5-11400h_firmwarecore_i3-10100ecore_i7-1060g7core_i9-11900hjhl6340core_i9-10900core_i5-11600k_firmwarecore_i5-11500h_firmwarecore_i9-11900kcore_i3-11100hecore_i3-10100tcore_i7-11700k_firmwarecore_i9-10900ecore_i9-10850kcore_i3-10325_firmwarejhl8540core_i9-10900kjhl6240_firmwarecore_i7-10700te_firmwarecore_i9-10900fcore_i5-11500t_firmwarecore_i7-1160g7_firmwarecore_i7-10700core_i3-10105t_firmwarecore_i7-11600h_firmwarecore_i3-10100tecore_i7-10750h_firmwarecore_i5-10400_firmwarecore_i3-1115gre_firmwarecore_i3-10105tcore_i9-10885hcore_i5-11400tcore_i7-10700fcore_i5-11300hcore_i7-1180g7_firmwarecore_i5-1030g4_firmwarecore_i9-11900kfcore_i3-10325core_i5-1145g7core_i3-1125g4core_i7-1068ng7_firmwarecore_i7-10750hjhl7340core_i3-1000g4core_i7-10875hjhl7540core_i9-11900k_firmwarecore_i5-10400h_firmwarecore_i3-10100core_i5-10500_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwarecore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarejhl8440_firmwarecore_i5-10210ycore_i5-1140g7core_i5-10500ecore_i3-10305_firmwarecore_i5-10210u_firmwarecore_i5-10600tcore_i3-10110yandroidcore_i5-10600kfcore_i5-11400fcore_i5-11500_firmwarecore_i7-10700ecore_i9-10900e_firmwarecore_i5-1145grecore_i7-1180g7core_i5-11600kfcore_i5-10500h_firmwarecore_i7-11700kfcore_i7-10870hcore_i9-11950h_firmwarecore_i5-1035g1core_i5-1038ng7core_i5-11260h_firmwarecore_i9-11900_firmwarecore_i5-11400f_firmwarecore_i7-10700e_firmwarecore_i3-10110y_firmwarecore_i5-1035g4_firmwarecore_i7-1185g7core_i7-1195g7core_i5-11500tcore_i7-10700kcore_i7-1165g7core_i5-11600kcore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4core_i5-10500te_firmwarecore_i7-10700tecore_i5-10500core_i7-11700kcore_i7-11700_firmwarecore_i5-1130g7_firmwarecore_i5-10500e_firmwarecore_i7-10710ucore_i7-10700kfcore_i3-11100he_firmwarejhl6340_firmwarecore_i5-11500he_firmwarecore_i5-1145g7_firmwarecore_i5-10600t_firmwarecore_i5-10210y_firmwarecore_i5-11400hcore_i3-10305core_i3-10300_firmwarecore_i3-1000g4_firmwarecore_i9-11900t_firmwarecore_i5-11400_firmwarejhl6540_firmwarecore_i9-11900fcore_i7-10510y_firmwarecore_i3-10100e_firmwarecore_i7-11600hcore_i7-11390h_firmwarecore_i9-11980hkcore_i5-10600kcore_i5-1038ng7_firmwarecore_i7-1165g7_firmwarecore_i9-10900kfcore_i3-10105core_i3-1115g4e_firmwarecore_i3-10100te_firmwarecore_i5-1130g7core_i3-1120g4core_i3-1120g4_firmwarecore_i9-10900k_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i5-10310yjhl7440_firmwarecore_i5-10500hcore_i7-1185g7_firmwarecore_i3-10100t_firmwarecore_i7-10810u_firmwarecore_i9-10900t_firmwarecore_i5-11600kf_firmwarecore_i5-11320hcore_i7-10810ucore_i7-11700kf_firmwarecore_i3-10300t_firmwarecore_i3-1115g4_firmwarecore_i5-10400f_firmwarecore_i3-10105_firmwarecore_i7-11375h_firmwarecore_i3-1115grecore_i7-10875h_firmwarecore_i9-10900_firmwarecore_i5-11500hcore_i5-10500t_firmwarecore_i7-10610ucore_i5-10505_firmwarecore_i5-1035g1_firmwarecore_i3-10100fjhl7340_firmwarecore_i7-1065g7_firmwarecore_i5-1135g7_firmwarecore_i5-10600jhl8440core_i5-11260hcore_i3-1115g4ecore_i5-10300h_firmwarecore_i7-11850h_firmwarecore_i9-10900kf_firmwarecore_i5-11600t_firmwarecore_i9-11900f_firmwarecore_i5-11300h_firmwarecore_i9-11980hk_firmwarecore_i5-10200h_firmwarecore_i9-10850k_firmwarecore_i7-11700t_firmwarecore_i9-10885h_firmwarecore_i5-1145g7ejhl7440core_i5-11500hecore_i5-1030g7_firmwarecore_i5-1145g7e_firmwarecore_i3-10320core_i9-10900tcore_i7-1185gre_firmwarecore_i3-10300tjhl7540_firmwarecore_i5-11500core_i5-1135g7core_i3-10110u_firmwarecore_i5-10500tcore_i7-10700kf_firmwarecore_i3-10320_firmwarecore_i7-1185g7ecore_i3-1005g1jhl6240core_i3-10305tcore_i5-11400core_i7-10700_firmwarecore_i7-10850h_firmwarecore_i7-1065g7core_i9-10900tecore_i9-10980hk_firmwareAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33118
