Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-36372

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-11 Aug, 2023 | 02:37
Updated At-09 Oct, 2024 | 16:27
Rejected At-
Credits

Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:11 Aug, 2023 | 02:37
Updated At:09 Oct, 2024 | 16:27
Rejected At:
▼CVE Numbering Authority (CNA)

Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) NUC BIOS firmware
Default Status
unaffected
Versions
Affected
  • See references
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-92Improper buffer restrictions
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-92
Description: Improper buffer restrictions
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
N/A
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
x_transferred
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
Intel Corporationintel
Product
bios
CPEs
  • cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • CM8i3CB4N
  • CM8PCB4R
  • CM8CCB4R
  • CM8i7CB8N
  • CM8i5CB8N
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:11 Aug, 2023 | 03:15
Updated At:07 Nov, 2023 | 03:49

Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Intel Corporation
intel
>>nuc_8_compute_element_cm8i3cb4n_firmware>>-
cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb4n_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8i3cb4n>>-
cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb4n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8i5cb8n_firmware>>-
cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb8n_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8i5cb8n>>-
cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb8n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8i7cb8n_firmware>>-
cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb8n_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8i7cb8n>>-
cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb8n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8ccb4r_firmware>>-
cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb4r_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8ccb4r>>-
cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb4r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8pcb4r_firmware>>-
cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb4r_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_8_compute_element_cm8pcb4r>>-
cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb4r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_kit_nuc8i3pnb_firmware>>-
cpe:2.3:o:intel:nuc_pro_kit_nuc8i3pnb_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_kit_nuc8i3pnb>>-
cpe:2.3:h:intel:nuc_pro_kit_nuc8i3pnb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_kit_nuc8i3pnh_firmware>>-
cpe:2.3:o:intel:nuc_pro_kit_nuc8i3pnh_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_kit_nuc8i3pnh>>-
cpe:2.3:h:intel:nuc_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_kit_nuc8i3pnk_firmware>>-
cpe:2.3:o:intel:nuc_pro_kit_nuc8i3pnk_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_kit_nuc8i3pnk>>-
cpe:2.3:h:intel:nuc_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_board_nuc8i3pnb_firmware>>-
cpe:2.3:o:intel:nuc_pro_board_nuc8i3pnb_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_board_nuc8i3pnb>>-
cpe:2.3:h:intel:nuc_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_board_nuc8i3pnh_firmware>>-
