Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-26323

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-16 Nov, 2021 | 18:14
Updated At-16 Sep, 2024 | 23:45
Rejected At-
Credits

Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:16 Nov, 2021 | 18:14
Updated At:16 Sep, 2024 | 23:45
Rejected At:
▼CVE Numbering Authority (CNA)

Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
3rd Gen AMD EPYC™
Versions
Affected
  • From unspecified before MilanPI-SP3_1.0.0.4 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021
x_refsource_MISC
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021
x_refsource_MISC
x_transferred
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:16 Nov, 2021 | 19:15
Updated At:19 Nov, 2021 | 15:59

Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Advanced Micro Devices, Inc.
amd
>>epyc_7232p_firmware>>Versions before romepi-sp3_1.0.0.c(exclusive)
cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7232p>>-
cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7763_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7763>>-
cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713p_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713p>>-
cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713>>-
cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7663_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7663>>-
cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7643_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7643>>-
cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_75f3_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_75f3>>-
cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543p_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543p>>-
cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543>>-
cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7513_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7513>>-
cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7453_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7453>>-
cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_74f3_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_74f3>>-
cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443p>>-
cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443p_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443>>-
cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7413>>-
cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7413_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_73f3>>-
cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_73f3_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7343_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7343>>-
cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313p_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313p>>-
cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313>>-
cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_72f3_firmware>>Versions before milanpi-sp3_1.0.0.4(exclusive)
cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_72f3>>-
cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE-20Secondarypsirt@amd.com
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-20
Type: Secondary
Source: psirt@amd.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021psirt@amd.com
Vendor Advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021
Source: psirt@amd.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

