Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-8717

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-13 Aug, 2020 | 03:00
Updated At-04 Aug, 2024 | 10:12
Rejected At-
Credits

Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:13 Aug, 2020 | 03:00
Updated At:04 Aug, 2024 | 10:12
Rejected At:
▼CVE Numbering Authority (CNA)

Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.

Affected Products
Vendor
n/a
Product
Intel(R) Server Boards, Server Systems and Compute Modules Advisory
Versions
Affected
  • Before version 1.59
Problem Types
TypeCWE IDDescription
textN/ADenial of Service
Type: text
CWE ID: N/A
Description: Denial of Service
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
x_refsource_MISC
https://security.netapp.com/advisory/ntap-20200814-0002/
x_refsource_CONFIRM
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
Resource:
x_refsource_MISC
Hyperlink: https://security.netapp.com/advisory/ntap-20200814-0002/
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
x_refsource_MISC
x_transferred
https://security.netapp.com/advisory/ntap-20200814-0002/
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20200814-0002/
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:13 Aug, 2020 | 03:15
Updated At:17 Aug, 2020 | 20:06

Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

Intel Corporation
intel
>>server_board_s2600wt_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wt2>>-
cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wt2r>>-
cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wtt>>-
cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wttr>>-
cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1000wt_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wt2gs>>-
cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wt2gsr>>-
cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wttgs>>-
cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wttgsbpp>>-
cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wttgsr>>-
cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wt2gs>>-
cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wt2gsr>>-
cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wttgs>>-
cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wttgsr>>-
cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2000wt_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wt2ys>>-
cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wt2ysr>>-
cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttyc1>>-
cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttyc1r>>-
cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttys>>-
cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttysr>>-
cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2224wttys>>-
cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2224wttysr>>-
cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2308wttys>>-
cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2308wttysr>>-
cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wttys>>-
cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wttysr>>-
cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2>>-
cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2r>>-
cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2s>>-
cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2sr>>-
cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwt>>-
cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwtr>>-
cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwts>>-
cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwtsr>>-
cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kp_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kp>>-
cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kpf>>-
cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kpfr>>-
cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kpr>>-
cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kp_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kp>>-
cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kpf>>-
cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kpfr>>-
cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kpr>>-
cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kptr>>-
cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600tp_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600tp>>-
cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.netapp.com/advisory/ntap-20200814-0002/secure@intel.com
Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20200814-0002/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

625Records found

CVE-2023-22379
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.66%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22449
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-09 Oct, 2024 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_pro_board_nuc12wsbi70znuc_13_extreme_compute_element_nuc13sbbi9_firmwarenuc_laptop_kit_lapkc51e_firmwarenuc_pro_board_nuc11tnhv50lnuc_12_compute_element_elm12hbc_firmwarenuc_pro_ki_nuc11tnkv5_firmwarenuc_pro_kit_nuc12wshi30l_firmwarenuc_pro_mini_pc_nuc11tnkv50z_firmwarenuc_laptop_kit_lapkc71e_firmwarenuc_13_extreme_kit_nuc13rngi7nuc_13_extreme_compute_element_nuc13sbbi5nuc_laptop_kit_lapbc710_firmwarenuc_pro_ki_nuc11tnkv50znuc_pro_board_nuc12wshi7nuc_pro_board_nuc12wsbi5_firmwarenuc_11_performance_mini_pc_nuc11pahi3nuc_pro_ki_nuc11tnbv7nuc_pro_board_nuc12wshi70z_firmwarenuc_pro_board_nuc12wski70z_firmwarenuc_boards_nuc11tnhi70l_firmwarenuc_13_extreme_compute_element_nuc13sbbi7fnuc_boards_nuc11tnbi30z_firmwarenuc_pro_mini_pc_nuc11tnkv7_firmwarenuc_11_performance_mini_pc_nuc11paki3nuc_13_extreme_compute_element_nuc13sbbi5_firmwarenuc_pro_ki_nuc11tnkv50z_firmwarenuc_11_performance_mini_pc_nuc11paki7_firmwarenuc_laptop_kits_lapac71g_firmwarenuc_11_performance_kit_nuc11pahi30znuc_pro_board_nuc12wsbi50z_firmwarenuc_11_performance_kit_nuc11pahi30z_firmwarenuc_11_compute_element_cm11ebc4w_firmwarenuc_pro_board_nuc12wshi30z_firmwarenuc_boards_nuc11tnbi50znuc_boards_nuc11tnhi70znuc_pro_kit_nuc12wsbi5_firmwarenuc_essential_nuc11atbc4_firmwarenuc_pro_mini_pc_nuc11tnbv7nuc_boards_nuc11tnki30z_firmwarenuc_pro_kit_nuc12wsbi70znuc_pro_board_nuc11tnkv50znuc_boards_nuc11tnki30znuc_pro_kit_nuc12wsbi5nuc_enthusiast_nuc12snki72nuc_boards_nuc11tnki50z_firmwarenuc_11_performance_mini_pc_nuc11paki3_firmwarenuc_extreme_nuc12dcmi9_firmwarenuc_11_performance_mini_pc_nuc11pahi7nuc_13_extreme_kit_nuc13rngi7_firmwarenuc_enthusiast_nuc12snki72vanuc_boards_nuc11tnki50znuc_pro_kit_nuc12wshi50znuc_pro_ki_nuc11tnhv7nuc_pro_board_nuc11tnbv7_firmwarenuc_pro_kit_nuc12wski50z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qanuc_boards_nuc11tnki5nuc_pro_board_nuc12wski7nuc_essential_nuc11atkc2nuc_boards_nuc11tnhi50