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:07
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the software installer for the Intel(R) Serial IO driver for Intel(R) NUC 11 Gen before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-serial_io_driver_for_intel_nuc_11_genIntel(R) Serial IO driver for Intel(R) NUC 11 Gen
CVE-2021-33137
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the Intel(R) Kernelflinger project may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-kernelflingerIntel(R) Kernelflinger project
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33101
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.73%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled search path in the Intel(R) GPA software before version 21.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_performance_analyzersIntel(R) GPA software
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-33108
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.23%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) In-Band Manageability software before version 2.13.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-in-band_manageabilityIntel(R) In-Band Manageability software
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33150
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.33% / 55.49%
||
7 Day CHG~0.00%
Published-11 Mar, 2022 | 17:54
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7-6870hqatom_c3950core_i3-7100hcore_i7-8850hcore_i3-10100core_i3-6100ucore_i3-7300core_i5-1038ng7core_i5-11400celeron_j4125core_i7-10510yz370core_i5-6350hqcore_i5-11600kcore_i3-6300tcore_i9-10900tecore_i5-6360ucore_i3-6157uceleron_3865ucore_i3-10100ycore_i5-11260hcore_i3-1115g4ecore_i5-10600th270c627pentium_gold_g5400tcore_i5-6500tcore_i5-7500c627acore_i5-6260uc625atom_c2508c621apentium_gold_g6505tcore_i5-7440hqatom_c2516core_i7-8709gatom_c3758pentium_gold_g6505xeon_d-2177ntceleron_3867ucore_i9-11900kfcore_i7-7660ucore_i7-7700hqatom_c3308pentium_gold_g6500tcore_i9-10900tcore_i5-6402pcore_i7-10700tecore_i9-10900kcore_i3-10105q370celeron_j3455ecore_i5-11400tcore_i7-11700kcore_i5-11400fcore_i7-8550ucore_i5-10400tcore_i7-1185g7xeon_d-2796teh370c246core_i7-6700hqc629acore_i3-8300xeon_d-2142itceleron_j4105core_i7-10700kfatom_c2338core_i5-7500tq150c232xeon_d-2187ntxeon_d-2775tecore_i7-1065g7core_i9-11900kcore_i5-10500hcore_i5-6267ucore_i5-10600kfcore_i3-1000g1celeron_j3060core_i5-7y54celeron_3955ucore_i3-1005g1core_i7-1068ng7c626core_i5-7400atom_c2550celeron_j3355ecore_i7-6567uz270core_i5-7287ucore_i3-10100ec236pentium_gold_g5420tatom_c2518core_i7-7560uatom_c3538core_i7-11600hcore_i7-7920hqcore_i7-10700core_i5-11600kfcore_i5-7600tatom_c2558q170atom_c3508core_i5-1145grecore_i3-7020uceleron_j3355xeon_d-2799core_i5-1135g7core_i3-1115g4xeon_d-2145ntcore_i3-8145ucore_i5-10400xeon_d-2173itxeon_d-2161ixeon_d-2766ntcore_i7-7567ucore_i7-8700katom_c2530c621xeon_d-2163itcore_i3-1120g4core_i5-1155g7core_i7-7820hqcore_i7-7820eqxeon_d-2123itcore_i5-11400hcore_i9-11900hcore_i3-8109uceleron_j3455core_i7-1185g7ecore_i3-1110g4core_i7-10810ucore_i3-10300tcore_i3-8100xeon_d-2776ntcore_i3-8145uecore_i5-1130g7pentium_gold_4425ycore