603Records found

CVE-2021-0158
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-1.30% / 78.90%
||
7 Day CHG-1.06%
Published-17 Nov, 2021 | 19:06
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_w-2223core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_w-3245mcore_i3-8300tcore_i7-7660ucore_i7-8706gxeon_e-2378gcore_i7-1068ng7core_i7-11700fcore_i7-6950xxeon_platinum_8362xeon_w-3225core_i7-1160g7core_i5-1035g7xeon_e-2236xeon_gold_6338xeon_w-1370core_i7-10850hcore_i7-1185grecore_i7-11375hxeon_e3-1240_v6xeon_e-2314xeon_w-2125core_i9-10940xcore_i5-8400hceleron_n6210core_i5-10400fcore_i7-8700xeon_silver_4309yxeon_platinum_8352ycore_i5-8400core_i5-7y54core_i3-10300core_i3-7100tcore_i7-7700tcore_i7-10700tcore_i3-1110g4core_i7-8086kcore_i5-10210uxeon_w-2295xeon_gold_6326celeron_n2815core_i7-3960xcore_i5-8257ucore_i7-8700kcore_i5-10200hxeon_e-2226gceleron_n2940xeon_silver_4316core_i5-1035g4xeon_w-2255core_i3-8145ucore_i5-10400hceleron_n5105core_i7-11700core_i5-7442eqxeon_w-11555mlexeon_e-2134core_i3-10100ycore_i3-7020uxeon_e3-1501l_v6core_i5-10400tcore_i3-8109upentium_silver_n6000core_i7-11370hcore_i5-10310ucore_i9-7920xcore_i7-7600ucore_i9-11900txeon_e-2224xeon_e3-1285_v6core_i5-10505core_i5-1030g7xeon_w-1390txeon_w-1270celeron_n4500xeon_e3-1225_v6core_i3-7100ecore_i5-11600tcore_i3-7300xeon_e-2378core_i7-11850hcore_i9-11900core_i3-1000g1core_i7-10510yxeon_e3-1505l_v6xeon_e-2278gexeon_platinum_8380hcore_i3-10110uxeon_w-2245core_i7-11800hceleron_n3150xeon_platinum_8376hceleron_n4100xeon_gold_6330core_i9-7960xcore_i7-7820xceleron_n3060core_i5-10400core_i7-7700hqxeon_w-1270tecore_i5-8400bcore_i9-7980xexeon_gold_6314ucore_i5-1155g7core_i5-10500tecore_i3-10105fcore_i7-7820hkcore_i3-8100hcore_i7-6900kxeon_w-3335core_i9-9940xcore_i9-11950hcore_i7-11850hecore_i5-11600xeon_w-1290tcore_i5-10300hceleron_n4120xeon_platinum_8353hcore_i5-8350ucore_i9-10980hkxeon_w-11865mlexeon_gold_6348hcore_i5-7300ucore_i7-11700tcore_i5-8600xeon_w-11855mxeon_e-2136xeon_e-2246gcore_i5-8500tcore_i7-10510uxeon_w-3265mceleron_n2840core_i5-7500core_i7-3930kcore_i3-10100ecore_i3-8100core_i7-1060g7xeon_w-2265core_i9-11900hcore_i9-10900celeron_n2930celeron_n2910xeon_gold_5320hxeon_gold_5320xeon_platinum_8360yxeon_w-10855mcore_i5-7200ucore_i3-11100hecore_i9-11900kcore_i3-10100txeon_gold_6338tcore_i9-8950hkxeon_w-11555mrecore_i9-10900ecore_i7-7700core_i9-10850kxeon_gold_5318score_i9-10900kxeon_e-2386gcore_i7-7920hqcore_i3-7102ecore_i5-8600kxeon_e-2254mlcore_i9-10900fcore_i5-8400txeon_w-1270pcore_i7-8750hxeon_e3-1501m_v6core_i7-10700core_i5-8365ucore_i9-10920xceleron_n3160core_i3-10100tecore_i7-6850kxeon_e-2334core_i5-7600core_i9-7940xxeon_platinum_8380hlxeon_gold_5318ncore_i3-10105tcore_i9-9960xcore_i7-10700fxeon_e3-1270_v6core_i9-10885hcore_i7-3920xmxeon_e-2286mcore_i5-11400txeon_platinum_8358pxeon_w-1250ecore_i5-11300hcore_i5-1145g7core_i3-1125g4pentium_silver_n5000core_i9-11900kfcore_i7-10750hcore_i3-10325xeon_w-2195xeon_w-3375core_i3-7100hxeon_e-2276gcore_i3-8300xeon_w-1390core_i3-1000g4xeon_e-2186gxeon_w-3365core_i5-7400txeon_gold_5317core_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2174gxeon_platinum_8356hcore_i3-7100core_i7-8809gxeon_e-2176gcore_i3-8145uexeon_e-2324gcore_i5-7260ucore_i7-8700bcore_i7-8709gcore_i3-10100core_i5-7267uxeon_w-1250pcore_i3-1115g4core_i7-7800xcore_i9-9920xcore_i3-8100txeon_gold_5320tceleron_n4505core_i5-10210ycore_i5-1140g7core_i7-8557ucore_i5-10500exeon_gold_6312uxeon_w-2123xeon_w-3275mcore_i7-8700tcore_i5-8300hcore_i7-3820core_i5-10600txeon_e-2356gcore_i3-10110ycore_i5-7400core_i5-10600kfcore_i5-11400fcore_i7-8650uxeon_silver_4314core_i7-10700ecore_i5-1145grecore_i3-7320core_i7-1180g7core_i5-11600kfxeon_platinum_8358core_i7-9800xcore_i7-11700kfxeon_gold_5315yxeon_e3-1230_v6core_i7-10870hxeon_w-11865mrecore_i5-1035g1pentium_silver_n5030core_i5-1038ng7core_i7-4960xxeon_platinum_8354hxeon_w-3265xeon_w-3245celeron_n3350xeon_e-2274gcore_i5-8500bcore_i5-11500tcore_i7-10700kcore_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7celeron_n3050core_i5-8269upentium_silver_j5005core_i5-11600kxeon_e-2278gelcore_i7-11390hcore_i5-1030g4core_i7-10700texeon_e3-1280_v6xeon_platinum_8368xeon_e-2288gceleron_n3000xeon_e-2234celeron_n2807core_i7-7740xcore_i7-11700kcore_i5-10500core_i7-5820kxeon_silver_4310txeon_e-2124xeon_platinum_8380core_i5-7287ucore_i7-10710ucore_i7-10700kfcore_i5-7440eqcore_i7-3940xmxeon_platinum_8351nxeon_w-1250texeon_w-1250core_i5-8279ucore_i7-4940mxxeon_platinum_8352vxeon_gold_6336yxeon_w-1290ecore_i3-7100ucore_i7-4930kxeon_e-2276mecore_i7-8565ucore_i3-7101tecore_i3-7350kcore_i5-11400hxeon_w-3275core_i5-7600kcore_i5-8250ucore_i3-10305celeron_n2820xeon_e-2126gcore_i5-7300hqcore_i7-7560uxeon_w-1270ecore_i7-7820eqxeon_platinum_8360hlxeon_e3-1535m_v6core_i9-11900fcore_i5-8259ucore_i7-4820kcore_i5-7360ucore_i7-11600hceleron_n2805celeron_n2806core_i9-11980hkcore_i5-10600kxeon_e3-1220_v6xeon_w-1370pcore_i3-8140uxeon_e-2336xeon_e-2388gcore_i9-10900kfcore_i3-10105xeon_w-11155mrexeon_e-2186mxeon_gold_6354xeon_e-2176mcore_i5-1130g7celeron_n3350exeon_platinum_8352mcore_i3-1120g4core_i5-7600tcore_i9-9820xxeon_w-2155core_i9-9900xcore_i7-7500ucore_i7-8550ucore_i5-10310yxeon_gold_6330hxeon_w-1290pceleron_n3010xeon_e-2224gxeon_w-2135xeon_e-2286gxeon_gold_5318hxeon_w-11155mlecore_i5-10500hxeon_platinum_8376hlceleron_n2808core_i5-8260uxeon_w-2145xeon_e3-1275_v6core_i5-11320hxeon_e-2226gecore_i7-10810uxeon_e-2278gxeon_e3-1245_v6core_i9-9980xecore_i3-1115grexeon_gold_6346xeon_w-2235core_i7-8850hcore_i5-11500hcore_i3-7130ucore_i7-10610uxeon_w-11955mxeon_e-2374gcore_i3-10100fcore_i3-7167ucore_i7-6800kcore_i7-8500ycore_i7-7567uxeon_gold_6338nceleron_n2920core_i9-10900xcore_i5-10600xeon_platinum_8360hcore_i5-11260hxeon_w-1390pcore_i3-1115g4ecore_i9-10980xepentium_silver_n6005core_i7-7820hqxeon_gold_6348core_i5-8210yceleron_n6211xeon_gold_6330nxeon_w-1350core_i3-7300tcore_i7-3970xcore_i5-8365uecore_i7-8665uexeon_w-1290xeon_w-3345xeon_platinum_8368qceleron_n4000celeron_n2830core_i5-1145g7exeon_w-10885mcore_i5-11500hexeon_silver_4310core_i3-10320core_i9-10900tcore_i5-8200ycore_i3-10300tcore_i3-7101ecore_i5-8310yceleron_n3450xeon_gold_6334xeon_w-2275celeron_n5100core_i5-11500core_i5-1135g7core_i9-7900xxeon_w-1290tecore_i5-7640xcore_i5-8500celeron_n4020xeon_w-3223core_i5-7440hqxeon_e-2144gcore_i7-5960xxeon_w-1350pxeon_gold_6342celeron_n2810xeon_w-3323xeon_w-3175xcore_i7-8569ucore_i5-8265ucore_i5-10500txeon_e-2254mecore_i7-4930mxxeon_w-3235core_i7-1185g7ecore_i7-5930kxeon_platinum_8352score_i7-7y75xeon_gold_5318ycore_i3-1005g1xeon_w-2225xeon_gold_6328hcore_i3-8100bxeon_w-2133core_i5-7y57core_i3-10305tcore_i3-8350kcore_i5-11400core_i5-8600tcore_i5-7500tpentium_silver_j5040xeon_e3-1505m_v6core_i5-8305gcore_i7-1065g7core_i7-8559uxeon_gold_6328hlcore_i9-10900texeon_e-2146gcore_i3-8130uxeon_w-2175Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0511
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.30%
||
7 Day CHG~0.00%
Published-21 Jun, 2021 | 16:01
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0156
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.87%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-xeon_e-2286gcore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7core_i9-7900xcore_i5-11400core_i7-10710u_firmwarexeon_e-2174g_firmwarexeon_d-1633ncore_i9-11900_firmwarexeon_w-1270p_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_platinum_8153xeon_e-2246gcore_i9-9960xcore_i5-6350hqcore_i3-6300txeon_w-2123core_i7-9700k_firmwarecore_i5-8500t_firmwarecore_i3-9300t_firmwarecore_i5-11260hxeon_e-2236xeon_platinum_8280_firmwarexeon_e-2374g_firmwarexeon_w-1270exeon_silver_4209t_firmwarecore_i5-6500tcore_i5-7500core_i5-6260uxeon_bronze_3104_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqxeon_gold_6142fatom_c3758core_i7-8709gcore_i9-11900kfxeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_e-2254me_firmwarecore_i5-8200ycore_i5-10500t_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260ucore_i5-11400fxeon_gold_6226r_firmwarexeon_silver_4116_firmwarecore_i5-7287u_firmwarecore_i9-10900xxeon_gold_6256_firmwarecore_m7-6y75xeon_w-3335xeon_w-11555mrecore_i5-10500hcore_i7-6800k_firmwarecore_i5-10600kfcore_i5-1035g1_firmwarexeon_w-2123_firmwarexeon_e-2146gxeon_silver_4112xeon_gold_6140core_i5-11500he_firmwarecore_i5-8210y_firmwarecore_i7-6650u_firmwarecore_i3-10100exeon_w-3365_firmwarexeon_platinum_8168_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwareatom_c3538core_i7-9700txeon_gold_6238core_i5-7600tcore_i7-4820katom_c3508xeon_w-2195_firmwarexeon_platinum_8256xeon_w-2275_firmwarexeon_gold_6130fxeon_e-2276mxeon_d-2163itcore_i3-1120g4core_i7-3930kcore_i5-11400hxeon_w-2235_firmwarexeon_d-1623nxeon_gold_6230n_firmwarecore_i7-10810ucore_i3-10300tcore_i3-8100xeon_gold_6140_firmwarecore_i5-1130g7core_i7-6560u_firmwarexeon_e-2378g_firmwarecore_i9-11900core_i5-6585rxeon_gold_6144xeon_platinum_8160f_firmwarecore_i5-9600kxeon_gold_5218r_firmwarecore_i3-7100core_m5-6y54core_i7-7600u_firmwarexeon_gold_5118core_i7-9700kf_firmwarecore_i5-1145g7core_i5-9300hcore_i5-10500exeon_silver_4214y_firmwarecore_i9-10850kcore_i5-6600t_firmwarecore_i5-8500bcore_i3-7100e_firmwarexeon_d-2143itxeon_silver_4209txeon_e-2226gecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_w-2175_firmwarecore_i5-6600core_i3-8100hcore_i3-7300t_firmwarecore_i9-11900fcore_i7-9700f_firmwarexeon_d-2177nt_firmwarecore_i7-3930k_firmwarecore_i9-10920xcore_i9-11950hxeon_gold_6138pcore_i7-6500u_firmwarecore_i3-8130u_firmwarecore_i5-10310ucore_i7-6950x_firmwarecore_i7-8557ucore_i3-6320core_i3-8350k_firmwarecore_i9-9820x_firmwarecore_i3-1115gre_firmwarecore_i5-6440eqcore_i5-1030g7xeon_d-1602_firmwarecore_i9-10980hkxeon_w-11155mlexeon_d-1559_firmwarecore_i7-10700k_firmwarecore_i3-10305_firmwarexeon_e-2274gcore_i3-7100u_firmwarecore_i3-10325_firmwarexeon_gold_6138t_firmwarecore_i7-10510y_firmwarecore_i7-11800h_firmwarecore_i7-1060g7_firmwarecore_i5-6287uxeon_w-3323core_i7-8500yxeon_platinum_8276_firmwarecore_i7-1068ng7_firmwarecore_i5-7400_firmwarecore_i3-1110g4_firmwarexeon_w-2133_firmwarecore_i7-6700te_firmwareatom_c3808core_i5-9600xeon_gold_6134xeon_w-3375core_i5-8600tcore_i5-7200u_firmwarexeon_gold_6258r_firmwarecore_i3-10320_firmwarexeon_gold_5218bxeon_e-2288gxeon_w-1370pcore_i7-7500uxeon_e-2274g_firmwarexeon_gold_6148f_firmwarexeon_gold_5218rxeon_e-2124g_firmwarexeon_w-2235xeon_w-3175xxeon_w-3225core_i3-7101tecore_i7-7700xeon_d-1540core_i3-11100hexeon_gold_6246r_firmwarecore_i5-6440eq_firmwarexeon_gold_6246rcore_i5-7300hqxeon_d-1513ncore_i5-10505_firmwareatom_c3558_firmwarecore_i9-9900xcore_i9-9900t_firmwarecore_i5-9600_firmwarecore_i7-9700ecore_i9-11900kf_firmwarexeon_e-2254mexeon_platinum_8260l_firmwarecore_i7-8500y_firmwarecore_i7-6700t_firmwarecore_i7-6700tcore_i5-6442eq_firmwarexeon_w-3235_firmwarexeon_platinum_9222atom_c3336_firmwarecore_i3-10105tcore_i3-8100h_firmwarecore_i7-10510u_firmwarecore_i7-6820hk_firmwarecore_i7-7700_firmwarecore_i3-1000g4core_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i7-11390h_firmwarecore_i9-9980hk_firmwareatom_c3858xeon_e-2144gxeon_gold_5119t_firmwarecore_i5-8300h_firmwarexeon_w-11555mlecore_i5-8279u_firmwarecore_i5-8500b_firmwarecore_i3-6102exeon_w-1390txeon_silver_4216core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqxeon_platinum_8276lxeon_gold_6138tcore_i7-7740xcore_i7-7y75xeon_e-2124gatom_c3850core_i5-11500txeon_platinum_9221_firmwarecore_i7-4930kcore_i7-11600h_firmwarecore_i5-9400core_i5-11400h_firmwarecore_i7-6600uatom_c3508_firmwarexeon_gold_6138core_i7-1185grexeon_gold_6146_firmwarecore_i5-8500_firmwarexeon_d-1557core_i5-1145gre_firmwareatom_c3436lcore_i3