znuc_pro_board_nuc12wsbi3nuc_boards_nuc11tnbi5_firmwarenuc_11_performance_mini_pc_nuc11paki7nuc_boards_nuc11tnki7nuc_pro_board_nuc12wsbi70z_firmwarenuc_laptop_kit_lapbc710nuc_11_performance_mini_pc_nuc11pahi7_firmwarenuc_pro_kit_nuc12wshi30znuc_11_performance_kit_nuc11paqi50wanuc_pro_mini_pc_nuc11tnhv5_firmwarenuc_13_extreme_compute_element_nuc13sbbi7_firmwarenuc_laptop_kit_lapkc71fnuc_11_performance_mini_pc_nuc11pahi50znuc_pro_mini_pc_nuc11tnhv70lnuc_11_performance_kit_nuc11pahi3_firmwarenuc_pro_board_nuc12wsbi30znuc_essential_nuc11atkc2_firmwarenuc_laptop_kit_lapbc510_firmwarenuc_pro_ki_nuc11tnhv70l_firmwarenuc_boards_nuc11tnki3_firmwarenuc_11_compute_element_cm11ebi58wnuc_boards_nuc11tnbi30znuc_13_extreme_kit_nuc13rngi9_firmwarenuc_11_performance_mini_pc_nuc11pahi70z_firmwarenuc_12_compute_element_elm12hbcnuc_essential_nuc11atkpenuc_boards_nuc11tnhi30l_firmwarenuc_11_performance_mini_pc_nuc11pahi70znuc_boards_nuc11tnhi30z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_boards_nuc11tnhi3nuc_pro_board_nuc12wshi5_firmwarenuc_laptop_kit_lapkc51enuc_11_performance_kit_nuc11pahi50znuc_pro_board_nuc12wshi30lnuc_pro_kit_nuc12wsbi3nuc_boards_nuc11tnhi50z_firmwarenuc_boards_nuc11tnhi7_firmwarenuc_pro_board_nuc11tnbv5nuc_laptop_kit_laprc710_firmwarenuc_pro_board_nuc12wshi3nuc_pro_board_nuc12wsbi50znuc_pro_board_nuc11tnhv7_firmwarenuc_pro_kit_nuc12wski70z_firmwarenuc_essential_nuc11atkc4nuc_11_performance_mini_pc_nuc11pahi50z_firmwarenuc_13_extreme_kit_nuc13rngi9nuc_11_compute_element_cm11ebi38w_firmwarenuc_11_performance_kit_nuc11paki3_firmwarenuc_11_performance_mini_pc_nuc11pahi5nuc_pro_kit_nuc12wski7nuc_12_compute_element_elm12hbi3nuc_pro_ki_nuc11tnhv5_firmwarenuc_boards_nuc11tnki70znuc_11_compute_element_cm11ebi38wnuc_boards_nuc11tnhi3_firmwarenuc_13_extreme_compute_element_nuc13sbbi7f_firmwarenuc_12_compute_element_elm12hbi5nuc_pro_board_nuc12wshi7_firmwarenuc_11_performance_kit_nuc11paki7nuc_pro_ki_nuc11tnbv5nuc_11_performance_kit_nuc11pahi70znuc_pro_ki_nuc11tnhv5nuc_pro_board_nuc11tnkv5_firmwarenuc_boards_nuc11tnbi7_firmwarenuc_boards_nuc11tnhi50lnuc_pro_kit_nuc12wski7_firmwarenuc_boards_nuc11tnhi30p_firmwarenuc_pro_mini_pc_nuc11tnhv7_firmwarenuc_boards_nuc11tnki7_firmwarenuc_boards_nuc11tnhi70q_firmwarenuc_pro_board_nuc12wski5_firmwarenuc_pro_kit_nuc12wski30znuc_laptop_kit_lapkc71enuc_pro_board_nuc12wshi50znuc_11_performance_mini_pc_nuc11paki5nuc_11_compute_element_cm11ebi716wnuc_extreme_nuc12dcmi7_firmwarenuc_pro_board_nuc12wshi30znuc_pro_ki_nuc11tnhv70lnuc_pro_kit_nuc12wski70znuc_pro_board_nuc12wski3_firmwarenuc_pro_mini_pc_nuc11tnkv5_firmwarenuc_pro_kit_nuc12wshi5_firmwarenuc_12_extreme_compute_element_nuc12dcmi9_firmwarenuc_laptop_kit_laprc510_firmwarenuc_pro_board_nuc11tnhv50l_firmwarenuc_pro_kit_nuc12wski3nuc_pro_ki_nuc11tnhv50l_firmwarenuc_pro_mini_pc_nuc11tnbv7_firmwarenuc_boards_nuc11tnki5_firmwarenuc_pro_kit_nuc12wski3_firmwarenuc_pro_kit_nuc12wsbi3_firmwarenuc_extreme_compute_element_nuc11dbbi9nuc_nuc11phki7cnuc_pro_mini_pc_nuc11tnbv5_firmwarenuc_extreme_compute_element_nuc11dbbi7nuc_11_performance_mini_pc_nuc11pahi5_firmwarenuc_13_extreme_compute_element_nuc13sbbi9fnuc_11_performance_kit_nuc11pahi3nuc_nuc11phki7c_firmwarenuc_13_extreme_compute_element_nuc13sbbi9f_firmwarenuc_pro_board_nuc11tnkv50z_firmwarenuc_11_performance_kit_nuc11pahi50z_firmwarenuc_pro_board_nuc12wshi70znuc_pro_board_nuc12wski30z_firmwarenuc_essential_nuc11atkc4_firmwarenuc_boards_nuc11tnhi50w_firmwarenuc_13_extreme_compute_element_nuc13sbbi5f_firmwarenuc_boards_nuc11tnhi70lnuc_12_extreme_compute_element_nuc12dcmi7nuc_boards_nuc11tnhi50l_firmwarenuc_extreme_nuc12dcmi7nuc_pro_board_nuc12wshi30l_firmwarenuc_boards_nuc11tnhi30znuc_extreme_nuc12edbi7_firmwarenuc_12_extreme_compute_element_nuc12edbi9_firmwarenuc_pro_kit_nuc12wsbi50znuc_11_performance_kit_nuc11paqi50wa_firmwarenuc_pro_board_nuc11tnbv5_firmwarenuc_13_extreme_kit_nuc13rngi5nuc_pro_kit_nuc12wshi7_firmwarenuc_pro_kit_nuc12wshi7nuc_laptop_kit_lapbc510nuc_extreme_compute_element_nuc11dbbi9_firmwarenuc_pro_mini_pc_nuc11tnhv50lnuc_boards_nuc11tnbi7nuc_pro_ki_nuc11tnkv7_firmwarenuc_11_performance_kit_nuc11paki5_firmwarenuc_boards_nuc11tnhi30lnuc_pro_kit_nuc12wski30z_firmwarenuc_pro_ki_nuc11tnbv5_firmwarenuc_pro_ki_nuc11tnkv7nuc_essential_nuc11atkpe_firmwarenuc_pro_board_nuc12wsbi3_firmwarenuc_pro_kit_nuc12wshi5nuc_pro_board_nuc12wski50z_firmwarenuc_extreme_compute_element_nuc11btmi7nuc_extreme_nuc12edbi7nuc_pro_kit_nuc12wski5nuc_boards_nuc11tnhi7nuc_pro_mini_pc_nuc11tnhv7nuc_11_performance_kit_nuc11pahi5_firmwarenuc_pro_board_nuc12wski3nuc_12_extreme_compute_element_nuc12edbi7_firmwarenuc_12_compute_element_elm12hbi5_firmwarenuc_pro_kit_nuc12wshi50z_firmwarenuc_pro_mini_pc_nuc11tnbv5nuc_pro_board_nuc11tnkv7_firmwarenuc_boards_nuc11tnbi50z_firmwarenuc_11_performance_kit_nuc11paki3nuc_12_compute_element_elm12hbi7nuc_13_extreme_compute_element_nuc13sbbi5fnuc_pro_kit_nuc12wshi3nuc_11_performance_mini_pc_nuc11pahi30z_firmwarenuc_boards_nuc11tnhi70z_firmwarenuc_11_performance_kit_nuc11paqi70qanuc_pro_board_nuc11tnkv7nuc_nuc11phki7caa_firmwarenuc_pro_board_nuc12wski30znuc_boards_nuc11tnbi3_firmwarenuc_boards_nuc11tnhi5nuc_pro_ki_nuc11tnhv50lnuc_pro_board_nuc11tnhv5_firmwarenuc_11_performance_mini_pc_nuc11pahi3_firmwarenuc_pro_ki_nuc11tnhv7_firmwarenuc_extreme_nuc12dcmi9nuc_boards_nuc11tnhi50wnuc_13_extreme_compute_element_nuc13sbbi9nuc_boards_nuc11tnbi70z_firmwarenuc_pro_ki_nuc11tnbv7_firmwarenuc_extreme_compute_element_nuc11btmi9_firmwarenuc_enthusiast_nuc12snki72va_firmwarenuc_pro_mini_pc_nuc11tnhv5nuc_boards_nuc11tnki3nuc_pro_board_nuc12wski50znuc_11_performance_kit_nuc11paqi70qa_firmwarenuc_11_performance_mini_pc_nuc11paqi50wanuc_boards_nuc11tnki70z_firmwarenuc_pro_kit_nuc12wsbi50z_firmwarenuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_pro_kit_nuc12wshi70z_firmwarenuc_11_performance_kit_nuc11pahi7nuc_pro_board_nuc12wski70znuc_laptop_kits_lapac71gnuc_pro_mini_pc_nuc11tnhv50l_firmwarenuc_laptop_kit_laprc510nuc_pro_board_nuc11tnbv7nuc_11_compute_element_cm11ebc4wnuc_pro_board_nuc12wski7_firmwarenuc_pro_mini_pc_nuc11tnkv5nuc_pro_kit_nuc12wshi70znuc_boards_nuc11tnhi70qnuc_extreme_nuc12edbi9nuc_laptop_kit_lapkc71f_firmwarenuc_nuc11phki7caanuc_pro_mini_pc_nuc11tnkv7nuc_pro_kit_nuc12wsbi70z_firmwarenuc_11_performance_kit_nuc11paki5nuc_extreme_compute_element_nuc11btmi9nuc_pro_board_nuc12wski5nuc_pro_board_nuc11tnkv5nuc_pro_board_nuc11tnhv70l_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc_13_extreme_compute_element_nuc13sbbi7nuc_13_extreme_kit_nuc13rngi5_firmwarenuc_11_performance_kit_nuc11pahi70z_firmwarenuc_extreme_compute_element_nuc11btmi7_firmwarenuc_boards_nuc11tnbi70znuc_12_extreme_compute_element_nuc12dcmi7_firmwarenuc_12_extreme_compute_element_nuc12edbi7nuc_laptop_kits_lapac71h_firmwarenuc_extreme_nuc12edbi9_firmwarenuc_12_compute_element_elm12hbi7_firmwarenuc_12_compute_element_elm12hbi3_firmwarenuc_extreme_compute_element_nuc11dbbi7_firmwarenuc_boards_nuc11tnbi5nuc_11_performance_mini_pc_nuc11pahi30znuc_pro_board_nuc12wsbi5nuc_pro_board_nuc11tnhv70lnuc_boards_nuc11tnhi5_firmwarenuc_pro_kit_nuc12wshi30z_firmwarenuc_laptop_kits_lapac71hnuc_11_compute_element_cm11ebi58w_firmwarenuc_pro_kit_nuc12wsbi30z_firmwarenuc_11_performance_kit_nuc11pahi5nuc_boards_nuc11tnhi30pnuc_essential_nuc11atbc4nuc_11_performance_kit_nuc11pahi7_firmwarenuc_pro_kit_nuc12wsbi30znuc_pro_board_nuc12wshi5nuc_pro_kit_nuc12wshi30lnuc_pro_ki_nuc11tnkv5nuc_pro_kit_nuc12wshi3_firmwarenuc_pro_mini_pc_nuc11tnkv50znuc_12_extreme_compute_element_nuc12dcmi9nuc_pro_kit_nuc12wski50znuc_enthusiast_nuc12snki72_firmwarenuc_boards_nuc11tnbi3nuc_pro_board_nuc12wshi3_firmwarenuc_pro_board_nuc11tnhv7nuc_11_performance_mini_pc_nuc11paki5_firmwarenuc_12_extreme_compute_element_nuc12edbi9nuc_pro_mini_pc_nuc11tnhv70l_firmwarenuc_pro_board_nuc12wshi50z_firmwarenuc_laptop_kit_laprc710nuc_pro_board_nuc12wsbi30z_firmwarenuc_pro_kit_nuc12wski5_firmwarenuc_pro_board_nuc11tnhv5Intel(R) NUC BIOS firmwarebios
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22342
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.7||HIGH
EPSS-0.07% / 23.06%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-12 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-thunderbolt_dch_driverIntel(R) Thunderbolt(TM) DCH drivers for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22329
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-2.6||LOW
EPSS-0.04% / 12.11%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-13 Feb, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7-1365u_firmwarepentium_gold_g4600core_i7-11850he_firmwarecore_i5-12600hecore_i7-1280pcore_i7-1068ng7core_i5-1035g7core_i5-12600tcore_i5-13600kcore_i3-8350k_firmwarecore_i3-9350k_firmwareceleron_5305upentium_gold_g6600_firmwareceleron_g3940pentium_gold_g6400t_firmwarepentium_n6415_firmwarecore_i9-12900te_firmwarecore_i5-11600_firmwareceleron_g1610t_firmwareceleron_4305uceleron_b800_firmwarecore_i7-1060g7_firmwareceleron_n2815core_i7-9700core_i7-1370pcore_i5-12500hl_firmwarecore_i9-9900kfceleron_2961ypentium_gold_g5400tcore_i5-1035g4core_i5-10400hceleron_4205uceleron_n5105core_i7-10700k_firmwareceleron_2002e_firmwareceleron_n3000_firmwarecore_i5-9600t_firmwarecore_i3-10100ycore_i5-1345ucore_i7-9700tecore_i5-10400tcore_i5-13500hcore_i7-11370hcore_i5-10310ucore_i5-9400f_firmwarecore_i7-1270pcore_i7-10700t_firmwarecore_i7-1270p_firmwareceleron_g1830core_i5-11600tcore_i5-1235ul_firmwarecore_i5-8269u_firmwarecore_i7-13700core_i5-12500te_firmwareceleron_b720core_i7-13800h_firmwareceleron_n4100celeron_g6900celeron_g3940_firmwareceleron_n3060core_i5-10400celeron_1020ecore_i5-12600k_firmwarepentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwareceleron_1020mcore_i5-10500teceleron_g5305ucore_i5-11600core_i7-12800hl_firmwareceleron_5305u_firmwarecore_i5-13505h_firmwarepentium_gold_g6405t_firmwarecore_i9-13980hx_firmwareceleron_g1820te_firmwareceleron_3865u_firmwarecore_i5-8600core_i7-12800he_firmwarecore_i5-1345ue_firmwarecore_i5-9400_firmwareceleron_5205ucore_i7-8500y_firmwareceleron_3865ucore_i5-1245ulceleron_g4930e_firmwarecore_i3-10100ecore_i5-13600hxcore_i7-1060g7core_i5-13500tecore_i9-10900celeron_n2930celeron_n2840_firmwarecore_i5-11600k_firmwareceleron_g4900tcore_i3-10100tceleron_g3900te_firmwarepentium_gold_g7400ecore_i9-10900kceleron_797_firmwarecore_i3-10325_firmwareceleron_g4932ecore_i5-8600kpentium_gold_g7400tcore_i7-10700te_firmwarecore_i9-10900fcore_i5-12600he_firmwarecore_i7-8700k_firmwarecore_i5-11500t_firmwarecore_i5-13400tcore_i7-8750hcore_i3-10105t_firmwarecore_i9-13900tceleron_927ueceleron_g465core_i5-10400_firmwarecore_i3-1115gre_firmwareceleron_2002eceleron_n4505_firmwarecore_i7-1180g7_firmwarecore_i7-9850he_firmwarecore_i3-1125g4core_i5-13600h_firmwarecore_i3-1000g4core_i3-12300_firmwareceleron_6600he_firmwareceleron_j6413_firmwarecore_i7-13700tcore_i7-8809gcore_i3-8145ueceleron_j4105celeron_887core_i5-10400h_firmwareceleron_807_firmwarecore_i9-12900h_firmwarecore_i5-10500_firmwarepentium_gold_g6505celeron_j6412_firmwareceleron_g5900t_firmwarecore_i9-13900kscore_i5-1245ul_firmwarecore_i7-1260u_firmwarecore_i7-13700_firmwarecore_i7-1370pe_firmwarecore_i7-1265uecore_i9-13900kf_firmwarepentium_gold_g6400te_firmwarecore_i5-10500eceleron_2970mcore_i5-9400tceleron_j3355core_i5-8600t_firmwarecore_i5-8300hcore_i7-12700e_firmwarecore_i9-13905h_firmwarecore_i3-10110yatom_x6414re_firmwarecore_i5-10600kfceleron_1005m_firmwareceleron_j3355eceleron_1047ue_firmwarecore_i7-12650h_firmwarecore_i5-11600kfceleron_j4125_firmwarecore_i7-11700kfpentium_gold_g5500tcore_i7-10870hcore_i5-12600t_firmwareceleron_3205ucore_i5-8600_firmwarecore_i5-1245u_firmwarecore_i3-13300hre_firmwarecore_i5-9600kf_firmwareatom_x6212re_firmwarecore_i7-1250uceleron_g4920celeron_3215u_firmwarecore_i7-13620h_firmwarecore_i5-11500tpentium_gold_g6405uceleron_n4504core_i5-9500core_i3-8145ue_firmwarecore_i5-1250pecore_i5-10500te_firmwarecore_i7-1366ure_firmwareceleron_n2807celeron_g540t_firmwarecore_i5-1130g7_firmwareceleron_g3902ecore_i7-1366urepentium_gold_7505_firmwarecore_i5-8300h_firmwarecore_i3-1220pepentium_gold_8505_firmwarecore_i7-8565ucore_i7-1365ureceleron_n3350_firmwarepentium_gold_g6400e_firmwareceleron_1019yceleron_n2820core_i3-10300_firmwareceleron_b815pentium_gold_g5420tcore_i3-8100t_firmwarecore_i5-8259ucore_i9-11900fceleron_787_firmwareceleron_g5900tcore_i7-11600hcore_i9-12900f_firmwarecore_i9-12900hk_firmwarepentium_gold_g5500core_i7-1370pecore_i7-13700kf_firmwarecore_i7-8850h_firmwareceleron_2980u_firmwarecore_i7-9700kf_firmwareceleron_g460_firmwarecore_i3-10105core_i7-9850h_firmwarepentium_gold_g6405_firmwareceleron_b830core_i3-13100celeron_b810e_firmwarepentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwareceleron_n3700_firmwarecore_i9-10900k_firmwarecore_i9-12900e_firmwarecore_i7-1280p_firmwarecore_i5-1350p_firmwareceleron_g540atom_x6211ecore_i7-1185g7_firmwareceleron_g530t_firmwarecore_i5-11320hceleron_b810celeron_j4115_firmwarecore_i3-10300t_firmwarecore_i7-13700hxcore_i5-9300hpentium_gold_g6500core_i5-13450hx_firmwareceleron_n4000c_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i7-10610uceleron_g540tcore_i5-1035g1_firmwarecore_i7-12850hx_firmwarecore_i7-8665u_firmwareceleron_g1620core_i5-9400hcore_i7-8500ycore_i9-9900tcore_i9-13900hxceleron_1037u_firmwarecore_i7-9700e_firmwarecore_i3-13100f_firmwarecore_i9-12900tecore_i7-12700kf_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i3-8109u_firmwareceleron_n3060_firmwareceleron_3955ucore_i7-9700k_firmwareceleron_n4000celeron_n2830core_i5-13500hxceleron_7300core_i5-1145g7e_firmwarecore_i3-12100te_firmwarecore_i7-12800hcore_i3-10300tcore_i3-8100b_firmwareceleron_n3450celeron_n5100celeron_n2805_firmwarecore_i9-8950hk_firmwareceleron_g3930_firmwarecore_i7-1265ue_firmwarecore_i5-13600k_firmwareceleron_j6412pentium_j6425_firmwarepentium_gold_g6600celeron_n2810atom_x6200feceleron_g1610tcore_i5-8265ucore_i9-13905hcore_i5-13400t_firmwarecore_i7-13700k_firmwarepentium_gold_g6605celeron_g470_firmwareceleron_g5925atom_x6413e_firmwarepentium_gold_g5400t_firmwarepentium_gold_4410y_firmwarecore_i5-13600hceleron_g3920_firmwarecore_i7-10700_firmwareceleron_g530tcore_i3-8350kcore_i5-13500_firmwarecore_i7-1365ue_firmwarecore_i3-9100core_i9-12900hxcore_i5-9600k_firmwarecore_i5-1250pcore_i7-12700h_firmwarepentium_gold_g5600celeron_j4125core_i5-1145gre_firmwarecore_i3-1215ue_firmwareceleron_g4950_firmwareceleron_j1750core_i7-8705gcore_i5-9500eceleron_7305lcore_i5-12450h_firmwarecore_i7-8706gcore_i7-12700hcore_i5-12500t_firmwarecore_i9-9880h_firmwarecore_i7-8700t_firmwarecore_i7-1185grepentium_gold_4415u_firmwarecore_i7-11375hcore_i3-13300hrecore_i5-12600hx_firmwareceleron_n6210core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarecore_i7-13800hre_firmwarecore_i7-8700atom_x6200fe_firmwarecore_i5-1245ue_firmwarecore_i7-8705g_firmwareceleron_b840_firmwarecore_i9-10900te_firmwarepentium_gold_8500core_i7-10700tceleron_g5205u_firmwarecore_i5-10210ucore_i5-12450hcore_i5-8257ucore_i7-8700kcore_i5-12500tecore_i7-1260pcore_i5-1345urepentium_gold_g6405tcore_i5-1155g7_firmwareceleron_n2830_firmwarecore_i7-10510u_firmwarecore_i5-13600he_firmwareceleron_g1610_firmwareceleron_3867u_firmwareceleron_g440_firmwarecore_i3-10100_firmwareceleron_2000ecore_i5-10505celeron_725ccore_i5-1030g7pentium_gold_g7400e_firmwarecore_i5-1345ure_firmwarecore_i7-8569u_firmwarepentium_n6415core_i7\+8700_firmwarecore_i3-13300hecore_i7-1185g7e_firmwareceleron_g1620t_firmwareceleron_g1820_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i9-12900fcore_i7-11800hceleron_1000m_firmwarecore_i5-12400celeron_867_firmwarecore_i5-10310u_firmwareceleron_g465_firmwareceleron_g4900t_firmwarecore_i3-10105fcore_i3-9100hl_firmwarecore_i3-8100hceleron_n4020c_firmwarepentium_gold_4415ycore_i5-13600t_firmwarecore_i9-11950hceleron_g5900tecore_i5-10300hcore_i7-13850hxcore_i5-1345ueceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_j3455_firmwarecore_i3-12300he_firmwareceleron_g550_firmwarecore_i5-8500tceleron_1017u_firmwarecore_i7-12700hl_firmwareceleron_n2910celeron_j1800_firmwarepentium_gold_g7400_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kceleron_877core_i5-8350u_firmwareceleron_g1820tceleron_g3930ecore_i9-10850kpentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarecore_i9-9900ks_firmwarecore_i7-12700tepentium_gold_g6400tceleron_1019y_firmwarecore_i3-9300_firmwarecore_i5-8400tpentium_gold_g5600tceleron_g3930tcore_i7-10700core_i7-11600h_firmwarecore_i3-9100te_firmwareceleron_g550tceleron_j4105_firmwarecore_i7-10750h_firmwareceleron_847_firmwareceleron_3965uceleron_g4920_firmwarecore_i5-1240p_firmwarecore_i3-10105tatom_x6211e_firmwarecore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i7-13700hcore_i9-12950hxcore_i3-12100ecore_i9-12900kscore_i7-10875hcore_i5-13500t_firmwarecore_i5-1340peceleron_n3350e_firmwarecore_i7-1370prepentium_gold_g5400_firmwarecore_i7-12700te_firmwarecore_i9-11900k_firmwareceleron_6305_firmwarecore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwareceleron_j1900celeron_6305core_i5-9400core_i3-8100tceleron_n4505core_i3-13100t_firmwarecore_i5-13400_firmwarecore_i7-12700fcore_i3-1210u_firmwareceleron_g4930t_firmwarecore_i5-13600hecore_i9-12900core_i7-8650ucore_i5-13500tcore_i9-13900_firmwarecore_i9-10900e_firmwarecore_i5-1145greatom_x6414recore_i5-1340pcore_i7-9750h_firmwarecore_i7-12700t_firmwarecore_i5-1345u_firmwareatom_x6425re_firmwarepentium_gold_g4620_firmwarecore_i7-13700te_firmwareceleron_j1850_firmwarepentium_gold_4415ucore_i5-1038ng7core_i9-13900h_firmwarecore_i5-11260h_firmwarecore_i7-10700e_firmwareceleron_g1850_firmwarecore_i3-10110y_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwarecore_i5-8500bcore_i7-1185g7core_i7-1195g7core_i7-12700_firmwarecore_i7-13850hx_firmwarecore_i7-13800hrecore_i5-8269uceleron_927ue_firmwarecore_i5-12400f_firmwareceleron_n3520celeron_b810ecore_i7-10700tecore_i5-1350peceleron_n3000core_i7-1355u_firmwarecore_i9-13900fcore_i7-8709g_firmwarecore_i3-13100tcore_i7-11700_firmwarecore_i9-13900hx_firmwarecore_i7-1265ulceleron_n4100_firmwarecore_i5-10500e_firmwareceleron_1007uceleron_867celeron_g3900tcore_i5-11500he_firmwarecore_i5-8279u_firmwarecore_i5-1145g7_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarecore_i5-10210y_firmwarecore_i5-13400e_firmwarecore_i7-1250u_firmwarecore_i5-13600kfcore_i5-8250uatom_x6425recore_i3-10305celeron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700tcore_i5-12600hl_firmwarecore_i9-12900ks_firmwarecore_i5-1230u_firmwareceleron_n3450_firmwarecore_i3-1215u_firmwarecore_i3-1315u_firmwarecore_i5-13500hx_firmwareceleron_n2805core_i7-8650u_firmwarecore_i7-1365ure_firmwareceleron_j1750_firmwareceleron_4305uecore_i3-9350kfcore_i9-9900k_firmwareceleron_b820_firmwareceleron_g3902e_firmwarecore_i3-1115g4e_firmwareceleron_g530core_i5-1130g7core_i5-12400t_firmwarecore_i5-13500eceleron_1020m_firmwareceleron_4205u_firmwarecore_i5-1245ucore_i5-8365u_firmwarecore_i5-10500hceleron_2950mcore_i3-9300tcore_i3-8100h_firmwarecore_i3-1115g4_firmwareceleron_j6413core_i3-1320pre_firmwarecore_i7-10875h_firmwarecore_i5-10500t_firmwareceleron_j4005_firmwarecore_i5-8265u_firmwarecore_i7-12800h_firmwareceleron_j3060_firmwarecore_i7-1375pre_firmwarecore_i9-13900kpentium_gold_g6400eceleron_g5305u_firmwareceleron_n2920atom_x6413epentium_gold_7505core_i5-10600celeron_g3930te_firmwarecore_i3-12100tecore_i3-1115g4ecore_i7\+8700celeron_3755u_firmwarecore_i9-12900hcore_i5-13500core_i3-9350kceleron_7300_firmwarecore_i5-8500_firmwarecore_i5-13600kf_firmwarecore_i7-13700hx_firmwarecore_i9-11980hk_firmwarecore_i7-8665ueceleron_g4950celeron_6305eceleron_j3455ecore_i5-1145g7ecore_i7-1265u_firmwarecore_i5-11500heceleron_g5900e_firmwarecore_i3-10320core_i5-8200yceleron_g3900t_firmwareceleron_g470core_i5-12600kfceleron_n4020celeron_g4900_firmwareceleron_g1620tpentium_gold_g6405u_firmwarecore_i7-8569ucore_i5-13500te_firmwareceleron_g3900eceleron_g1820teceleron_g3950_firmwarecore_i5-10500tcore_i7-13700t_firmwarecore_i7-12850hxcore_i5-1350pcore_i7-1185g7ecore_i7-1265ul_firmwarecore_i9-13900ks_firmwareceleron_j3355_firmwarecore_i5-12600hxcore_i3-8100bcore_i5-9600tcore_i5-12600_firmwarecore_i3-9320core_i5-11400celeron_n2910_firmwarecore_i7-1065g7core_i5-13500h_firmwareceleron_g440core_i9-10900tecore_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230ucore_i3-8130ucore_i7-13700f_firmwareceleron_2957ucore