cpe:2.3:o:intel:nuc_pro_board_nuc8i3pnh_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_board_nuc8i3pnh>>-
cpe:2.3:h:intel:nuc_pro_board_nuc8i3pnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_board_nuc8i3pnk_firmware>>-
cpe:2.3:o:intel:nuc_pro_board_nuc8i3pnk_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_board_nuc8i3pnk>>-
cpe:2.3:h:intel:nuc_pro_board_nuc8i3pnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchb_firmware>>-
cpe:2.3:o:intel:nuc_rugged_kit_nuc8cchb_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchb>>-
cpe:2.3:h:intel:nuc_rugged_kit_nuc8cchb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchbn_firmware>>-
cpe:2.3:o:intel:nuc_rugged_kit_nuc8cchbn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchbn>>-
cpe:2.3:h:intel:nuc_rugged_kit_nuc8cchbn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchkrn_firmware>>-
cpe:2.3:o:intel:nuc_rugged_kit_nuc8cchkrn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchkrn>>-
cpe:2.3:h:intel:nuc_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchkr_firmware>>-
cpe:2.3:o:intel:nuc_rugged_kit_nuc8cchkr_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_rugged_kit_nuc8cchkr>>-
cpe:2.3:h:intel:nuc_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9v7qnb_firmware>>-
cpe:2.3:o:intel:nuc_pro_compute_element_nuc9v7qnb_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9v7qnb>>-
cpe:2.3:h:intel:nuc_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9v7qnx_firmware>>-
cpe:2.3:o:intel:nuc_pro_compute_element_nuc9v7qnx_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9v7qnx>>-
cpe:2.3:h:intel:nuc_pro_compute_element_nuc9v7qnx:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9vxqnb_firmware>>-
cpe:2.3:o:intel:nuc_pro_compute_element_nuc9vxqnb_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9vxqnb>>-
cpe:2.3:h:intel:nuc_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9vxqnx_firmware>>-
cpe:2.3:o:intel:nuc_pro_compute_element_nuc9vxqnx_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_pro_compute_element_nuc9vxqnx>>-
cpe:2.3:h:intel:nuc_pro_compute_element_nuc9vxqnx:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hnkqc_firmware>>-
cpe:2.3:o:intel:nuc_business_nuc8i7hnkqc_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hnkqc>>-
cpe:2.3:h:intel:nuc_business_nuc8i7hnkqc:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hvkva_firmware>>-
cpe:2.3:o:intel:nuc_business_nuc8i7hvkva_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hvkva>>-
cpe:2.3:h:intel:nuc_business_nuc8i7hvkva:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hvkvaw_firmware>>-
cpe:2.3:o:intel:nuc_business_nuc8i7hvkvaw_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hvkvaw>>-
cpe:2.3:h:intel:nuc_business_nuc8i7hvkvaw:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hvk_firmware>>-
cpe:2.3:o:intel:nuc_business_nuc8i7hvk_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hvk>>-
cpe:2.3:h:intel:nuc_business_nuc8i7hvk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hnk_firmware>>-
cpe:2.3:o:intel:nuc_business_nuc8i7hnk_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_business_nuc8i7hnk>>-
cpe:2.3:h:intel:nuc_business_nuc8i7hnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_enthusiast_nuc8i7hnkqc_firmware>>-
cpe:2.3:o:intel:nuc_enthusiast_nuc8i7hnkqc_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_enthusiast_nuc8i7hnkqc>>-
cpe:2.3:h:intel:nuc_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE-92Secondarysecure@intel.com