-10105f_firmwarexeon_w-3245mxeon_d-1637_firmwarexeon_w-11555mle_firmwarecore_i5-7300hq_firmwarexeon_w-1350atom_c3708core_i7-6500ucore_i5-1035g1xeon_w-3345_firmwarecore_i7-11850hxeon_w-1290xeon_e-2314_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i7-8086k_firmwarexeon_w-2223_firmwarexeon_gold_6234atom_c3336xeon_gold_6142f_firmwarecore_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarexeon_gold_6130_firmwarecore_i5-7442eq_firmwarexeon_gold_6136_firmwarexeon_gold_6252n_firmwarecore_i7-4930mxxeon_w-1250core_i9-10900core_i7-1065g7_firmwarexeon_silver_4116t_firmwarecore_i5-7360ucore_i5-1145g7_firmwarecore_i5-7300ucore_i7-11375h_firmwarexeon_silver_4109t_firmwarecore_i5-6600tcore_i5-6500t_firmwarecore_i3-7100h_firmwarecore_i7-8565ucore_i9-10940x_firmwarecore_i7-6600u_firmwarexeon_silver_4110xeon_bronze_3206r_firmwarexeon_w-3323_firmwarecore_i7-7700kxeon_platinum_8176core_i5-11500h_firmwarecore_i3-10100fcore_i9-9900_firmwarexeon_gold_5217core_i7-6850kcore_i7-9750hf_firmwarexeon_gold_5120tcore_i7-6870hq_firmwarexeon_gold_6210ucore_i5-7200uxeon_gold_5115xeon_d-1548_firmwarecore_i7-9700fcore_i5-8265u_firmwarecore_i7-6820hqcore_i5-10210ucore_i3-7300_firmwarexeon_w-11155mre_firmwarecore_i7-7740x_firmwarecore_i5-8400bcore_i3-7100hxeon_gold_5215core_i3-6100uxeon_bronze_3106_firmwarecore_i5-10400t_firmwarecore_i9-9900kscore_i5-6350hq_firmwarexeon_d-1531_firmwarexeon_d-1527_firmwarecore_i9-7920xxeon_d-1633n_firmwarecore_i9-7960x_firmwarecore_i5-11600kxeon_d-1513n_firmwarecore_i9-8950hkcore_i5-6360uxeon_gold_6126_firmwarecore_i5-10600tcore_i5-10600kf_firmwarexeon_w-1290_firmwarecore_i5-7640xxeon_w-3275mcore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_e-2386g_firmwarexeon_e-2176m_firmwarexeon_gold_6250lxeon_gold_6209ucore_i9-10900e_firmwarexeon_e-2278g_firmwarecore_i9-9920xxeon_d-2146nt_firmwarecore_i7-7660uxeon_e-2278gel_firmwarexeon_platinum_8158xeon_d-1518_firmwarecore_i7-7700hqcore_i7-6820hq_firmwarexeon_e-2244g_firmwarecore_i3-1120g4_firmwarecore_i7-6900k_firmwarexeon_e-2236_firmwarexeon_gold_6238l_firmwarecore_i5-6402pcore_m3-7y30core_i5-8269u_firmwarexeon_w-11155mrecore_i3-6100t_firmwarexeon_w-2135xeon_gold_6252core_i5-1140g7_firmwarecore_i7-11700kxeon_e-2276mlxeon_silver_4214rcore_i9-10920x_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarecore_i7-6700hqcore_i7-5820k_firmwarecore_i3-8300core_i5-6500_firmwarecore_i3-7102e_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_e-2276me_firmwarecore_i5-8400txeon_gold_6132_firmwarexeon_silver_4116txeon_w-1370p_firmwarecore_i5-11600kf_firmwarecore_i7-1065g7core_i7-9800xxeon_silver_4208xeon_e-2136_firmwarexeon_w-1270_firmwarexeon_gold_6210u_firmwarecore_i5-1130g7_firmwarecore_i7-6660u_firmwarexeon_gold_6126txeon_silver_4116fas\/aff_biosxeon_w-1250ecore_i5-8257u_firmwarecore_i5-1038ng7_firmwarexeon_platinum_8160fcore_i3-6100te_firmwarecore_i9-11900h_firmwarecore_i7-6567ucore_i5-9400f_firmwarecore_i7-8706g_firmwarexeon_gold_5215lcore_i5-7287uxeon_gold_6154_firmwarexeon_e-2146g_firmwarecore_i7-3970xxeon_gold_6126f_firmwarecore_i7-3960xxeon_platinum_8253_firmwarecore_i5-6600_firmwarexeon_e-2126g_firmwarecore_i5-1135g7_firmwarecore_i5-9600t_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarecore_i5-1145grexeon_w-3265mxeon_gold_6240lxeon_d-1529_firmwarexeon_gold_6248core_i5-11600k_firmwarexeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_platinum_8176f_firmwarecore_i3-8145ucore_i3-9300xeon_d-2173itcore_i7-7567ucore_i7-10870h_firmwarecore_i3-6098p_firmwarecore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_platinum_8160tcore_i7-6920hq_firmwarexeon_gold_6252_firmwarecore_i7-3820xeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700ecore_i3-7320core_i7-3940xmxeon_gold_6126fcore_i5-6200u_firmwarecore_m5-6y57xeon_e-2388gcore_i7-9700te_firmwarexeon_platinum_8268xeon_e-2226gcore_i7-6700texeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_gold_6152_firmwarexeon_silver_4215rxeon_e-2278gcore_i9-10900ecore_i3-9100core_i5-8600core_i5-8250ucore_i9-11980hkxeon_w-3265core_m3-8100y_firmwarecore_i7-3940xm_firmwarecore_i5-10500tecore_i7-6700_firmwarecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i3-6100texeon_gold_5119tcore_i7-8700bcore_i5-10500txeon_w-1250texeon_gold_6208ucore_i3-9100texeon_gold_6130f_firmwarecore_i5-9300hf_firmwarecore_m5-6y57_firmwareatom_c3338core_i5-11500t_firmwarecore_i3-6006u_firmwarexeon_gold_6242core_i7-10700kxeon_d-1627xeon_e-2186mcore_i3-8109u_firmwareatom_c3708_firmwarexeon_gold_6250_firmwarexeon_d-1623n_firmwarecore_i3-9350k_firmwarecore_i7-11370hcore_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300txeon_d-1528_firmwarecore_i5-11500hcore_i5-11600tatom_c3308_firmwarecore_i9-9900kxeon_gold_6240_firmwarecore_i7-5930kcore_i5-10400fcore_i7-1160g7core_i3-6157u_firmwarexeon_w-2265_firmwarexeon_e-2278ge_firmwarecore_i5-9400_firmwarexeon_gold_6226rxeon_bronze_3204xeon_w-1270e_firmwarexeon_e-2276m_firmwarecore_i3-7350k_firmwarexeon_d-1567core_i5-8400t_firmwarexeon_w-3365xeon_w-2135_firmwarexeon_gold_6142_firmwarecore_i7-9850hlatom_c3538_firmwarexeon_e-2286m_firmwarecore_i5-6300ucore_i5-8400hcore_m3-6y30core_i7-11850he_firmwarexeon_w-2175xeon_d-2141i_firmwarexeon_silver_4214r_firmwarexeon_silver_4108xeon_w-3335_firmwarecore_i3-10110ycore_i7-7820hkcore_i5-9300h_firmwarexeon_w-11855mxeon_gold_6240ycore_i3-6100xeon_gold_6238lxeon_w-1390xeon_gold_5218n_firmwarecore_i7-11700t_firmwarecloud_backupcore_i7-11700fcore_i7-8665ucore_m7-6y75_firmwarecore_i3-10305tcore_i3-9350kf_firmwarexeon_gold_6130t_firmwarecore_i7-5960x_firmwarexeon_w-1370_firmwarecore_i5-7440eq_firmwarexeon_d-1649n_firmwarecore_i3-8140ucore_i7-8086kcore_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kxeon_gold_5222core_i7-10850hxeon_gold_6256core_i5-6360u_firmwarexeon_d-1523ncore_i3-1005g1_firmwarecore_i9-9900x_firmwarecore_i3-9100hl_firmwarecore_i5-10500te_firmwareatom_c3338rcore_i3-10300t_firmwarecore_i3-8100bcore_i3-6167ucore_i5-8279ucore_i3-10100f_firmwarexeon_gold_5118_firmwarecore_i5-8600kcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarexeon_d-1541xeon_d-1543n_firmwarexeon_d-1622xeon_gold_5222_firmwarecore_i5-6685r_firmwarecore_i7-8700t_firmwarecore_i5-6500te_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_w-2223core_i7-6970hqcore_i7-1185g7e_firmwarexeon_gold_6238tatom_c3955core_i5-8500core_i5-11260h_firmwarecore_i5-9400h_firmwareatom_c3758r_firmwarecore_i5-10400f_firmwarecore_i7-6560ucore_i9-10980xe_firmwarexeon_gold_6240r_firmwarecore_i5-8257uxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarecore_i7-8569ucore_i9-9900tcore_i7-10700t_firmwarecore_i5-6685ratom_c3558xeon_w-2133xeon_platinum_8260lxeon_e-2336_firmwarecore_i5-6287u_firmwarexeon_platinum_8270xeon_gold_6248r_firmwarecore_i5-8500txeon_gold_6132core_i7-4930k_firmwarexeon_w-11555mre_firmwarecore_i5-6400txeon_d-2166ntcore_i3-10305core_i7-9850he_firmwarecore_i3-6100h_firmwarexeon_w-1390pcore_i3-9100_firmwarecore_i7-6700core_i7-6820hkcore_i7-7560u_firmwarexeon_gold_6262vcore_i7-10710ucore_i5-10300hcore_i5-10210ycore_i7-1165g7_firmwarexeon_silver_4210_firmwarexeon_w-1270texeon_e-2224core_i9-9900ks_firmwarexeon_e-2124_firmwarexeon_gold_6238rxeon_silver_4110_firmwarexeon_platinum_8170core_i3-1125g4_firmwarexeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarecore_i9-10980hk_firmwarexeon_d-2166nt_firmwarecore_i5-10400_firmwarexeon_gold_6242r_firmwarexeon_w-2155core_i5-6600k_firmwarecore_i7-6700hq_firmwarexeon_platinum_8153_firmwarecore_i3-7102exeon_w-11155mle_firmwarexeon_silver_4216_firmwarecore_i3-1115g4e_firmwarexeon_gold_5122core_i9-10900k_firmwarexeon_gold_5215l_firmwareatom_c3758rxeon_w-2225_firmwarexeon_gold_6230core_i7-6870hqatom_c3950core_i3-9100exeon_silver_4109tcore_i3-7300xeon_d-1548core_i7-10510yxeon_bronze_3106core_i5-7y57_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_e-2276ml_firmwarexeon_d-1653natom_c3338_firmwarecore_i9-10900_firmwarecore_i5-6300u_firmwarecore_i5-1155g7_firmwarexeon_gold_5218txeon_e-2374gxeon_e-2254ml_firmwarexeon_d-1557_firmwarecore_i5-9500t_firmwarexeon_gold_5218ncore_i7-8709g_firmwarexeon_d-2163it_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarexeon_e-2278gexeon_d-1533n_firmwarexeon_silver_4214yxeon_platinum_8156xeon_w-10855mxeon_d-2177ntcore_i7-6785r_firmwarexeon_w-3275_firmwarecore_i5-10600t_firmwarexeon_platinum_8270_firmwarecore_i7-11700k_firmwarecore_i5-10300h_firmwarexeon_w-3235core_i9-10900txeon_d-1571_firmwarexeon_e-2126gcore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarexeon_gold_5220rxeon_w-11955mxeon_w-1290ecore_i5-10400tcore_i7-6820eq_firmwarecore_i7-1185g7core_i7-9700kfxeon_d-1541_firmwarexeon_w-1290te_firmwarexeon_platinum_9221xeon_d-2142itcore_i5-7600k_firmwarecore_i9-11980hk_firmwarexeon_platinum_9222_firmwarecore_i5-8305g_firmwarecore_i3-8100b_firmwarecore_i9-10900te_firmwarecore_i9-11900kcore_i3-8300t_firmwarexeon_gold_6150_firmwarecore_i3-7167u_firmwarecore_i7-10700_firmwarecore_i3-1005g1core_i7-1068ng7core_m3-6y30_firmwarecore_i7-1185gre_firmwarecore_i7-7820eq_firmwarexeon_d-1637core_i5-9400fcore_i5-11320h_firmwarexeon_d-1539_firmwarecore_i5-9500f_firmwarecore_i7-6800kcore_i7-7560uxeon_gold_5120core_i7-8550u_firmwarecore_i5-11600kfxeon_d-1602core_i5-8365uxeon_w-2245xeon_d-2145ntcore_i5-9600kfxeon_e-2288g_firmwarecore_i5-6267u_firmwarexeon_w-1250te_firmwarexeon_e-2224gcore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269ucore_i3-11100he_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarecore_i5-7600t_firmwarecore_i9-11900hcore_i7-9700t_firmwarecore_i7-1185g7ecore_i7-8665ue_firmwarecore_i7-4820k_firmwarecore_i7-7820hq_firmwarexeon_silver_4208_firmwarexeon_d-1521core_i3-8145uexeon_w-2155_firmwarecore_i5-8265ucore_i7-10700txeon_e-2246g_firmwarexeon_platinum_8170_firmwarecore_i9-9900kfcore_i5-6300hqcore_i5-6402p_firmwarexeon_silver_4114tcore_i7-10750hxeon_e-2226ge_firmwarexeon_gold_6134_firmwarecore_i7-1160g7_firmwarecore_i5-8400b_firmwarecore_i7-8706gcore_i7-5930k_firmwarecore_i7-11850h_firmwarecore_i3-6300core_i5-7400t_firmwarexeon_silver_4215xeon_gold_6230ncore_i5-8365u_firmwareatom_c3750xeon_platinum_8280l_firmwarecore_i7-1195g7core_i9-10885hcore_i5-7440eqcore_i5-9500_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_i7-1165g7core_i5-11400_firmwarexeon_gold_6242_firmwarecore_m3-7y32core_i7-11850hexeon_e-2134core_i7-10750h_firmwarexeon_w-1290tecore_i5-1145g7exeon_w-3265_firmwarexeon_d-2142it_firmwarecore_i7-8557u_firmwarecore_m3-7y32_firmwarexeon_w-11865mre_firmwarexeon_e-2176mxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_6130xeon_gold_5218_firmwarecore_i9-10900t_firmwarexeon_silver_4210txeon_w-3275m_firmwarecore_i5-11400f_firmwarexeon_gold_6138_firmwarecore_i9-11900k_firmwarexeon_e-2134_firmwarecore_i7-1185g7_firmwarexeon_gold_6136core_i7-1180g7_firmwarecore_i5-7267u_firmwarecore_i5-7640x_firmwarexeon_w-3245m_firmwarecore_i5-9600tcore_i9-11900t_firmwarexeon_e-2226g_firmwareatom_c3558rcore_i9-7960xxeon_w-1370xeon_d-1559xeon_platinum_9242_firmwarexeon_e-2174gatom_c3436l_firmwarecore_i7-7y75_firmwarexeon_d-1537xeon_gold_6230_firmwarexeon_gold_6128core_i7-1180g7xeon_e-2176gxeon_gold_6146core_i3-6100hxeon_gold_6254core_i3-10320core_i3-10105fxeon_w-1390t_firmwarexeon_e-2224_firmwarexeon_platinum_8160t_firmwarecore_i3-6098pcore_i5-6400xeon_d-1649nxeon_gold_6148_firmwarecore_i7-10875hcore_i5-6300hq_firmwarexeon_platinum_8156_firmwarecore_i7-1195g7_firmwarecore_i5-10400hcore_i5-9600kf_firmwarecore_i7-9800x_firmwarexeon_w-10885mxeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_silver_4114_firmwarexeon_gold_6126xeon_d-1527core_i9-9940xcore_i9-9980xe_firmwarecore_i5-6600kcore_i9-7940xxeon_gold_5220r_firmwarecore_i7-9700tecore_i7-6822eq_firmwarexeon_gold_6248rxeon_silver_4214core_i3-6102e_firmwarexeon_w-2125core_i5-6260u_firmwarecore_i9-9900k_firmwarecore_i5-6500tecore_i5-11300hxeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-6500core_i5-10400h_firmwarexeon_gold_6138f_firmwarexeon_d-2146ntcore_i3-10100txeon_gold_6128_firmwarecore_i3-9100f_firmwarecore_i7-7700hq_firmwarecore_i9-9980hkxeon_e-2244gcore_i5-11500hecore_i3-7100txeon_w-2125_firmwarecore_i5-1035g4_firmwarexeon_platinum_8180core_i7-9850h_firmwarecore_i7-11700_firmwarecore_m5-6y54_firmwarecore_i7-11375hcore_i7-8559ucore_i5-9500ecore_i9-9920x_firmwarexeon_w-1250e_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarecore_i3-6320_firmwarecore_i3-6100e_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarexeon_gold_6209u_firmwarexeon_gold_6138fcore_i3-10325xeon_e-2356gcore_i9-7920x_firmwarecore_i7-8700core_i3-7130ucore_i5-8400xeon_platinum_8276l_firmwarexeon_gold_6262v_firmwarexeon_e-2334core_i5-7440hq_firmwarecore_i7-9850hcore_i3-10110u_firmwarecore_i5-7600core_i9-10980xexeon_w-11865mlecore_i9-11900f_firmwarexeon_e-2186gxeon_gold_6226_firmwarecore_i5-8310y_firmwarexeon_silver_4210core_i9-10885h_firmwarexeon_gold_6250l_firmwarexeon_silver_4114t_firmwarecore_i5-11500_firmwarecore_i3-7320_firmwarecore_i7-6770hq_firmwarecore_i7-8569u_firmwarexeon_gold_6240y_firmwareatom_c3955_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i5-9400txeon_w-3245_firmwarecore_i7-11800hcore_i7-11370h_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i3-8100t_firmwarecore_i5-7600_firmwarecore_i9-9960x_firmwarecore_i5-10310u_firmwarexeon_gold_6154core_i5-8400_firmwarecore_i7-6567u_firmwarexeon_e-2234_firmwareatom_c3830core_i7-10870hxeon_silver_4215r_firmwarecore_i7-10510ucore_i3-6300t_firmwarexeon_bronze_3104xeon_w-1290pcore_i7-7920hq_firmwarecore_i5-8310ycore_i5-10500h_firmwarexeon_d-1523n_firmwarecore_i3-10300_firmwarexeon_d-2183it_firmwarecore_i5-6440hqxeon_w-3245xeon_e-2324gcore_i7-6660ucore_i9-7980xecore_i3-6100ecore_i7-6970hq_firmwarexeon_w-3345xeon_e-2186m_firmwarexeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-11300h_firmwarecore_i5-10500core_i7-8850hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarecore_i5-11600_firmwarexeon_d-1622_firmwarexeon_w-11865mrecore_i3-10100_firmwarexeon_silver_4108_firmwarecore_i9-10900texeon_platinum_8260y_firmwarecore_i5-1030g4_firmwarecore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_e-2378core_i7-7820xcore_i7-3970x_firmwarecore_i3-1115g4ecore_i7-7800xcore_i5-9400hxeon_platinum_8253xeon_gold_6252ncore_i3-9320atom_c3308xeon_platinum_8280xeon_platinum_8180_firmwarecore_i7-10700f_firmwarecore_i3-10100t_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarecore_i3-10105core_i5-11400tcore_i7-4940mxxeon_gold_6246core_i9-10900kf_firmwarecore_i7-8550uxeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i9-10940xcore_i7-9700xeon_w-3265m_firmwarexeon_d-1577_firmwarexeon_gold_5122_firmwarecore_i7-9850hecore_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwareatom_c3830_firmwarecore_i5-7500tcore_i5-6440hq_firmwarexeon_d-2187ntxeon_d-1518core_i5-6267ucore_i3-1000g1xeon_w-2225xeon_e-2276mecore_i7-3820_firmwarexeon_silver_4210t_firmwarecore_i5-7y54xeon_gold_5218t_firmwarecore_i7-6950xcore_i5-7400xeon_platinum_8164core_i7-8700b_firmwarexeon_e-2356g_firmwarexeon_platinum_8176fcore_i3-10305t_firmwarexeon_w-10855m_firmwarexeon_gold_5115_firmwarexeon_platinum_8168core_i9-10850k_firmwarecore_i7-7660u_firmwarecore_i5-8365ue_firmwarecore_i3-6167u_firmwarexeon_gold_5217_firmwarecore_i7-11600hcore_i7-7920hqcore_i7-10700core_i9-11950h_firmwarecore_i3-1115g4_firmwarexeon_d-1533ncore_i3-7020ucore_i5-1135g7xeon_w-2195core_i3-8145u_firmwarexeon_e-2136xeon_w-1270pcore_i5-9300hfcore_i5-8600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rcore_i3-1115g4xeon_platinum_9282core_i5-10400core_i3-7020u_firmwarexeon_d-2161ixeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarexeon_silver_4215_firmwarexeon_platinum_8160_firmwarexeon_d-2123itcore_i7-11700kf_firmwarecore_i5-8365uecore_i3-8109uxeon_gold_6142core_i3-1110g4atom_c3558r_firmwarecore_i7-4960x_firmwarexeon_bronze_3206rxeon_gold_6148xeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarexeon_gold_5220core_i5-8350uxeon_platinum_8256_firmwarecore_i7-8750h_firmwarecore_i3-10100texeon_platinum_8176_firmwareatom_c3758_firmwarecore_i5-10210u_firmwarecore_i7-11390hcore_i3-8140u_firmwarexeon_d-1537_firmwarecore_i5-7y57xeon_w-3375_firmwarecore_i3-9300_firmwarecore_i7-3920xmcore_i5-7260uxeon_d-1540_firmwarecore_i5-10600k_firmwarecore_i5-8259u_firmwarexeon_e-2124core_i7-9750hcore_i3-6100u_firmwareatom_c3808_firmwarecore_i3-10110y_firmwarexeon_e-2186g_firmwarexeon_d-1553n_firmwarecore_i9-7980xe_firmwarexeon_w-1270te_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarexeon_gold_6126t_firmwarecore_i5-11500core_i7-11700xeon_platinum_8160xeon_gold_6148fcore_i5-10600xeon_w-2245_firmwarecore_i5-10500_firmwarecore_i5-10310ycore_i5-10310y_firmwareatom_c3858_firmwarexeon_d-1567_firmwarecore_i5-8259uxeon_e-2388g_firmwarexeon_gold_6230r_firmwarexeon_e-2336xeon_gold_6246_firmwarexeon_platinum_8260_firmwarexeon_e-2286mcore_i5-11600t_firmwarecore_i7-6650ucore_i9-9880hcore_i7-4930mx_firmwarecore_i7-8705g_firmwarexeon_platinum_8158_firmwarexeon_gold_6244_firmwarecore_i5-6400_firmwarecore_i5-1035g4core_i7-8650ucore_i5-10200hcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220txeon_e-2324g_firmwarecore_i7-7600uxeon_gold_6244xeon_w-3223_firmwarexeon_gold_6242rcore_i5-1035g7_firmwarecore_i3-7100exeon_w-2275xeon_w-3175x_firmwarexeon_w-2265core_i5-9500core_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_gold_5218b_firmwarexeon_gold_6248_firmwarecore_i7-9750hfxeon_d-2141icore_i7-3920xm_firmwarecore_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e-2176g_firmwarecore_i5-1035g7xeon_gold_6138p_firmwarexeon_e-2254mlcore_i5-8305gcore_i3-9350kcore_i3-1115grecore_i5-11600core_i5-7400tcore_i7-8750hcore_i3-6100txeon_w-2145_firmwarecore_i3-10100e_firmwarexeon_d-2183itxeon_d-2123it_firmwarecore_i5-8300hcore_i9-7940x_firmwarecore_i3-7101te_firmwarecore_i5-9500e_firmwarecore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i5-9500teatom_c3958xeon_gold_6130txeon_w-1290e_firmwarexeon_d-1520core_i5-1145g7e_firmwarecore_i5-7y54_firmwarexeon_d-2187nt_firmwarexeon_w-1390p_firmwarexeon_w-11955m_firmwarecore_i9-10900f_firmwarexeon_platinum_8280lcore_m3-8100yxeon_gold_5120t_firmwarexeon_silver_4114core_i5-7267ucore_i3-7100uxeon_d-1543ncore_i5-6442eqcore_i7-6700k_firmwarecore_i5-7260u_firmwareatom_c3750_firmwarecore_i7-11700tcore_i5-7300u_firmwarexeon_d-1520_firmwarexeon_platinum_9242core_i7-10700e_firmwarecore_i3-9100te_firmwarecore_i7-6700kcore_i7-6822eqcore_i3-7300tcore_i9-11900tcore_i5-8210ycore_i7-6785rcore_i7-1060g7core_i7-8565u_firmwarexeon_w-11855m_firmwarecore_i5-11400t_firmwarecore_i7-5820kcore_i7-9700_firmwarecore_i7-7700tcore_i7-6900kcore_i9-9980xexeon_platinum_9282_firmwarexeon_gold_5120_firmwarexeon_gold_6250core_i3-9350kfxeon_w-1290tcore_i7-8809gxeon_gold_6226core_i3-10105_firmwarecore_i5-11320hcore_i7-8650u_firmwarexeon_d-1577atom_c3958_firmwarecore_i5-6400t_firmwarecore_i3-6300_firmwarexeon_silver_4214_firmwarecore_i7-10850h_firmwarexeon_platinum_8268_firmwarexeon_e-2314core_i7-8700_firmwarecore_i3-7350kcore_i3-8300_firmwarecore_i5-10505xeon_d-1539core_i7-6820eqcore_i7-6920hqcore_i5-6585r_firmwarexeon_w-2255core_i9-10900x_firmwarecore_i5-7600kcore_m3-7y30_firmwarecore_i3-6006uxeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_w-11865mle_firmwarecore_i3-1000g4_firmwarexeon_gold_6144_firmwarecore_i5-8350u_firmwarexeon_e-2276g_firmwarexeon_d-1627_firmwarexeon_gold_5218xeon_w-2145core_i7-4940mx_firmwarecore_i7-11700f_firmwarecore_i3-9100fatom_c3850_firmwarexeon_w-1250_firmwarecore_i5-7500t_firmwarexeon_d-1653n_firmwarecore_i9-10900fcore_i3-1125g4atom_c3950_firmwarexeon_w-3225_firmwarexeon_e-2378gcore_i5-10200h_firmwarecore_i3-8100tcore_i3-6100_firmwarexeon_gold_6238r_firmwarecore_i5-9500txeon_platinum_8164_firmwarexeon_w-3223xeon_gold_6152xeon_gold_6150xeon_e-2276gcore_i5-6200uxeon_gold_6222vcore_i7-10700fxeon_d-1571core_i5-9600k_firmwarexeon_gold_6238t_firmwareatom_c3338r_firmwarexeon_silver_4112_firmwareIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0062
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.90%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 12:47
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Graphics Drivers before version 27.20.100.8935 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsgraphics_driversIntel(R) Graphics Drivers
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0159
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.78%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_5215xeon_platinum_8260yxeon_platinum_8352vxeon_platinum_8352y_firmwarexeon_platinum_8260y_firmwarexeon_gold_5218txeon_platinum_8358xeon_platinum_8353hxeon_platinum_8360yxeon_platinum_8280_firmwarexeon_gold_5218nxeon_gold_5317_firmwarexeon_silver_4209t_firmwarexeon_gold_6336yxeon_gold_6250lxeon_gold_6209uxeon_silver_4314_firmwarexeon_platinum_8253xeon_gold_6252nxeon_silver_4214yxeon_platinum_8270_firmwarexeon_gold_6230txeon_platinum_8376h_firmwarexeon_silver_4210rxeon_platinum_8280xeon_gold_6238l_firmwarexeon_gold_5220t_firmwarexeon_gold_6252xeon_gold_5220rxeon_silver_4309y_firmwarexeon_gold_6246xeon_gold_6226r_firmwarexeon_silver_4214rxeon_silver_4210r_firmwarexeon_gold_6328hl_firmwarexeon_gold_6256_firmwarexeon_platinum_9221xeon_gold_6230rxeon_gold_6346_firmwarexeon_platinum_8360hlxeon_platinum_9222_firmwarexeon_gold_5315y_firmwarexeon_silver_4310txeon_silver_4208xeon_gold_5318hxeon_gold_6210u_firmwarexeon_platinum_8380_firmwarexeon_gold_5320_firmwarexeon_silver_4314xeon_silver_4210t_firmwarexeon_gold_5218t_firmwarexeon_gold_5215lxeon_silver_4316_firmwarexeon_platinum_8352sxeon_gold_5217_firmwarexeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_gold_6238xeon_platinum_8368_firmwarexeon_platinum_8376hxeon_gold_6240lxeon_gold_6248xeon_gold_6258rxeon_gold_6312u_firmwarexeon_gold_6240l_firmwarexeon_platinum_8256xeon_platinum_9282xeon_silver_4215_firmwarexeon_gold_6254_firmwarexeon_gold_5220_firmwarexeon_gold_6334_firmwarexeon_gold_6338nxeon_gold_6328hlxeon_gold_6252_firmwarexeon_gold_6230n_firmwarexeon_gold_6330xeon_bronze_3206rxeon_gold_6346xeon_silver_4208_firmwarexeon_gold_6240xeon_gold_5220xeon_platinum_8256_firmwarexeon_gold_5218r_firmwarexeon_gold_6348h_firmwarexeon_platinum_8268xeon_silver_4214y_firmwarexeon_gold_6240rxeon_gold_6238_firmwarexeon_gold_6330hxeon_silver_4209txeon_gold_6338xeon_gold_5315yxeon_platinum_8368q_firmwarexeon_silver_4215rxeon_gold_6212uxeon_platinum_8380xeon_silver_4215xeon_platinum_8368xeon_gold_6230nxeon_platinum_8280l_firmwarexeon_gold_6338txeon_platinum_8352mxeon_gold_6208uxeon_gold_6242_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_gold_6242xeon_platinum_8360y_firmwarexeon_gold_6246_firmwarexeon_platinum_8260_firmwarexeon_platinum_8376hl_firmwarexeon_platinum_8360hxeon_gold_6230t_firmwarexeon_gold_6250_firmwarexeon_gold_5218_firmwarexeon_silver_4210txeon_gold_5320txeon_gold_6244_firmwarexeon_gold_6342xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarexeon_platinum_8276xeon_silver_4316xeon_gold_6240_firmwarexeon_gold_5220txeon_gold_6336y_firmwarexeon_gold_6244xeon_gold_6242rxeon_gold_6330nxeon_platinum_9242_firmwarexeon_gold_6226rxeon_gold_6258r_firmwarexeon_bronze_3204xeon_gold_6230_firmwarexeon_gold_5218b_firmwarexeon_gold_5218bxeon_gold_6348hxeon_platinum_8354hxeon_gold_6248_firmwarexeon_gold_6328hxeon_platinum_8360hl_firmwarexeon_silver_4214r_firmwarexeon_gold_5318s_firmwarexeon_gold_6254xeon_gold_5218rxeon_gold_6334xeon_gold_6342_firmwarexeon_gold_6326xeon_gold_5320xeon_gold_6240yxeon_gold_6238lxeon_gold_5320h_firmwarexeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_platinum_8362_firmwarexeon_gold_5318h_firmwarexeon_gold_6348xeon_gold_6246r_firmwarexeon_gold_6354xeon_gold_6246rxeon_gold_6234_firmwarexeon_gold_5320hxeon_gold_6312uxeon_gold_5220r_firmwarexeon_gold_5222xeon_platinum_8380hlxeon_gold_6256xeon_platinum_8260l_firmwarexeon_gold_6338n_firmwarexeon_gold_6248rxeon_silver_4214xeon_gold_5318nxeon_platinum_9222xeon_platinum_8358_firmwarexeon_gold_5220sxeon_platinum_8260xeon_platinum_8280lxeon_silver_4309yxeon_platinum_8356hxeon_gold_6338t_firmwarexeon_gold_6314uxeon_gold_5320t_firmwarexeon_gold_5318y_firmwarexeon_gold_5222_firmwarexeon_platinum_9242xeon_silver_4216xeon_platinum_8358p_firmwarexeon_platinum_8362xeon_platinum_8276lxeon_platinum_8352v_firmwarexeon_platinum_8351n_firmwarexeon_gold_5318n_firmwarexeon_gold_6238txeon_gold_6314u_firmwarexeon_platinum_9221_firmwarexeon_silver_4310t_firmwarexeon_platinum_8368qxeon_gold_6240r_firmwarexeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarexeon_silver_4310xeon_gold_6209u_firmwarexeon_platinum_8352m_firmwarexeon_platinum_8356h_firmwarexeon_platinum_9282_firmwarexeon_platinum_8276l_firmwarexeon_gold_6250xeon_platinum_8260lxeon_platinum_8270xeon_gold_6248r_firmwarexeon_platinum_8380hxeon_gold_6262v_firmwarexeon_gold_6226xeon_gold_5318sxeon_silver_4214_firmwarexeon_platinum_8268_firmwarexeon_gold_6348_firmwarexeon_gold_6226_firmwarexeon_silver_4210xeon_gold_6250l_firmwarexeon_gold_6234xeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_gold_6252n_firmwarexeon_gold_6262vxeon_gold_6240y_firmwarexeon_platinum_8354h_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_platinum_8358pxeon_gold_6330_firmwarexeon_silver_4210_firmwarexeon_platinum_8380hl_firmwarexeon_gold_5218xeon_gold_6338_firmwarexeon_gold_6238rxeon_bronze_3204_firmwarexeon_gold_6222v_firmwarexeon_gold_6238r_firmwarexeon_bronze_3206r_firmwarexeon_platinum_8352yxeon_silver_4215r_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_gold_5217xeon_platinum_8376hlxeon_gold_6210uxeon_gold_6222vxeon_silver_4216_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarexeon_gold_5215l_firmwarexeon_gold_6238t_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8351nxeon_gold_6354_firmwarexeon_gold_6230Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0161
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.77%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwareamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2018-11266
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.59%
||
7 Day CHG~0.00%
Published-27 Nov, 2018 | 18:00
Updated-05 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper input validation can lead to an improper access to already freed up dci client entries while closing dci client.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0066
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-8.4||HIGH
EPSS-0.11% / 30.78%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwarewindowsamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2018-11302
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.04%
||
7 Day CHG~0.00%
Published-18 Sep, 2018 | 18:00
Updated-05 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check of input received from userspace before copying into buffer can lead to potential array overflow in WLAN.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0135
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 33.65%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:26
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_diagnostic_driverIntel(R) Ethernet Diagnostic Driver for Windows
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0186
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.77%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:45
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged user to potentially escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_j1750pentium_silver_n5000_firmwareceleron_n2940_firmwarecore_i7-1068ng7xeon_platinum_8362celeron_j1900_firmwarecore_i5-1035g7core_i3-10105f_firmwarexeon_gold_6338core_i7-10850hxeon_gold_6338t_firmwarecore_i7-10870h_firmwareceleron_j1850celeron_n6210core_i5-10400fxeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_platinum_8360hl_firmwarecore_i3-10300core_i9-10900te_firmwarexeon_gold_6354_firmwarecore_i7-10700tceleron_n2930_firmwarecore_i5-10210uxeon_gold_6326core_i7-1060g7_firmwareceleron_n2815xeon_gold_5317_firmwarecore_i5-10200hcore_i3-10100f_firmwareceleron_n2940xeon_silver_4316celeron_n2830_firmwarecore_i5-1035g4core_i5-10400hcore_i7-10700k_firmwareceleron_n5105xeon_gold_5318y_firmwarecore_i7-10510u_firmwareceleron_n3000_firmwarecore_i3-10100yceleron_j3455core_i5-10400txeon_gold_6348_firmwarepentium_silver_n6000core_i3-10100_firmwarecore_i5-10310uxeon_gold_5318s_firmwarecore_i5-10505core_i7-10700t_firmwarecore_i5-1030g7celeron_n2807_firmwareceleron_n4500core_i5-10310y_firmwarecore_i3-1000g1core_i7-10510yxeon_platinum_8380hceleron_j3160core_i5-10600kf_firmwarecore_i3-10110uxeon_platinum_8368q_firmwarecore_i5-10600_firmwareceleron_n3150_firmwarexeon_platinum_8376hceleron_n3150celeron_n4100celeron_n5100_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8362_firmwarecore_i3-10305t_firmwareceleron_n3060core_i5-10310u_firmwarecore_i5-10400xeon_silver_4310t_firmwarepentium_silver_n6000_firmwarexeon_gold_6314uceleron_n5105_firmwarecore_i7-10610u_firmwarecore_i9-10900f_firmwarecore_i7-10710u_firmwarecore_i5-10500tecore_i3-10105fcore_i5-10300hceleron_n4120xeon_platinum_8353hcore_i9-10980hkxeon_gold_6348hcore_i3-1005g1_firmwarexeon_gold_6338_firmwareceleron_n4000_firmwareceleron_n3050_firmwareceleron_j3455_firmwarecore_i7-10510ucore_i3-10100y_firmwarecore_i5-10400t_firmwareceleron_n2840celeron_n2806_firmwarecore_i3-10100ecore_i7-1060g7xeon_silver_4309y_firmwareceleron_n2910core_i9-10900celeron_n2930xeon_gold_5320hceleron_n2840_firmwarexeon_gold_5320celeron_j1800_firmwarexeon_platinum_8360yxeon_platinum_8358p_firmwarexeon_gold_6330h_firmwarecore_i3-10100txeon_gold_6338tcore_i9-10900ecore_i9-10850kxeon_gold_5318score_i3-10325_firmwarecore_i9-10900kcore_i7-10700te_firmwarecore_i9-10900fxeon_platinum_8356h_firmwarecore_i7-10700core_i3-10105t_firmwareceleron_j3060celeron_j4105_firmwareceleron_n3160core_i3-10100tecore_i7-10750h_firmwarecore_i5-10400_firmwarexeon_platinum_8380hlxeon_gold_5318nceleron_n4505_firmwarexeon_platinum_8358pcore_i3-10105tcore_i7-10700fcore_i9-10885hpentium_silver_n5000core_i5-1030g4_firmwarecore_i3-10325xeon_gold_6328h_firmwarecore_i7-1068ng7_firmwarecore_i7-10750hxeon_gold_6328hl_firmwarecore_i3-1000g4xeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarecore_i7-10875hceleron_n3350e_firmwareceleron_j6413_firmwarexeon_gold_6348h_firmwarexeon_platinum_8356hceleron_j4105core_i5-10400h_firmwarecore_i3-10100celeron_j4025_firmwarecore_i5-10500_firmwarecore_i5-1035g7_firmwarexeon_platinum_8360y_firmwareceleron_j1800pentium_silver_j5040_firmwarecore_i7-10700f_firmwareceleron_j6412_firmwareceleron_j1900xeon_gold_5318h_firmwarexeon_gold_5320tceleron_n4505core_i5-10210yxeon_gold_6312ucore_i5-10500exeon_gold_5320h_firmwareceleron_j3355core_i3-10305_firmwarecore_i5-10210u_firmwarecore_i5-10600tcore_i3-10110ycore_i5-10600kfceleron_n2810_firmwarexeon_silver_4314xeon_gold_5318n_firmwarecore_i7-10700exeon_platinum_8352y_firmwareceleron_j3355ecore_i9-10900e_firmwarecore_i5-10500h_firmwarexeon_platinum_8358celeron_j4125_firmwarexeon_gold_5315ycore_i7-10870hceleron_j1850_firmwarexeon_platinum_8352s_firmwarecore_i5-1035g1pentium_silver_n5030core_i5-1038ng7xeon_platinum_8354hxeon_silver_4310_firmwarecore_i7-10700e_firmwarexeon_gold_6338n_firmwareceleron_n2920_firmwarecore_i5-1035g4_firmwareceleron_n3350core_i3-10110y_firmwarecore_i7-10700kxeon_gold_6326_firmwareceleron_n3050xeon_platinum_8351n_firmwarepentium_silver_j5005core_i5-1030g4core_i5-10500te_firmwarecore_i7-10700texeon_platinum_8368celeron_n3000celeron_n2807core_i5-10500xeon_silver_4310tceleron_n4100_firmwarecore_i5-10500e_firmwarexeon_platinum_8380core_i7-10710ucore_i7-10700kfxeon_gold_6314u_firmwarepentium_silver_j5005_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_gold_6330n_firmwarexeon_platinum_8352vxeon_gold_6336ycore_i5-10600t_firmwarecore_i5-10210y_firmwareceleron_n3350_firmwarecore_i3-10305core_i3-10300_firmwareceleron_n2820core_i3-1000g4_firmwareceleron_n4500_firmwarexeon_platinum_8360hlxeon_platinum_8380_firmwareceleron_j3355e_firmwarecore_i7-10510y_firmwareceleron_n3450_firmwaresgx_sdkxeon_gold_6330_firmwarecore_i3-10100e_firmwareceleron_n2805celeron_n2806core_i5-10600kceleron_j1750_firmwarecore_i5-1038ng7_firmwarexeon_gold_5320_firmwarexeon_platinum_8380hl_firmwarecore_i9-10900kfcore_i3-10105xeon_platinum_8360h_firmwareceleron_n4120_firmwarexeon_gold_6354xeon_gold_6336y_firmwarecore_i3-10100te_firmwarexeon_platinum_8354h_firmwarexeon_platinum_8352mceleron_n3350ecore_i9-10900k_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i5-10310yxeon_gold_6330hceleron_n3010xeon_gold_5318hxeon_platinum_8376hlcore_i5-10500hxeon_silver_4316_firmwareceleron_n2808celeron_j4025core_i7-10810u_firmwarecore_i3-10100t_firmwarecore_i9-10900t_firmwarepentium_silver_n6005_firmwarecore_i7-10810upentium_silver_n5030_firmwarecore_i5-10400f_firmwarecore_i3-10300t_firmwarecore_i3-10105_firmwareceleron_j6413xeon_gold_6346core_i9-10900_firmwarecore_i7-10875h_firmwareceleron_j3160_firmwarecore_i5-10500t_firmwareceleron_j3455e_firmwareceleron_j4005_firmwarecore_i7-10610uceleron_j3060_firmwarecore_i5-10505_firmwarecore_i5-1035g1_firmwarecore_i3-10100fxeon_gold_6338nceleron_n2920core_i7-1065g7_firmwarecore_i5-10600celeron_n3160_firmwareceleron_n2815_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarecore_i5-10300h_firmwarepentium_silver_n6005core_i9-10900kf_firmwareceleron_n2820_firmwarexeon_gold_6348celeron_n6211xeon_gold_6330ncore_i5-10200h_firmwarexeon_platinum_8368_firmwareceleron_n4020_firmwarecore_i9-10850k_firmwareceleron_n6210_firmwareceleron_n6211_firmwareceleron_n3060_firmwareceleron_n3010_firmwarexeon_platinum_8352v_firmwarecore_i9-10885h_firmwarexeon_platinum_8368qceleron_n4000celeron_n2830celeron_j3455exeon_gold_5320t_firmwarecore_i5-1030g7_firmwarexeon_silver_4310core_i3-10320core_i9-10900txeon_silver_4314_firmwarecore_i3-10300txeon_gold_6334celeron_n3450celeron_n5100celeron_n2805_firmwarecore_i3-10110u_firmwareceleron_n4020celeron_j6412xeon_gold_6342celeron_n2810celeron_n2808_firmwarecore_i7-10700kf_firmwarexeon_platinum_8376h_firmwarexeon_platinum_8353h_firmwarecore_i5-10500tcore_i3-10320_firmwarexeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yceleron_j3355_firmwarecore_i3-1005g1celeron_j4005xeon_gold_6328hcore_i3-10305tcore_i7-10700_firmwarexeon_gold_6334_firmwareceleron_n2910_firmwarecore_i7-10850h_firmwarecore_i7-1065g7pentium_silver_j5040xeon_gold_6328hlcore_i9-10900tecore_i9-10980hk_firmwareceleron_j4125Intel(R) SGX SDK applications compiled for SGX2 enabled processors
CWE ID-CWE-20
Improper Input Validation
CVE-2020-9855
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.51%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 16:17
Updated-04 Aug, 2024 | 10:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Catalina 10.15.5. A local attacker may be able to elevate their privileges.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-20
Improper Input Validation
CVE-2018-10874
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.22%
||
7 Day CHG~0.00%
Published-02 Jul, 2018 | 13:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.

Action-Not Available
Vendor-[UNKNOWN]Red Hat, Inc.
Product-ansible_engineopenstackvirtualizationvirtualization_hostansible
CWE ID-CWE-426
Untrusted Search Path
CWE ID-CWE-20
Improper Input Validation
CVE-2022-28383
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 23.06%
||
7 Day CHG~0.00%
Published-08 Jun, 2022 | 00:00
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Verbatim drives through 2022-03-31. Due to insufficient firmware validation, an attacker can store malicious firmware code for the USB-to-SATA bridge controller on the USB drive (e.g., by leveraging physical access during the supply chain). This code is then executed. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428, Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0, Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1, and Fingerprint Secure Portable Hard Drive Part Number #53650.

Action-Not Available
Vendor-verbatimn/a
Product-executive_fingerprint_secure_ssd_firmwarekeypad_secure_usb_3.2_gen_1_firmwarestore_\'n\'_go_secure_portable_hdd_firmwarekeypad_secure_usb_3.2_gen_1fingerprint_secure_portable_hard_drive_firmwarestore_\'n\'_go_secure_portable_hddfingerprint_secure_portable_hard_driveexecutive_fingerprint_secure_ssdn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-27826
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.61%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation vulnerability in SemSuspendDialogInfo prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2022-27828
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.61%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation vulnerability in MediaMonitorEvent prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2022-27833
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.41%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in DSP driver prior to SMR Apr-2022 Release 1 allows out-of-bounds write by integer overflow.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-androidexynos_9830exynos_980exynos_2100Samsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-1085
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.3||HIGH
EPSS-0.04% / 11.97%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 18:50
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to write to a shared memory location and manipulate the data after the data has been validated, which may lead to denial of service and escalation of privileges and information disclosure but attacker doesn't have control over what information is obtained. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7).