_i3-7320core_i7-10700ecore_i5-8350ucore_i9-11900core_i5-6585rcore_i3-10100tecore_i7-10700tcore_i3-7100pentium_gold_6500yatom_c2538core_i5-6300hqcore_i7-11390hxeon_d-2786ntecore_i5-7y57core_i5-1145g7core_i7-6700tecore_i5-10500ecore_i7-10750hcore_i9-10850katom_c2358xeon_d-2143itxeon_d-2753ntcore_i5-7260uceleron_3855ucore_i3-8100hcore_i5-6600core_i9-10900ecore_i7-8706gc624celeron_3965ucore_i5-8250ucore_i3-6300core_i9-11980hkh310core_i9-11900fq250core_i5-10500tec242core_i5-11500core_i9-11950hcore_i3-6100teatom_c3750core_i7-11700xeon_d-2798ntcore_i7-8700bcore_i5-10500tcm246core_i7-1195g7core_i5-10310ucore_i9-10885hcore_i5-10600core_i7-8557ucore_i5-7440eqcore_i3-6320core_i5-10310ycore_i7-1165g7xeon_d-2738core_i7-11850heatom_c3338core_i5-1145g7eatom_x7-e3950core_i7-10700kcore_i5-6440eqcore_i5-1030g7celeron_j4025core_i9-10980hkxeon_d-2733ntcm236atom_c2730core_i7-6650ucore_i7-11370hz170core_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i5-1035g4core_i5-11600txeon_d-2795ntcore_i5-6287ucore_i7-8650ucore_i7-8500yxeon_d-2779core_i5-10200hpentium_silver_n5030core_i7-8705gpentium_silver_j5040z390atom_c3558rceleron_n4000core_i5-10400fcore_i7-1160g7core_i7-7600uatom_c3808core_i3-7100eatom_c2750h170core_i3-7101ecore_i7-8706g_atom_c2738celeron_j4005celeron_n3150core_i5-6300upentium_silver_n5000xeon_d-2141iatom_c2308core_i7-1180g7core_i3-6100hcore_i7-7500ucore_i3-10320b250core_i3-10110yxeon_d-2752ntecore_i5-1035g7core_i7-7820hkpentium_gold_g5400core_i3-10105fceleron_n3700core_i5-8305gcore_i3-6100atom_x5-e3940core_i3-6098pcore_i5-6400core_i7-10875hcore_i3-1115grecore_i3-7101tecore_i5-11600core_i5-7400tcore_i7-7700atom_c2316core_i7-11700fcore_i3-11100hecore_i5-10400hcore_i3-6100tcore_i7-8750hcore_i7-8665ub365core_i5-7300hqcore_i3-10305txeon_d-2183itxeon_d-2712tcore_i3-8140uh110core_i3-8350kcore_i5-6600kcore_i5-10600kcore_i7-8086kc628core_i7-10850hcore_i7-6700tatom_c3958atom_c3338rx299core_i3-10105tcore_i5-11300hcore_i5-6500tecore_i3-8100bcore_i5-6500core_i3-1000g4core_i3-6167ucore_i9-10900kfcore_i3-10100tatom_c3858xeon_d-2146ntcore_i5-7267ucore_i5-8600kcore_i3-7100ucore_i5-6442eqcore_i7-8700txeon_d-2752tercore_i5-11500hecore_i3-7100tc622core_i7-11700tpentium_j4205core_i3-6102ecm238core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqpentium_gold_g5420celeron_3965ycore_i7-6700kcore_i7-6970hqcore_i7-11375hcore_i7-7y75core_i7-8559ucore_i7-6822eqcore_i3-7300tatom_c3850core_i5-11500tatom_c3955core_i9-11900tcore_i7-6785rcore_i7-6560ucore_i7-1060g7core_i7-6600ucore_i7-1185grecore_i7-8569ucore_i3-10325celeron_4205ucore_i7-7700tatom_c3558core_i7-8700core_i5-6685rxeon_d-2796ntcore_i3-7130ucore_i5-8400atom_c3436lcore_i7-8809gcore_i5-11320hatom_c3708core_i5-7600core_i5-6400tcore_i7-6500ucore_i5-1035g1core_i3-10305core_i7-11850hxeon_d-2166ntcore_i3-7350kb150core_i3-10110uq270core_i5-10505c629atom_c3336core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i5-7600kcore_i7-6820hkatom_c2758celeron_4305ucore_i3-6006ucore_i7-10710uatom_c2718celeron_j3160core_i5-10210ycore_i9-10900core_i5-10300hcore_i5-7360uatom_x5-e3930core_i5-7300upentium_gold_g6500core_i7-11800hcore_i3-10300atom_c2350core_i5-6600tpentium_gold_4417ucore_i9-10900fcore_i3-1125g4core_i7-8565ucore_i5-1030g4core_i3-8100tcore_i7-7700katom_c3830core_i7-10870hcore_i3-10100fcore_i7-10510uceleron_n3050b360core_i5-6440hqcore_i3-7102ecore_i7-6660ucore_i3-6100ecore_i5-6200ucore_i5-7200ucore_i7-10700fceleron_n3000core_i5-10210ucore_i7-6820hqatom_c3758rceleron_4305uecore_i5-10500pentium_silver_j5005Intel(R) Trace Hub instances which