_i5-13600hx_firmwarecore_i3-9100_firmwareceleron_847eceleron_3955u_firmwareceleron_n4504_firmwareceleron_g1620_firmwareceleron_g550core_i7-11370h_firmwareceleron_j1900_firmwarecore_i3-13300he_firmwarecore_i7-1160g7core_i3-10105f_firmwarecore_i9-13900k_firmwarepentium_gold_g5420core_i7-9700kfcore_i7-13700kfpentium_gold_g5420t_firmwarecore_i5-8305g_firmwarecore_i3-13100e_firmwarecore_i7-10870h_firmwarecore_i5-8400hceleron_j1850core_i7-1260uceleron_b815_firmwarepentium_gold_g5420_firmwarecore_i3-1110g4_firmwarecore_i3-1110g4core_i5-12500tcore_i5-10200hcore_i9-13900eceleron_g3920t_firmwarecore_i3-10100f_firmwarepentium_gold_g4560_firmwarecore_i5-12500hcore_i3-8145ucore_i7-11700core_i3-1220pcore_i5-9600_firmwarecore_i3-8109ucore_i5-1250pe_firmwarecore_i3-12300t_firmwarecore_i9-11900tcore_i7-9700f_firmwareceleron_n4500core_i7-1195g7_firmwarecore_i5-9500e_firmwarecore_i7-11850hcore_i5-12600hcore_i9-11900core_i7-12800hxcore_i5-10600_firmwarecore_i3-9100hlceleron_g550t_firmwareceleron_n3150core_i7-12700eceleron_n5100_firmwarecore_i3-12100tcore_i5-8400bcore_i7-13800he_firmwarecore_i3-9300t_firmwarecore_i7-10610u_firmwarecore_i9-13900hkcore_i5-9500_firmwarecore_i5-1240pcore_i5-12500pentium_gold_g5620core_i5-13600hre_firmwareceleron_1020e_firmwarecore_i7-11850hecore_i7-13650hxcore_i5-8400h_firmwareceleron_n4120pentium_gold_g7400te_firmwarecore_i3-9100tepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i5-1350pe_firmwarecore_i5-13420h_firmwareceleron_g3930tepentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kceleron_n2840core_i5-10400t_firmwarecore_i3-8100core_i9-13900kfcore_i9-11900hcore_i3-11100hecore_i7-1370pre_firmwarecore_i7-12700core_i5-1235u_firmwareceleron_3855u_firmwarecore_i7-11700k_firmwarepentium_gold_g6505t_firmwarecore_i9-13950hxcore_i5-13500e_firmwareceleron_2955uceleron_5205u_firmwarecore_i7-1160g7_firmwareceleron_6305e_firmwarecore_i7-8700_firmwareceleron_g3900_firmwarecore_i5-8365uceleron_g6900t_firmwareceleron_j3060core_i5-9600kfcore_i9-13900f_firmwarecore_i5-8500b_firmwareceleron_n3160core_i3-10100teceleron_7305core_i7-1255ul_firmwareceleron_g6900_firmwareceleron_g4930core_i7-10700fcore_i5-12400tcore_i5-1030g4_firmwareceleron_725c_firmwarecore_i5-12400_firmwarecore_i7-8557u_firmwarepentium_gold_g4600_firmwareceleron_n4000ccore_i5-1145g7core_i7-1068ng7_firmwarecore_i7-10750hceleron_3867ucore_i3-8300atom_x6427fecore_i9-13980hxcore_i3-1220pe_firmwareceleron_g4932e_firmwarecore_i5-13420hcore_i7-1360pcore_i5-12500e_firmwarecore_i7-8700bcore_i9-12950hx_firmwareceleron_j1800core_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-12650hcore_i3-1215ucore_i5-10210ycore_i5-1140g7core_i7-13650hx_firmwarecore_i5-12500hlcore_i3-1215ul_firmwarecore_i9-9900kf_firmwarecore_i5-9500fcore_i5-10210u_firmwareceleron_807uecore_i5-10600tcore_i7-9850hecore_i7-1375precore_i7-10700ecore_i5-1245uecore_i5-12600hlceleron_g4930epentium_gold_4410ycore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600pentium_gold_g6500t_firmwarecore_i3-1315upentium_gold_g7400tecore_i3-9100fceleron_827e_firmwarecore_i9-11900_firmwarepentium_gold_g5600t_firmwarecore_i3-12300hl_firmwarecore_i7-9750hfpentium_gold_6405uceleron_n3350core_i5-9300h_firmwarecore_i7-12700k_firmwarecore_i7-10700kceleron_g1820core_i9-12900k_firmwareceleron_g5925_firmwarecore_i9-12900kcore_i3-9320_firmwarecore_i3-13100fcore_i5-8400b_firmwarecore_i3-8100_firmwarecore_i7-11700kceleron_g555_firmwarecore_i3-1215ulcore_i3-12100_firmwarecore_i9-9880hcore_i3-13100ecore_i7-10710ucore_i5-8500t_firmwarecore_i7-10700kfcore_i3-11100he_firmwarecore_i7-1255u_firmwareceleron_g6900tcore_i7-13700teceleron_1047ueceleron_877_firmwarepentium_gold_g4560core_i9-13900tecore_i7-12800hecore_i9-13900hk_firmwarecore_i7-8706g_firmwarecore_i9-13900e_firmwarecore_i9-11900t_firmwareceleron_n4500_firmwareceleron_827epentium_gold_4415y_firmwarecore_i9-9900celeron_j3355e_firmwarecore_i7-10510y_firmwarecore_i5-12600core_i3-10100e_firmwarecore_i7-9850hl_firmwarecore_i7-11390h_firmwareceleron_n2806core_i3-13100_firmwareceleron_3765ucore_i3-8140ucore_i5-1038ng7_firmwareceleron_g5905tceleron_797core_i3-10100te_firmwarecore_i5-12400fcore_i5-1340pe_firmwarecore_i3-1120g4_firmwarecore_i5-13600tceleron_g1840_firmwarecore_i7-8550ucore_i7-13705hceleron_n3010core_i3-9100tceleron_j4025celeron_b820core_i5-8310y_firmwareceleron_g460core_i5-12600h_firmwareceleron_857core_i5-1235ulpentium_gold_4425yceleron_3205u_firmwarecore_i3-1320precore_i7-11375h_firmwarecore_i5-1335ueceleron_847core_i9-10900_firmwarecore_i5-10505_firmwarecore_i5-1334u_firmwareceleron_g6900tecore_i3-12300tcore_i9-12900t_firmwareceleron_g3900e_firmwarecore_i3-8145u_firmwarecore_i9-12900kfceleron_n3160_firmwareceleron_3755ucore_i3-1305ucore_i5-11260hcore_i3-1315urecore_i3-12100f_firmwarecore_i5-10300h_firmwarecore_i7-11850h_firmwareceleron_n2820_firmwareceleron_g3920tcore_i5-8210yceleron_n6211core_i7-8750h_firmwarecore_i5-10200h_firmwareceleron_1007u_firmwarecore_i9-11900f_firmwareceleron_2955u_firmwareceleron_2980uceleron_n6210_firmwarecore_i7-11700t_firmwareceleron_n6211_firmwareceleron_857_firmwareceleron_n3010_firmwarecore_i5-12600kf_firmwarecore_i5-13400fcore_i3-9100f_firmwarecore_i7-1185gre_firmwarepentium_gold_g6400_firmwarecore_i5-1350pre_firmwarecore_i5-11500core_i5-1135g7core_i5-8500core_i5-9500te_firmwarecore_i7-13800heceleron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarecore_i7-9750hceleron_n4020ccore_i7-12700f_firmwarepentium_gold_g6405core_i7-13700fceleron_787core_i3-10305tcore_i9-9900t_firmwarepentium_gold_g7400t_firmwarepentium_gold_g5500_firmwarecore_i5-13450hxcore_i7-13620hatom_x6212recore_i7-8665uceleron_n2940_firmwarecore_i3-8300tcore_i7-11700fcore_i7-12650hxceleron_b810_firmwarepentium_gold_g5620_firmwarecore_i7-10850hcore_i3-1210ucore_i3-1125g4_firmwareceleron_g1820t_firmwarecore_i7-11800h_firmwareceleron_g5905celeron_g3950celeron_2981ucore_i5-8400celeron_j4115celeron_7305l_firmwarecore_i3-10300core_i7-13705h_firmwarecore_i5-1140g7_firmwareceleron_n2930_firmwarecore_i7-8086kcore_i3-1320pe_firmwarepentium_gold_g5500t_firmwarepentium_gold_5405u_firmwareceleron_807core_i5-8365ue_firmwarecore_i5-1240u_firmwarecore_i5-12500h_firmwarecore_i9-11900kf_firmwareceleron_b710celeron_n2940core_i5-1335ucore_i5-8600k_firmwareceleron_b710_firmwarecore_i7-13800hceleron_j3455celeron_n5095_firmwareceleron_887_firmwareceleron_n2807_firmwarecore_i5-10310y_firmwarecore_i7-13700h_firmwarepentium_gold_4417ucore_i7-12700hlcore_i3-1000g1core_i7-10510yceleron_j3160core_i7-12700kcore_i5-8210y_firmwarecore_i9-13900te_firmwareceleron_n3150_firmwarecore_i3-9100e_firmwarecore_i7-1255ulceleron_g3900core_i5-9600kceleron_g5905t_firmwarecore_i3-10305t_firmwareceleron_n3520_firmwarecore_i3-12300hlceleron_7305e_firmwareceleron_n5105_firmwarecore_i5-1335ue_firmwarecore_i9-10900f_firmwarecore_i3-13100te_firmwarecore_i7-1270pecore_i9-12900hkcore_i9-12900ecore_i5-1155g7core_i3-9100t_firmwarecore_i5-11320h_firmwarecore_i9-12900_firmwareceleron_3215ucore_i3-1220p_firmwareceleron_g5900celeron_1005mcore_i5-8350uceleron_n4000_firmwareceleron_2950m_firmwareceleron_g1830_firmwarecore_i7-11700tcore_i3-13100teceleron_g3930celeron_g3930t_firmwarecore_i3-10100y_firmwareceleron_3965y_firmwareceleron_n2806_firmwarecore_i5-11400h_firmwarecore_i9-12900hx_firmwareceleron_g5900ecore_i5-13400ecore_i3-12100e_firmwarecore_i7-8700b_firmwarecore_i5-13600core_i9-8950hkcore_i9-10900ecore_i5-9300hf_firmwarecore_i7-12800hx_firmwarecore_i3-12100fceleron_g555celeron_b720_firmwarecore_i9-10885hpentium_j6425core_i3-1320peceleron_g1840t_firmwareceleron_g1840core_i3-12300hecore_i5-12500ecore_i3-9300celeron_1037ucore_i3-9350kf_firmwarecore_i9-9900kceleron_4305ue_firmwarecore_i9-12900tceleron_g1630core_i7-8709gceleron_j4025_firmwarepentium_gold_4417u_firmwarecore_m3-8100y_firmwarecore_i7-1355ucore_i3-12100core_i5-1335u_firmwarecore_i7-8557uceleron_g4930_firmwarecore_i5-9500tceleron_g1610core_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwareceleron_n2810_firmwarecore_i5-11400fcore_i5-11500_firmwarecore_i7-13700ecore_i7-1180g7celeron_2970m_firmwarecore_i5-13505hcore_i3-1215ueceleron_6600heceleron_n3700pentium_gold_g7400core_i9-11950h_firmwarecore_i9-13900core_i9-13900hceleron_2961y_firmwarecore_i5-1035g1core_i7-1370p_firmwarecore_i7-8565u_firmwareceleron_7305_firmwarepentium_gold_4425y_firmwarecore_i5-11400f_firmwarecore_i9-12900kf_firmwarecore_i7-12800hlceleron_b830_firmwarecore_i5-1250p_firmwarecore_i7-1165g7celeron_n3050celeron_n5095core_i5-11600katom_x6427fe_firmwarecore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4pentium_gold_8500_firmwarecore_i3-9100ecore_i3-12100t_firmwarecore_i5-10500celeron_b800atom_x6425eceleron_3965u_firmwareceleron_g3930e_firmwarecore_i5-1350precore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarecore_i5-13400f_firmwarecore_i7-1265uceleron_2981u_firmwarecore_i5-8279ucore_i3-8130u_firmwareceleron_g3920core_i5-13400core_i5-9300hfceleron_g1850pentium_gold_g6505_firmwarecore_i5-11400hcore_i7-13700e_firmwarecore_i3-8140u_firmwarecore_i3-1000g4_firmwarecore_i5-11400_firmwarecore_i7-1360p_firmwarecore_i7-9850hlceleron_g1840tcore_i7-13700kcore_i7-1255ucore_i5-13600_firmwarecore_i3-1315ueceleron_1017ucore_i9-11980hkcore_i5-10600kceleron_g5205uceleron_847e_firmwarecore_i3-1315ue_firmwarecore_m3-8100ycore_i7-1165g7_firmwarecore_i5-8250u_firmwarecore_i9-10900kfceleron_n4120_firmwarecore_i7-9700epentium_gold_g4620core_i5-8400_firmwareceleron_n3350ecore_i3-1120g4core_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwareceleron_4305u_firmwarecore_i7-12700tceleron_g540_firmwarecore_i5-8260ucore_i9-13900t_firmwareceleron_n2808celeron_b840core_i3-10100t_firmwarecore_i7-10810u_firmwarecore_i9-10900t_firmwarecore_i3-12300core_i5-11600kf_firmwarecore_i5-12450hx_firmwarecore_i5-1340p_firmwarecore_i7-10810ucore_i5-10400f_firmwarecore_i7-11700kf_firmwarecore_i5-12600kcore_i3-10105_firmwareceleron_j3160_firmwarecore_i3-1115greceleron_g5900te_firmwarecore_i7-8850hceleron_807ue_firmwareceleron_j3455e_firmwarecore_i5-11500hcore_i3-10100fcore_i3-8300_firmwareceleron_g4930tatom_x6425e_firmwarecore_i7-1365uecore_i7-12700kfcore_i7-1065g7_firmwarecore_i9-9900_firmwarecore_i5-1135g7_firmwarecore_i5-12500_firmwareceleron_n2815_firmwarecore_i5-8257u_firmwarecore_i9-10900kf_firmwareceleron_7305ecore_i5-11600t_firmwarecore_i5-12450hxceleron_g530_firmwarecore_i9-10850k_firmwareceleron_n4020_firmwarecore_i5-8365uecore_i7-8809g_firmwarecore_i9-10885h_firmwarecore_i5-1235uceleron_1000mcore_i7-12650hx_firmwarecore_i9-9980hk_firmwarecore_i5-1240uceleron_g4900core_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i9-10900tpentium_gold_g5400core_i7-1365ucore_i3-1305u_firmwarecore_i5-8310ycore_i3-1315ure_firmwarecore_i3-10110u_firmwarecore_i5-9500teceleron_2957u_firmwareceleron_2000e_firmwarecore_i5-9500t_firmwarecore_i7-9700te_firmwareceleron_3765u_firmwarecore_i3-10320_firmwareceleron_3965ypentium_gold_5405uceleron_g3900tecore_i3-1005g1celeron_j4005core_i9-13950hx_firmwareceleron_3855ucore_i5-8600tcore_i5-8305gcore_i7-10850h_firmwarecore_i5-9400t_firmwareceleron_g6900ecore_i7-8559ucore_i9-9980hkcore_i5-13600hreceleron_g6900te_firmwareceleron_g6900e_firmwarecore_i7-9700_firmwarepentium_gold_6500ypentium_gold_g6400core_i5-1334ucore_i7-1270pe_firmwareIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22337
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.16%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel Unison software may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11107
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.46% / 62.99%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:09
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11128
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.76%
||
7 Day CHG~0.00%
Published-13 Jun, 2019 | 15:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_stick_stk2mv64cccompute_stick_stck1a32wfccompute_stick_firmwarecompute_card_cd1iv128mkcompute_card_firmwarenuc_kit_nuc8i3bexnuc_kit_firmwarecompute_card_cd1c64gkcompute_stick_stck1a8lfccompute_card_cd1m3128mkcompute_stick_stk2m364cccompute_card_cd1p64gkcompute_stick_stk2m3w64ccIntel(R) NUC Firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11085
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.98%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i915_firmwarei915Intel(R) i915 Graphics for Linux
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11180
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.90% / 74.78%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:38
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11100
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.28% / 50.70%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:09
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11101
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.15% / 35.80%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:09
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Intel(R) TXE
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33141
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.6||HIGH
EPSS-0.13% / 33.44%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Ethernet Adapters and Intel(R) Ethernet Controller I225 Manageability firmware may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Ethernet Adapters and Intel(R) Ethernet Controller I225 Manageability firmwareethernet_adapterethernet_controller_i225_manageability_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11123
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 21.19%
||
7 Day CHG~0.00%