Action-Not Available
Vendor-nutanixVMware (Broadcom Inc.)NVIDIA CorporationCitrix (Cloud Software Group, Inc.)Red Hat, Inc.
Product-enterprise_linux_kernel-based_virtual_machinehypervisorvirtual_gpu_managervsphereahvNVIDIA Virtual GPU Software
CWE ID-CWE-20
Improper Input Validation
CVE-2022-27829
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.61%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation vulnerability in VerifyCredentialResponse prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2018-10502
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.05% / 13.66%
||
7 Day CHG~0.00%
Published-24 Sep, 2018 | 23:00
Updated-05 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of a staging mode. The issue lies in the ability to change the configuration based on the presence of a file in an user-controlled location. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the application. Was ZDI-CAN-5359.

Action-Not Available
Vendor-Samsung
Product-galaxy_appsSamsung Galaxy Apps
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8756
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.28%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:07
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_and_manageability_engineIntel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2022-27830
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.61%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation vulnerability in SemBlurInfo prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2020-9137
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.53%
||
7 Day CHG~0.00%
Published-24 Dec, 2020 | 15:47
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a privilege escalation vulnerability in some versions of CloudEngine 12800,CloudEngine 5800,CloudEngine 6800 and CloudEngine 7800. Due to insufficient input validation, a local attacker with high privilege may execute some specially crafted scripts in the affected products. Successful exploit will cause privilege escalation.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-cloudengine_7800cloudengine_5800_firmwarecloudengine_5800cloudengine_6800_firmwarecloudengine_6800cloudengine_7800_firmwarecloudengine_12800cloudengine_12800_firmwareCloudEngine 12800;CloudEngine 5800;CloudEngine 6800;CloudEngine 7800
CWE ID-CWE-20
Improper Input Validation
CVE-2017-15845
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.74%
||
7 Day CHG~0.00%
Published-10 Jan, 2018 | 22:00
Updated-16 Sep, 2024 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, an invalid input of firmware size (negative value) from user space can potentially lead to the memory leak or buffer overflow during the WLAN cal data store operation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2024-0127
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.55%
||
7 Day CHG~0.00%
Published-26 Oct, 2024 | 08:10
Updated-01 Nov, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU software contains a vulnerability in the GPU kernel driver of the vGPU Manager for all supported hypervisors, where a user of the guest OS can cause an improper input validation by compromising the guest OS kernel. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-vGPU and Cloud Gamingcloud_gaming_virtual_gpuvirtual_gpu_manager
CWE ID-CWE-20
Improper Input Validation
CVE-2018-10497
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.30%
||
7 Day CHG~0.00%
Published-24 Sep, 2018 | 23:00
Updated-05 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Email Fixed in version 5.0.02.16. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of EML files. The issue results from the lack of proper validation of user-supplied data, which can allow arbitrary JavaScript to execute. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the application. Was ZDI-CAN-5328.

Action-Not Available
Vendor-Samsung
Product-samsung_emailSamsung Email
CWE ID-CWE-20
Improper Input Validation
CVE-2022-28195
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-5.7||MEDIUM
EPSS-0.14% / 35.16%
||
7 Day CHG~0.00%
Published-27 Apr, 2022 | 17:57
Updated-03 Aug, 2024 | 05:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot ext4_read_file function, where insufficient validation of untrusted data may allow a highly privileged local attacker to cause a integer overflow, which may lead to code execution, escalation of privileges, limited denial of service, and some impact to confidentiality and integrity. The scope of impact can extend to other components.

Action-Not Available
Vendor-NVIDIA Corporation
Product-jetson_agx_xavierjetson_linuxjetson_xavier_nxJetson AGX Xavier series, Jetson Xavier NX
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-9127
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 30.60%
||
7 Day CHG~0.00%
Published-13 Nov, 2020 | 14:46
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-nip6600secospace_usg6500_firmwarenip6300secospace_usg6500usg9500_firmwaresecospace_usg6600_firmwaresecospace_usg6300nip6600_firmwarenip6300_firmwareusg9500secospace_usg6600secospace_usg6300_firmwareNIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2018-0338
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.83%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 21:00
Updated-29 Nov, 2024 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the role-based access-checking mechanisms of Cisco Unified Computing System (UCS) Software could allow an authenticated, local attacker to execute arbitrary commands on an affected system. The vulnerability exists because the affected software lacks proper input and validation checks for certain file systems. An attacker could exploit this vulnerability by issuing crafted commands in the CLI of an affected system. A successful exploit could allow the attacker to cause other users to execute unwanted arbitrary commands on the affected system. Cisco Bug IDs: CSCvf52994.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_systemCisco Unified Computing System unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-0307
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.86%
||
7 Day CHG~0.00%
Published-20 Jun, 2018 | 21:00
Updated-29 Nov, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to perform a command-injection attack on an affected device. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting malicious command arguments into a vulnerable CLI command. A successful exploit could allow the attacker, authenticated as a privileged user, to execute arbitrary commands with root privileges. Note: On products that support multiple virtual device contexts (VDC), this vulnerability could allow an attacker to access files from any VDC. This vulnerability affects Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCve51704, CSCve91749, CSCve91768.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-nexus_56128pnexus_9332pqnexus_3132q-xnexus_93108tc-exnexus_3172tqnx-osnexus_9508nexus_3100-vnexus_3636c-rnexus_93120txnexus_n9k-x9636c-rnexus_93128txnexus_3548-xlnexus_31128pqnexus_6001pnexus_3164qnexus_5020nexus_3172tq-32tnexus_3132c-znexus_3524-xnexus_5548pnexus_5648qnexus_9272qnexus_5672upnexus_3264qnexus_34180ycnexus_3064-32tnexus_5596upnexus_3548nexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xnexus_n9k-x9636q-rnexus_n9k-c9508-fm-rnexus_9504nexus_3048nexus_9500nexus_3524-xlnexus_9396txnexus_7000nexus_3172pqnexus_3064-xnexus_3232cnexus_5548upnexus_9396pxnexus_5010nexus_5000nexus_5596tnexus_3264c-enexus_9372txnexus_5624qnexus_3548-xnexus_3132q-xlnexus_3064-tnexus_93180yc-exnexus_6001tnexus_172tq-xlnexus_c36180yc-rnexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco NX-OS unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-9105
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 5.47%
||
7 Day CHG~0.00%
Published-09 Oct, 2020 | 12:30
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-taurus-an00b_firmwaretaurus-an00bTaurus-AN00B
CWE ID-CWE-20
Improper Input Validation
CVE-2018-0306
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.86%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 11:00
Updated-29 Nov, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI parser of Cisco NX-OS Software could allow an authenticated, local attacker to perform a command-injection attack on an affected device. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting malicious command arguments into a vulnerable CLI command. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device. Note: This vulnerability requires that any feature license is uploaded to the device. The vulnerability does not require that the license be used. This vulnerability affects MDS 9000 Series Multilayer Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCve51693, CSCve91634, CSCve91659, CSCve91663.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-nexus_56128pnexus_2232tm-e_10genexus_3132q-xnexus_3172tqnexus_9332pqnexus_2148tnexus_93108tc-exnx-osnexus_3636c-rnexus_9508nexus_3100-vnexus_93120txnexus_n9k-x9636c-rnexus_93128txmds_9506mds_9250inexus_3548-xlnexus_31128pqnexus_6001pnexus_3164qnexus_5020nexus_3172tq-32tnexus_2224tp_genexus_3524-xnexus_3132c-znexus_5548pnexus_5648qmds_9718nexus_9272qmds_9148smds_9513mds_9148tnexus_5672upmds_9132tnexus_3264qnexus_34180ycmds_9509mds_9706nexus_3064-32tnexus_5596upnexus_3548nexus_2248tp_genexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xnexus_n9k-x9636q-rnexus_n9k-c9508-fm-rmds_9148nexus_3048nexus_1110-xnexus_9504nexus_2232pp_10genexus_3524-xlnexus_9396txmds_9396tnexus_7000nexus_2248tp-emds_9396snexus_3172pqnexus_3064-xnexus_3232cnexus_5548upnexus_9396pxmds_9222inexus_5010nexus_5000nexus_2248pq_10genexus_1000vnexus_5596tnexus_3264c-enexus_1110-snexus_9372txnexus_5624qnexus_3548-xnexus_3132q-xlnexus_3064-tmds_9710nexus_2232tm_10genexus_93180yc-exnexus_6001tnexus_172tq-xlnexus_c36180yc-rnexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco NX-OS unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-8721
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.14% / 34.54%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:30
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2022-30756
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.61%
||
7 Day CHG~0.00%
Published-11 Jul, 2022 | 13:32
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Implicit Intent hijacking vulnerability in Finder prior to SMR Jul-2022 Release 1 allow allows attackers to launch certain activities with privilege of Finder.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2018-0302
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.24% / 46.77%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 11:00
Updated-29 Nov, 2024 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI parser of Cisco FXOS Software and Cisco UCS Fabric Interconnect Software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to incorrect input validation in the CLI parser subsystem. An attacker could exploit this vulnerability by exceeding the expected length of user input. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the affected system. This vulnerability affects Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvb61099, CSCvb86743.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firepower_4150firepower_4140ucs_6120xpucs_6140xpnx-osfirepower_9300_security_applianceucs_6296upucs_6324firepower_4110firepower_4120ucs_6248upfirepower_extensible_operating_systemucs_6332Cisco FXOS Software and UCS Fabric Interconnect unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-8734
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.77%
||
7 Day CHG~0.00%
Published-02 Feb, 2021 | 20:20
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-m10jnp2sb_firmwarem10jnp2sbIntel® Server Board M10JNP2SB Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2022-30726
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.2||MEDIUM
EPSS-0.01% / 1.89%
||
7 Day CHG~0.00%
Published-07 Jun, 2022 | 18:03
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unprotected component vulnerability in DeviceSearchTrampoline in SecSettingsIntelligence prior to SMR Jun-2022 Release 1 allows local attackers to launch activities of SecSettingsIntelligence.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2020-7867
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-8||HIGH
EPSS-0.41% / 60.43%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 00:43
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Helpu arbitrary file creation vulnerability

An improper input validation vulnerability in Helpu solution could allow a local attacker to arbitrary file creation and execution without click file transfer menu. It is possible to file in arbitrary directory for user because the viewer program receive the file from agent with privilege of administrator.

Action-Not Available
Vendor-helpuHelpU
Product-helpuviewerHelpuViewer.exe
CWE ID-CWE-20
Improper Input Validation
CVE-2018-0337
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.76%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 11:00
Updated-29 Nov, 2024 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the role-based access-checking mechanisms of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on an affected device. The vulnerability exists because the affected software lacks proper input and validation checks for certain file systems. An attacker could exploit this vulnerability by issuing crafted commands in the CLI of an affected device. A successful exploit could allow the attacker to cause other users to execute unwanted, arbitrary commands on the affected device. Cisco Bug IDs: CSCvd06339, CSCvd15698, CSCvd36108, CSCvf52921, CSCvf52930, CSCvf52953, CSCvf52976.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-nexus_5548pnexus_5624qnexus_5548upnexus_56128pnexus_5648qnexus_5672upnexus_7000nx-osnexus_5010nexus_5000nexus_5696qnexus_5596upnexus_5020nexus_5596tnexus_7700Cisco NX-OS unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-26582
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.21% / 42.78%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow an attacker to gain root access through command injection in systool client. The attacker must have shell access to the device in order to exploit this vulnerability.