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-92
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.htmlsecure@intel.com
Patch
Vendor Advisory
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Source: secure@intel.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

300Records found

CVE-2022-40964
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.03% / 5.94%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-wireless-ac_9560killer_wireless-ac_1550i\/skillerwi-fi_6e_ax211wi-fi_6e_ax210wireless-ac_9462killer_wi-fi_6e_ax1675x\/wuefi_firmwarewireless-ac_9461killer_wi-fi_6e_ax1675i\/sdebian_linuxkiller_wi-fi_6_ax1650i\/sfedorawi-fi_6_ax201killer_wi-fi_6e_ax1690i\/swi-fi_6e_ax411proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-284
Improper Access Control
CVE-2021-0103
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 36.92%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-core_i7-6870hqxeon_e-2286gatom_c3950core_i3-9100ecore_i3-10100xeon_silver_4109tcore_i3-7300core_i5-1038ng7core_i5-11400core_i9-7900xcore_i7-10510yxeon_d-1548xeon_bronze_3106xeon_platinum_8260yxeon_d-1633nxeon_d-1653nxeon_platinum_8153xeon_e-2246gcore_i5-6350hqcore_i9-9960xcore_i3-6300txeon_e-2374gxeon_gold_5218txeon_w-2123core_i5-11260hxeon_e-2236xeon_gold_5218nxeon_w-1270exeon_d-1531core_i5-6500tcore_i5-7500core_i5-6260uxeon_e-2278gecore_i5-7440hqxeon_platinum_8156core_i7-8709gatom_c3758xeon_d-2177ntxeon_gold_6142fxeon_silver_4214ycore_i9-11900kfxeon_w-10855mxeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_w-3235core_i9-10900txeon_e-2126gcore_i5-8200ycore_i7-10700tecore_i9-10900kxeon_gold_5220rcore_i5-8260ucore_i5-11400fxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-1185g7core_i7-9700kfcore_i9-10900xxeon_platinum_9221xeon_d-2142itcore_m7-6y75xeon_w-3335core_i9-11900kcore_i5-10500hxeon_w-11555mrecore_i5-10600kfxeon_e-2146gcore_i3-1005g1core_i7-1068ng7xeon_silver_4112xeon_gold_6140xeon_d-1637core_i5-9400fcore_i3-10100ecore_i7-6800kcore_i7-7560uatom_c3538core_i7-9700txeon_gold_5120xeon_gold_6238core_i5-11600kfcore_i5-7600tcore_i7-4820kxeon_d-1602core_i5-8365uatom_c3508xeon_w-2245core_i5-9600kfxeon_d-2145ntxeon_platinum_8256xeon_gold_6130fxeon_e-2276mxeon_e-2224gcore_i5-8269uxeon_d-2163itcore_i3-1120g4core_i7-3930kcore_i5-11400hcore_i9-11900hxeon_d-1623ncore_i7-1185g7ecore_i7-10810ucore_i3-10300txeon_d-1521core_i3-8100core_i3-8145uecore_i5-1130g7core_i9-11900core_i5-6585rcore_i5-9600kxeon_gold_6144core_i5-8265ucore_i7-10700tcore_i9-9900kfcore_i3-7100core_m5-6y54core_i5-6300hqxeon_gold_5118core_i5-1145g7core_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kxeon_silver_4114tcore_i5-8500bxeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_gold_6212ucore_i5-6600core_i3-8100hcore_i7-8706gcore_i3-6300core_i9-11900fxeon_silver_4215xeon_gold_6230ncore_i9-10920xcore_i9-11950hatom_c3750xeon_gold_6138pcore_i7-1195g7core_i5-10310ucore_i9-10885hcore_i7-8557ucore_i5-7440eqcore_i3-6320xeon_e-2386gcore_i7-1165g7core_m3-7y32core_i7-11850hexeon_e-2134xeon_w-1290tecore_i5-1145g7ecore_i5-6440eqcore_i5-1030g7core_i9-10980hkxeon_e-2176mxeon_w-11155mlexeon_gold_6130xeon_silver_4210txeon_e-2274gxeon_gold_6136core_i5-6287ucore_i7-8500yxeon_w-3323core_i5-9600tatom_c3558rcore_i9-7960xxeon_w-1370atom_c3808core_i5-9600xeon_d-1559xeon_gold_6134xeon_w-3375xeon_e-2174gcore_i5-8600txeon_d-1537xeon_gold_5218bxeon_gold_6128core_i7-1180g7xeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