Published-13 Jun, 2019 | 15:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient session validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_stick_stk2mv64cccompute_stick_stck1a32wfccompute_stick_firmwarecompute_card_cd1iv128mkcompute_card_firmwarenuc_kit_nuc8i3bexnuc_kit_firmwarecompute_card_cd1c64gkcompute_stick_stck1a8lfccompute_card_cd1m3128mkcompute_stick_stk2m364cccompute_card_cd1p64gkcompute_stick_stk2m3w64ccIntel(R) NUC Firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11175
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.88% / 74.41%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:37
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11094
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.74%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in system firmware for Intel (R) NUC Kit may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_dn2820fykhnuc_kit_d54250wybnuc_kit_nuc7cjyhnuc_kit_nuc5i7ryhnuc_kit_nuc6i7kyknuc_kit_de3815tybenuc_kit_nuc8i7hnknuc_kit_nuc5cpyhnuc_kit_nuc7i7bnhnuc_kit_d33217gkenuc_kit_nuc6caysnuc_kit_nuc5pgyhnuc_kit_nuc5i5myhenuc_kit_d53427rkenuc_kit_nuc7i3dnhenuc_kit_nuc6i5syhnuc_kit_nuc7i5dnkenuc_kit_firmwarenuc_kit_nuc5i3myhenuc_kit_nuc7i7dnkeIntel (R) NUC
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11088
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.22% / 45.05%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2024-31154
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.03% / 7.23%
||
7 Day CHG-0.01%
Published-13 Nov, 2024 | 21:10
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in UEFI firmware for some Intel(R) Server S2600BPBR may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Server S2600BPBRs2600bpbr_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33113
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.1||HIGH
EPSS-0.48% / 64.11%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ac_9462_firmwarewindows_10ac_9560_firmwarewindows_11ax200_firmwareax210_firmwareac_8260_firmwareac_7265_firmwareac_1550_firmwareac_9461_firmwareac_9260_firmwareax1650_firmwareac_3168_firmwareax1675_firmwareac_3165_firmwareac_8265_firmwareax201_firmwareIntel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33108
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.31%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) In-Band Manageability software before version 2.13.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-in-band_manageabilityIntel(R) In-Band Manageability software
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33114
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.7||MEDIUM
EPSS-0.28% / 51.06%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ac_9462_firmwarewindows_10ac_9560_firmwarewindows_11ax200_firmwareax210_firmwareac_8260_firmwareac_7265_firmwareac_1550_firmwareac_9461_firmwareac_9260_firmwareax1650_firmwareac_3168_firmwareax1675_firmwareac_3165_firmwareac_8265_firmwareax201_firmwareIntel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11103
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.33%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in firmware update software for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33161
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.04% / 10.25%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Ethernet Adapters and Intel(R) Ethernet Controller I225 Manageability firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Ethernet Adapters and Intel(R) Ethernet Controller I225 Manageability firmwareethernet_controller_i225_manageability_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11102
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.14% / 34.87%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:09
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Intel(R) DAL software for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-dynamic_application_loadertrusted_execution_engine_firmwareIntel(R) DAL software for Intel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11086
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.14% / 34.74%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:10
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33146
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Ethernet Adapters and Intel(R) Ethernet Controller I225 Manageability firmware may allow an unauthenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Ethernet Adapters and Intel(R) Ethernet Controller I225 Manageability firmwareethernet_adapterethernet_controller_i225_manageability_firmware
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11104
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.85%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in MEInfo software for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33115
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.51% / 65.46%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-uefi_wifi_driverac_9461ac_7265ac_3168ac_9560ac_8260ac_8265ac_9260ax201ax210ax200ac_3165ac_9462Intel(R) PROSet/Wireless WiFi in UEFI
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33110
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.40% / 60.21%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ac_9462_firmwarewindows_10ac_9560_firmwarewindows_11ax200_firmwareax210_firmwareac_8260_firmwareac_7265_firmwareac_1550_firmwareac_9461_firmwareac_9260_firmwareax1650_firmwareac_3168_firmwareax1675_firmwareac_3165_firmwareac_8265_firmwareax201_firmwareIntel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2024-28028
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.7||HIGH
EPSS-0.04% / 8.78%
||
7 Day CHG-0.00%
Published-13 Nov, 2024 | 21:12
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Neural Compressor softwareneural_compressor_software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0166
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.93% / 75.15%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2024-28947
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.04% / 9.73%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-12 Sep, 2024 | 18:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in kernel mode driver for some Intel(R) Server Board S2600ST Family firmware before version 02.01.0017 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s2600st_firmwareIntel(R) Server Board S2600ST Family firmwareserver_board_s2600st_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2018-12222
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.05% / 16.81%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an out of bound memory read via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0131
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.1||HIGH