Action-Not Available
Vendor-paxtechnologyn/apaxtechnology
Product-a930paydroidn/aa930
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-5058
Matching Score-4
Assigner-Phoenix Technologies, Inc.
ShareView Details
Matching Score-4
Assigner-Phoenix Technologies, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.71%
||
7 Day CHG~0.00%
Published-07 Dec, 2023 | 22:29
Updated-28 Jul, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore™ Technology™ 4 potentially allows denial-of-service attacks or arbitrary code execution.

Action-Not Available
Vendor-phoenixPhoenix
Product-securecore_technologySecureCore™ Technology™ 4
CWE ID-CWE-20
Improper Input Validation
CVE-2020-7459
Matching Score-4
Assigner-FreeBSD
ShareView Details
Matching Score-4
Assigner-FreeBSD
CVSS Score-6.8||MEDIUM
EPSS-0.06% / 19.11%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 16:49
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r362166, 12.1-RELEASE before p8, 11.4-STABLE before r362167, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, missing length validation code common to mulitple USB network drivers allows a malicious USB device to write beyond the end of an allocated network packet buffer.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-20
Improper Input Validation
CVE-2022-24382
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.77%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_11_pro_kit_nuc11tnhi30l_firmwarenuc11dbbi7_firmwarenuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_11_pro_kit_nuc11tnki7nuc11pa_firmwarenuc8i3cysnnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_pro_board_nuc11tnbi50znuc_11_pro_kit_nuc11tnki30z_firmwarenuc_8_compute_element_cm8pcbnuc_8_compute_element_cm8pcb_firmwarelapkc71fnuc_11_pro_board_nuc11tnbi70z_firmwarenuc_11_pro_board_nuc11tnbi7nuc_11_compute_element_cm11ebc4w_firmwarenuc_11_pro_kit_nuc11tnki50znuc_11_pro_kit_nuc11tnki5nuc_kit_nuc8i5benuc8i3cysmlapbc710nuc_11_pro_kit_nuc11tnhi50znuc_8_compute_element_cm8i3cbnuc8i3cysn_firmwarenuc_kit_nuc8i5be_firmwarenuc11pahnuc_11_pro_board_nuc11tnbi30z_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_8_compute_element_cm8ccbnuc11dbbi9_firmwarenuc_11_pro_board_nuc11tnbi5nuc_9_pro_compute_element_nuc9v7qnblapbc710_firmwarelapkc51enuc_11_pro_kit_nuc11tnki3nuc_11_pro_kit_nuc11tnki70znuc_8_compute_element_cm8i7cblapkc71f_firmwarenuc_11_enthusiast_kit_nuc11phki7cnuc11panuc_11_pro_kit_nuc11tnhi70lnuc_11_pro_kit_nuc11tnhi50lnuc_8_compute_element_cm8i7cb_firmwarenuc9i9qnnuc_11_pro_board_nuc11tnbi70znuc_11_pro_kit_nuc11tnhi30znuc_11_pro_kit_nuc11tnhi50w_firmwarelapbc510_firmwarenuc_11_compute_element_cm11ebi716wnuc_11_pro_kit_nuc11tnki30znuc_kit_nuc8i3b_firmwarenuc11btmi9nuc11btmi7nuc9i7qnnuc9i7qn_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_11_pro_kit_nuc11tnhi70qnuc_11_pro_kit_nuc11tnhi70znuc9i5qn_firmwarenuc_kit_nuc8i7be_firmwarenuc_11_pro_kit_nuc11tnhi30lnuc8i3cysm_firmwarelapkc71e_firmwarenuc_11_pro_kit_nuc11tnhi30z_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnki50z_firmwarenuc11paq_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_kit_nuc8i3bnuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc11btmi9_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_11_pro_board_nuc11tnbi30znuc_11_pro_kit_nuc11tnhi3nuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_11_pro_board_nuc11tnbi3nuc_11_pro_kit_nuc11tnhi7nuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarelapbc510nuc_11_pro_kit_nuc11tnki3_firmwarenuc_8_compute_element_cm8i5cbnuc_11_pro_kit_nuc11tnhi70q_firmwarenuc11pah_firmwarenuc_8_compute_element_cm8i3cb_firmwarelapkc51e_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc11paqnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_11_pro_kit_nuc11tnki70z_firmwarenuc_9_pro_kit_nuc9v7qnxnuc_11_compute_element_cm11ebi58wnuc_11_pro_kit_nuc11tnhi5nuc_11_pro_kit_nuc11tnhi3_firmwarenuc_11_pro_board_nuc11tnbi50z_firmwarenuc_11_compute_element_cm11ebc4wnuc11dbbi9nuc11btmi7_firmwarenuc_11_pro_kit_nuc11tnhi50wnuc_kit_nuc8i7benuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_11_pro_kit_nuc11tnhi30pnuc_11_pro_kit_nuc11tnhi70z_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc9i5qnnuc11dbbi7nuc9i9qn_firmwarenuc_11_pro_kit_nuc11tnhi50z_firmwarenuc_9_pro_compute_element_nuc9vxqnblapkc71enuc_11_compute_element_cm11ebi38wIntel(R) NUCs
CWE ID-CWE-20
Improper Input Validation
CVE-2017-7218
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.22% / 44.51%
||
7 Day CHG~0.00%
Published-14 Apr, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Management Web Interface in Palo Alto Networks PAN-OS before 7.1.9 allows remote authenticated users to gain privileges via unspecified request parameters.

Action-Not Available
Vendor-n/aPalo Alto Networks, Inc.
Product-pan-osn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2022-28193
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.20% / 42.69%
||
7 Day CHG~0.00%
Published-27 Apr, 2022 | 17:57
Updated-03 Aug, 2024 | 05:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot module tegrabl_cbo.c, where insufficient validation of untrusted data may allow a local attacker with elevated privileges to cause a memory buffer overflow, which may lead to code execution, loss of integrity, limited denial of service, and some impact to confidentiality.

Action-Not Available
Vendor-NVIDIA Corporation
Product-jetson_agx_xavierjetson_linuxjetson_xavier_nxJetson AGX Xavier series, Jetson Xavier NX
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-27827
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.61%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation vulnerability in MediaMonitorDimension prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CVE-2020-4607
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.3||LOW
EPSS-0.04% / 12.69%
||
7 Day CHG~0.00%
Published-29 Sep, 2020 | 13:50
Updated-17 Sep, 2024 | 01:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationIBM Corporation
Product-security_verify_privilege_vault_remote_on-premiseswindowsmacosSecurity Verify Privilege Vault Remote
CWE ID-CWE-20
Improper Input Validation
CVE-2017-6650
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.58% / 67.82%
||
7 Day CHG~0.00%
Published-22 May, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Telnet CLI command of Cisco NX-OS System Software 7.1 through 7.3 running on Cisco Nexus Series Switches could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting crafted command arguments into the Telnet CLI command. An exploit could allow the attacker to read or write arbitrary files at the user's privilege level outside of the user's path. Cisco Bug IDs: CSCvb86771.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-nexus_5548upnexus_5596upnexus_5624qnexus_5596tnexus_5696qnexus_5672up-16gnx-osnexus_5648qnexus_5672upnexus_56128pCisco Nexus Series Switches
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2022-21933
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.41%
||
7 Day CHG~0.00%
Published-21 Jan, 2022 | 09:05
Updated-16 Sep, 2024 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASUS VivoMini/Mini PC - improper input validation

ASUS VivoMini/Mini PC device has an improper input validation vulnerability. A local attacker with system privilege can use system management interrupt (SMI) to modify memory, resulting in arbitrary code execution for controlling the system or disrupting service.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-pb61vpn60un65u_firmwarepa90vc65-c1pn60_firmwarepb50pb60s_firmwarepb60g_firmwarepa90_firmwarevc65-c1_firmwarepn30pb60_firmwarets10pb60un65upn30_firmwarets10_firmwarepb60vpb60gpb61v_firmwarepb60spb60v_firmwarepn40pb50_firmwarepn40_firmwarePB60GVC65-C1PA90PN40PB50UN65UPN60PB60SPB61VTS10PN30PB60VPB60
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-26531
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.99% / 75.95%
||
7 Day CHG~0.00%
Published-24 May, 2022 | 00:00
Updated-03 Aug, 2024 | 05:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple improper input validation flaws were identified in some CLI commands of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to cause a buffer overflow or a system crash via a crafted payload.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-usg_60w_firmwarenwa210ax_firmwarewac6502d-e_firmwareatp100atp800_firmwareusg_2200-vpn_firmwareusg_flex_100atp100w_firmwarenwa1302-ac_firmwarenap303_firmwarenxc2500nsg300nwa1123-ac-pro_firmwarenwa110ax_firmwareusg300_firmwarewax510d_firmwareusg200usg_40wnwa90ax_firmwarensg100atp500_firmwareusg_20w-vpn_firmwarewac6502d-eatp800nap203_firmwarevpn50usg310wac6103d-iusg_40w_firmwarewac5302d-sv2nwa1123-ac-prowac6502d-s_firmwarewac6552d-swac5302d-sv2_firmwarenap203wax650susg2200wax610d_firmwareatp200_firmwarenwa55axe_firmwarewac500hnsg300_firmwareatp100_firmwareusg_flex_500_firmwarenwa50axwax610dnsg100_firmwareusg200_firmwarewac6552d-s_firmwarevpn300usg_flex_100wwac500usg_110_firmwareatp700_firmwareusg_60wusg210nap353nsg50wax650s_firmwareusg_110usg_1900_firmwareatp500wac6103d-i_firmwarenwa1123acv3_firmwareusg_40vpn300_firmwarewax630snwa5123-ac-hd_firmwarenwa50ax_firmwareusg_1900wac500h_firmwarenwa1123-ac-hdusg_flex_100w_firmwarenap303usg_2200-vpnvpn50_firmwareatp200atp700usg_20wusg_20w-vpnnwa1302-acvpn1000_firmwarewac6553d-swac5302d-s_firmwarewac5302d-snwa110axusg_flex_500usg310_firmwareusg20usg_310vpn100usg_1100usg_310_firmwarensg50_firmwarewac6303d-s_firmwarewac6553d-s_firmwareusg_flex_200nwa210axusg_40_firmwareatp100wusg_flex_200_firmwarenxc5500usg210_firmwareusg_20w_firmwarenwa1123acv3usg300vpn100_firmwareusg_flex_700usg_60_firmwarenwa1123-ac-hd_firmwareusg2200_firmwarenwa55axenap353_firmwarewax630s_firmwarewac6503d-s_firmwarewac500_firmwareusg_60usg20_firmwarewac6303d-snwa5123-ac-hdusg_flex_100_firmwarenxc5500_firmwarewac6503d-snwa90axwax510dnxc2500_firmwarewac6502d-susg_flex_700_firmwarevpn1000usg_1100_firmwareATP series firmwareWAC500 firmwareNSG series firmwareVPN series firmwareNXC2500 firmwareNWA50AX firmwareUSG FLEX series firmwareUSG/ZyWALL series firmwareWAX510D firmwareNAP203 firmware
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 12
  • 13
  • Next
Details not found