_gold_6146xeon_w-1370pxeon_gold_6254core_i3-10320xeon_gold_5218rcore_i3-10105fxeon_w-2235core_i3-6098pcore_i5-6400xeon_d-1649nxeon_w-3175xcore_i7-10875hxeon_w-3225core_i3-7101tecore_i7-7700xeon_d-1540core_i3-11100hecore_i5-10400hxeon_gold_6246rcore_i5-7300hqxeon_d-1513nxeon_w-10885mxeon_gold_6126xeon_d-1527core_i9-9940xcore_i9-9900xcore_i5-6600kcore_i9-7940xcore_i7-9700exeon_e-2254mecore_i7-9700tecore_i7-6700txeon_gold_6248rxeon_silver_4214xeon_w-2125xeon_platinum_9222core_i3-10105tcore_i5-11300hcore_i5-6500texeon_gold_5220sxeon_platinum_8260core_i5-6500core_i3-1000g4core_i3-9100hlcore_i9-10900kfcore_i3-10100tatom_c3858xeon_d-2146ntxeon_e-2144gcore_i9-9980hkxeon_w-11555mlecore_i5-11500hexeon_e-2244gcore_i3-7100tcore_i3-6102exeon_w-1390txeon_silver_4216core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqxeon_platinum_8180xeon_platinum_8276lxeon_gold_6138tcore_i7-7740xcore_i7-11375hcore_i7-7y75core_i7-8559ucore_i5-9500eatom_c3850core_i5-11500txeon_e-2124gcore_i7-4930kcore_i5-9400core_i7-4960xcore_i7-5960xcore_i7-6600uxeon_gold_6138core_i7-1185grecore_i3-10325xeon_gold_6138fxeon_e-2356gcore_i7-8700xeon_d-1557core_i3-7130ucore_i5-8400atom_c3436lxeon_w-3245mxeon_e-2334core_i7\+8700core_i7-9850hatom_c3708xeon_w-1350core_i5-7600core_i9-10980xecore_i7-6500ucore_i5-1035g1xeon_w-11865mlecore_i7-11850hxeon_w-1290xeon_e-2186gxeon_silver_4210core_i3-10110uxeon_gold_6234atom_c3336core_i7-4930mxxeon_w-1350pcore_i9-10900xeon_w-1250core_i5-9400tcore_i5-7360ucore_i5-7300ucore_i7-11800hcore_i3-10300core_i5-6600tcore_i7-8565uxeon_gold_6154xeon_silver_4110core_i7-7700katom_c3830xeon_platinum_8176core_i7-10870hcore_i3-10100fcore_i7-10510uxeon_bronze_3104xeon_w-1290pcore_i5-8310yxeon_gold_5217core_i5-6440hqcore_i7-6850kxeon_gold_5120txeon_e-2324gxeon_w-3245core_i7-6660ucore_i9-7980xecore_i3-6100exeon_gold_6210ucore_i5-7200uxeon_gold_5115core_i7-9700fxeon_w-3345core_i5-10210ucore_i7-6820hqxeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500core_i5-8400bcore_i3-7100hcore_i7-8850hxeon_gold_5215core_i3-6100ucore_i9-9900kscore_i9-7920xxeon_w-11865mrecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i5-6360ucore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_e-2378core_i7-7820xcore_i3-1115g4ecore_i5-10600tcore_i5-7640xcore_i7-7800xxeon_w-3275mxeon_gold_6250lcore_i5-9400hxeon_gold_6209ucore_i9-9920xxeon_platinum_8253xeon_gold_6252ncore_i7-7660ucore_i3-9320xeon_platinum_8158core_i7-7700hqatom_c3308xeon_platinum_8280core_i5-6402pcore_m3-7y30xeon_w-11155mrexeon_gold_6252xeon_w-2135core_i3-10105core_i5-11400tcore_i7-11700kcore_i7-4940mxcore_i7-8550uxeon_e-2276mlxeon_gold_6246xeon_silver_4214rcore_i9-10940xcore_i7-9700core_i7-6700hqcore_i3-8300core_i7-9850hexeon_gold_6230rcore_i7-10700kfcore_i5-8400tcore_i5-7500txeon_d-2187ntxeon_silver_4116tcore_i7-1065g7xeon_d-1518core_i7-9800xxeon_silver_4208core_i5-6267ucore_i3-1000g1xeon_gold_6126txeon_w-2225xeon_silver_4116xeon_e-2276mecore_i5-7y54xeon_w-1250ecore_i5-7400core_i7-6950xfas\/aff_biosxeon_platinum_8160fxeon_platinum_8164core_i7-6567uxeon_platinum_8176fxeon_gold_5215lcore_i5-7287uxeon_platinum_8168core_i7-3970xcore_i7-3960xcore_i7-11600hcore_i7-7920hqcore_i7-10700core_i5-1145grecore_i3-7020uxeon_d-1533nxeon_gold_6240lxeon_w-3265mxeon_gold_6248core_i5-1135g7xeon_w-2195xeon_e-2136core_i5-9300hfxeon_w-1270pcore_i3-1115g4xeon_gold_6258rxeon_platinum_9282core_i3-8145ucore_i3-9300core_i5-10400xeon_d-2173itxeon_d-2161icore