EPSS-0.21% / 43.49%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0097
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.34% / 56.06%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) Active Management Technology (AMT)
CWE ID-CWE-20
Improper Input Validation
CVE-2024-24981
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 24.76%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:46
Updated-14 May, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in PfrSmiUpdateFw driver in UEFI firmware for some Intel(R) Server M50FCP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server M50FCP Family productsserver_board_s2600bp_firmwareintel_server_d50fcp_familyintel_server_m50fcp_family
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0094
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 40.60%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) Active Management Technology (AMT)
CWE ID-CWE-20
Improper Input Validation
CVE-2024-24973
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-1||LOW
EPSS-0.03% / 6.96%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-31 Aug, 2024 | 03:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_base_toolkitdistribution_for_gdbIntel(R) Distribution for GDB software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0168
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.14% / 34.87%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 12.0.45 and 13.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Intel(R) TXE
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0163
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.83%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 17:03
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in system firmware for Intel(R) Broadwell U i5 vPro before version MYBDWi5v.86A may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i5-5350u_firmwarei5-5350uIntel(R) NUC Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0092
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.14% / 34.74%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) Active Management Technology (AMT)
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22390
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.86%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-01 Aug, 2024 | 22:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) FPGA products before version 2.9.1 may allow denial of service.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) FPGA productsagilex_7_fpga_f-series_023_firmwareagilex_7_fpga_f-series_006_firmwareagilex_7_fpga_f-series_008_firmwareagilex_7_fpga_f-series_019_firmwareagilex_7_fpga_i-series_023_firmwareagilex_7_fpga_i-series_022_firmwareagilex_7_fpga_i-series_019_firmwareagilex_7_fpga_i-series_035_firmwareagilex_7_fpga_i-series_040_firmwareagilex_7_fpga_f-series_022_firmwareagilex_7_fpga_i-series_041_firmwareagilex_7_fpga_f-series_012_firmwareagilex_7_fpga_f-series_027_firmwareagilex_7_fpga_i-series_027_firmwareagilex_7_fpga_f-series_014_firmwareagilex_7_fpga_m-series_039_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-23487
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 25.03%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:46
Updated-20 Aug, 2024 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in UserAuthenticationSmm driver in UEFI firmware for some Intel(R) Server D50DNP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server D50DNP Family productsserver_system_d50tnp2mhsvac_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21871
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.3||HIGH
EPSS-0.03% / 6.53%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 16:38
Updated-18 Sep, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Processorsxeon_d-2799_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21810
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 9.96%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-16 Aug, 2024 | 04:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Ethernet Network Controllers and Adaptersethernet_complete_driver_pack
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22015
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 20.93%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-01 Aug, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) DLB driver software before version 8.5.0 may allow an authenticated user to potentially denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) DLB driver softwaredynamic_load_balancer
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22095
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 24.76%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-20 Aug, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in PlatformVariableInitDxe driver in UEFI firmware for some Intel(R) Server D50DNP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server D50DNP Family productsserver_system_d50tnp2mhsvac_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2018-3650
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.93%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 15:00
Updated-17 Sep, 2024 | 02:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient Input Validation in Bleach module in INTEL Distribution for Python versions prior to IDP 2018 Update 2 allows unprivileged user to bypass URI sanitization via local vector.

Action-Not Available
Vendor-Intel Corporation
Product-distribution_for_pythonIntel Distribution for Python
CWE ID-CWE-20
Improper Input Validation
CVE-2018-3612
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.78%
||
7 Day CHG~0.00%
Published-10 May, 2018 | 22:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Intel NUC kits with insufficient input validation in system firmware, potentially allows a local attacker to elevate privileges to System Management Mode (SMM).

Action-Not Available
Vendor-n/aIntel Corporation
Product-dnkbli30.86agkaplcpx.86arybdwi35.86aayaplcel.86akyskli70.86abnkbl357.86afybyt10h.86asyskli35.86amybdwi30.86accsklm30.86amkkbly35.86adnkbli5v.86amkkbli5v.86abiosccsklm5v.86amybdwi5v.86atybyt10h.86adnkbli7v.86an/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0177
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 36.54%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwareamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0185
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 9.67%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 22:00
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for some Intel(R) Server Board M10JNP Family before version 7.216 may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-m10jnp2sb_firmwarem10jnp2sbIntel(R) Server Board M10JNP Family
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 12
  • 13
  • Next
Details not found