CVE-2021-33080
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.15% / 35.22%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of sensitive system information due to uncleared debug information in firmware for some Intel(R) SSD DC, Intel(R) Optane(TM) SSD and Intel(R) Optane(TM) SSD DC Products may allow an unauthenticated user to potentially enable information disclosure or escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_ssd_905poptane_ssd_dc_p4800xoptane_ssd_900poptane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4801xoptane_ssd_905p_firmwareoptane_ssd_p5800xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_dc_p4800x_firmwareoptane_ssd_p5800x_firmwareoptane_memory_h10_with_solid_state_storageoptane_memory_h10_with_solid_state_storage_firmwareoptane_ssd_900p_firmwareIntel(R) SSD DC, Intel(R) Optane(TM) SSD and Intel(R) Optane(TM) SSD DC Products
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2021-33059
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.23%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:13
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) Administrative Tools for Intel(R) Network Adapters driver for Windows before version 1.4.0.15, may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-administrative_tools_for_intel_network_adaptersIntel(R) Administrative Tools for Intel(R) Network Adapters
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33058
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.77%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:11
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the installer Intel(R)Administrative Tools for Intel(R) Network Adaptersfor Windowsbefore version 1.4.0.21 may allow an unauthenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-administrative_tools_for_intel_network_adaptersversion
CVE-2021-33071
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:03
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) oneAPI Rendering Toolkit before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_rendering_toolkitIntel(R) oneAPI Rendering Toolkit
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33076
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.93%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 14:24
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in firmware for some Intel(R) SSD DC Products may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ssd_dc_s4500ssd_d5-p5316_firmwaressd_e_6100pssd_dc_p4511_edsff_firmwaressd_dc_p4510_sff_firmwaressd_pro_6000pssd_dc_p4500ssd_d7_p5600_firmwaressd_dc_p4500_firmwaressd_670pssd_e_6000pssd_dc_p4600_firmwaressd_e_6000p_firmwaressd_d3-s4610_m.2_firmwaressd_760p_firmwaressd_dc_p4610_sff_firmwaressd_dc_p4101_firmwaressd_dc_p4511_edsffssd_dc_p3100_firmwaressd_660p_firmwaressd_dc_p4600ssd_dc_p4511_m.2_firmwaressd_d5-p4326_firmwaressd_760pssd_dc_p4510_edsff_firmwaressd_660pssd_600pssd_dc_p4608ssd_dc_d4512_firmwaressd_dc_s4500_firmwaressd_665p_firmwaressd_dc_p4610_sffssd_dc_p3100ssd_dc_s4600ssd_pro_7600p_firmwaressd_pro_6000p_firmwaressd_dc_p4101ssd_d3-s4510_m.2ssd_700p_firmwaressd_dc_p4511_m.2ssd_pro_7600pssd_665pssd_dc_p4501_firmwaressd_e_6100p_firmwaressd_d3-s4610_m.2ssd_670p_firmwaressd_d5-p4326ssd_d7_p5600ssd_dc_p4501ssd_dc_s4600_firmwaressd_d3-s4510_m.2_firmwaressd_d7_p5510_firmwaressd_dc_p4510_sffssd_d7_p5510ssd_d5-p5316ssd_700pssd_dc_d4512ssd_dc_p4510_edsffssd_dc_p4608_firmwaressd_600p_firmwareIntel(R) SSD DC