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_d-2123itxeon_platinum_8160tcore_i3-8109ucore_i5-8365uexeon_gold_6142core_i3-1110g4xeon_bronze_3206rxeon_gold_6148core_i7-3820xeon_w-3275xeon_gold_6240core_i3-7320core_i7-10700ecore_i5-8350ucore_i7-3940xmxeon_gold_5220xeon_gold_6126fcore_i3-10100tecore_m5-6y57xeon_e-2388gcore_i7-11390hxeon_platinum_8268xeon_e-2226gcore_i5-7y57core_i7-6700texeon_gold_6240rcore_i7-3920xmcore_i5-7260uxeon_e-2278gxeon_silver_4215rcore_i9-10900ecore_i3-9100core_i7-9750hxeon_e-2124core_i5-8250ucore_i5-8600core_i9-11980hkxeon_w-3265core_i5-10500tecore_i5-11500core_i3-6100tecore_i7-11700xeon_platinum_8160xeon_gold_5119tcore_i7-8700bcore_i5-10500txeon_gold_6148fcore_i5-10600core_i5-10310yxeon_w-1250texeon_gold_6208ucore_i3-9100teatom_c3338core_i5-8259uxeon_gold_6242core_i7-10700kxeon_e-2336xeon_d-1627xeon_e-2186mxeon_e-2286mcore_i9-9880hcore_i7-6650ucore_i7-11370hcore_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i5-1035g4core_i5-11600tcore_i7-8650ucore_i5-10200hcore_i9-9900kcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220tcore_i7-5930kcore_i5-10400fcore_i7-1160g7core_i7-7600uxeon_gold_6244xeon_gold_6242rcore_i3-7100exeon_w-2275xeon_w-2265core_i5-9500xeon_gold_6226rcore_i3-7101ecore_i9-9900xeon_bronze_3204core_i9-9820xxeon_d-1567xeon_w-3365core_i7-9850hlcore_i5-8400hcore_i5-6300ucore_m3-6y30core_i7-9750hfxeon_d-2141ixeon_w-2175xeon_silver_4108core_i3-10110ycore_i5-1035g7core_i7-7820hkxeon_e-2254mlxeon_w-11855mcore_i5-8305gcore_i3-6100xeon_gold_6240ycore_i3-9350kxeon_gold_6238lxeon_w-1390cloud_backupcore_i3-1115grecore_i5-11600core_i5-7400tcore_i7-11700fcore_i3-6100tcore_i7-8750hcore_i7-8665ucore_i3-10305txeon_d-2183itcore_i5-8300hcore_i3-8140ucore_i3-8350kcore_i5-10600kcore_i7-8086kxeon_gold_5222core_i7-10850hxeon_d-1523nxeon_gold_6256core_i5-9500teatom_c3958xeon_gold_6130tatom_c3338rxeon_d-1520core_i3-8100bcore_i3-6167ucore_i5-8279uxeon_platinum_8280lcore_m3-8100ycore_i5-7267ucore_i5-8600kcore_i3-7100uxeon_d-1543ncore_i5-6442eqcore_i7-8700txeon_silver_4114xeon_d-1541core_i7-11700txeon_d-1622xeon_platinum_9242core_i7-6700kcore_i7-6970hqxeon_w-2223core_i7-6822eqcore_i3-7300txeon_gold_6238tatom_c3955core_i5-8500core_i9-11900tcore_i5-8210ycore_i7-6785rcore_i7-6560ucore_i7-1060g7core_i5-8257ucore_i7-8569ucore_i7-5820kcore_i9-9900tcore_i7-6900kcore_i7-7700tcore_i9-9980xeatom_c3558core_i5-6685rxeon_w-2133xeon_gold_6250core_i3-9350kfxeon_platinum_8260lxeon_platinum_8270xeon_w-1290tcore_i5-8500tcore_i7-8809gxeon_gold_6226core_i5-11320hxeon_d-1577xeon_gold_6132xeon_e-2314core_i5-6400tcore_i3-10305xeon_d-2166ntcore_i3-7350kxeon_w-1390pcore_i5-10505xeon_d-1539core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i5-7600kcore_i7-6820hkxeon_w-2255xeon_gold_6262vcore_i3-6006ucore_i7-10710ucore_i5-10210ycore_i5-10300hxeon_w-1270texeon_e-2224xeon_gold_5218xeon_w-2145xeon_gold_6238rcore_i3-9100fxeon_platinum_8170core_i9-10900fcore_i3-1125g4xeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_e-2378gcore_i3-8100tcore_i5-9500txeon_w-3223xeon_w-2155xeon_gold_6152core_i3-7102exeon_gold_6150xeon_e-2276gcore_i5-6200uxeon_gold_6222vcore_i7-10700fxeon_d-1571xeon_gold_5122atom_c3758rxeon_gold_6230Intel(R) Processors
CVE-2022-38099