CWE ID-CWE-287
Improper Authentication
CVE-2021-33077
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 22.53%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in firmware for some Intel(R) SSD, Intel(R) Optane(TM) SSD and Intel(R) SSD DC Products may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_ssd_905poptane_ssd_dc_p4800xoptane_ssd_900poptane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4801xoptane_ssd_905p_firmwareoptane_ssd_p5800xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_dc_p4800x_firmwareoptane_ssd_p5800x_firmwareoptane_memory_h10_with_solid_state_storageoptane_memory_h10_with_solid_state_storage_firmwareoptane_ssd_900p_firmwareIntel(R) SSD, Intel(R) Optane(TM) SSD and Intel(R) SSD DC Products
CVE-2021-33089
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:56
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC8i3BE, NUC8i5BE, NUC8i7BE before version 1.78.4.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_hdmi_firmware_update_toolnuc_kit_nuc8i3benuc_kit_nuc8i7benuc_kit_nuc8i5beIntel(R) NUC HDMI Firmware Update Tool for NUC8i3BE, NUC8i5BE, NUC8i7BE
CVE-2021-33106
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:35
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the Safestring library maintained by Intel(R) may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-safestring_libraryIntel(R) Safestring Library
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-33062
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:10
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the software installer for the Intel(R) VTune(TM) Profiler before version 2021.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-vtune_profilerIntel(R) VTune(TM) Profiler
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33129
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the software installer for the Intel(R) Advisor before version 2021.4.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-advisorIntel(R) Advisor
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-0061
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.28%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 12:47
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in some Intel(R) Graphics Driver before version 27.20.100.9030 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsgraphics_driversIntel(R) Graphics Driver
CWE ID-CWE-665
Improper Initialization
CVE-2021-0100
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.50%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:12
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) SSD Data Center Tool, versions downloaded before 12/31/2020, may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ssd_data_center_toolIntel(R) SSD Data Center Tool, versions downloaded
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-0084
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 12:48
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) Ethernet Controllers X722 and 800 series Linux RMDA driver before version 1.3.19 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-x722da2_firmwarex722da4fhethernet_controller_e810x722da4fh_firmwareethernet_controller_e810_firmwarex722da4g1p5_firmwarex722da4g1p5x722da2Intel(R) Ethernet Controllers X722 and 800 series Linux RMDA driver
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 7
  • 8
  • Next
Details not found