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 9.50%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 15:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in BIOS firmware for some Intel(R) NUC 11 Compute Elements before version EBTGL357.0065 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc11dbbi7_firmwarenuc_11_compute_element_cm11ebc4wnuc_11_compute_element_cm11ebi38wnuc11dbbi9nuc_11_compute_element_cm11ebi716wnuc_11_compute_element_cm11ebv58w_firmwarenuc_11_compute_element_cm11ebv716wnuc_11_compute_element_cm11ebi58w_firmwarenuc_11_compute_element_cm11ebi58wnuc_11_compute_element_cm11ebc4w_firmwarenuc_11_compute_element_cm11ebv58wnuc11dbbi7nuc_11_compute_element_cm11ebi38w_firmwarenuc11dbbi9_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc_11_compute_element_cm11ebv716w_firmwareIntel(R) NUC 11 Compute Elements
CWE ID-CWE-20
Improper Input Validation
CVE-2022-37343
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 8.49%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-atom_c3750xeon_d-2796teatom_c3858_firmwareatom_c3338ratom_c3758_firmwarexeon_d-1627_firmwarexeon_d-2738atom_p5322_firmwareatom_c3830_firmwareatom_c3558r_firmwareatom_c3758rxeon_d-2777nxxeon_d-1718txeon_d-1527xeon_d-2766ntatom_c3950_firmwareatom_c3708xeon_d-1523nxeon_d-2786nte_firmwareatom_p5752_firmwarexeon_d-2786ntexeon_d-1540xeon_d-1746ter_firmwareatom_c3336_firmwareatom_c3955_firmwareatom_p5322xeon_d-1653nxeon_d-2163it_firmwarexeon_d-1528atom_p5742xeon_d-2776ntxeon_d-1637xeon_d-2798ntatom_p5362xeon_d-1715ter_firmwarexeon_d-1733ntxeon_d-1577xeon_d-1521_firmwareatom_c3758r_firmwarexeon_d-1527_firmwareatom_p5742_firmwarexeon_d-2775te_firmwarexeon_d-2141ixeon_d-2766nt_firmwarexeon_d-1557_firmwarexeon_d-1541atom_c3708_firmwarexeon_d-1543n_firmwarexeon_d-1518xeon_d-1633n_firmwarexeon_d-1714xeon_d-1722ne_firmwarexeon_d-2799_firmwarexeon_d-2745nx_firmwarexeon_d-1747ntexeon_d-2143itxeon_d-2757nx_firmwarexeon_d-2163itxeon_d-1653n_firmwarexeon_d-1734ntxeon_d-1734nt_firmwarexeon_d-1735tr_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_d-1747nte_firmwarexeon_d-1553natom_c3538xeon_d-1567_firmwareatom_c3808_firmwarexeon_d-1571_firmwareatom_c3955xeon_d-1567xeon_d-2777nx_firmwarexeon_d-1633natom_c3850xeon_d-1548xeon_d-2173it_firmwareatom_p5332xeon_d-1649nxeon_d-1529atom_c3308_firmwarexeon_d-1746teratom_p5731atom_c3436l_firmwarexeon_d-1531_firmwarexeon_d-1518_firmwareatom_c3338r_firmwareatom_c3750_firmwareatom_p5752xeon_d-2123it_firmwareatom_p5332_firmwarexeon_d-2738_firmwareatom_p5721xeon_d-2757nxxeon_d-1713ntxeon_d-1715teratom_c3508xeon_d-1520xeon_d-1571xeon_d-2752terxeon_d-1736_firmwarexeon_d-2799atom_c3338xeon_d-2146nt_firmwareatom_p5352xeon_d-2795ntxeon_d-2173itatom_c3508_firmwarexeon_d-1739_firmwarexeon_d-2123itxeon_d-1736ntxeon_d-2177nt_firmwarexeon_d-1713nt_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwarexeon_d-2796ntxeon_d-2798nt_firmwarexeon_d-1623nxeon_d-2779xeon_d-1531xeon_d-1602xeon_d-1712tratom_p5731_firmwarexeon_d-1533nxeon_d-2796te_firmwarexeon_d-1539xeon_d-1722nexeon_d-1713ntexeon_d-2142itxeon_d-1718t_firmwarexeon_d-2752ter_firmwarexeon_d-1622_firmwarexeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_d-2146ntatom_p5342_firmwareatom_c3436lxeon_d-1577_firmwarexeon_d-2796nt_firmwareatom_p5931bxeon_d-2145nt_firmwarexeon_d-1702_firmwarexeon_d-1749nt_firmwareatom_c3538_firmwareatom_p5342atom_c3858xeon_d-2161ixeon_d-2141i_firmwarexeon_d-1726_firmwareatom_c3558_firmwarexeon_d-2187ntatom_p5352_firmwarexeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2798nxatom_c3338_firmwarexeon_d-1732te_firmwarexeon_d-2776nt_firmwarexeon_d-2712t_firmwarexeon_d-2745nxxeon_d-1623n_firmwareatom_p5931b_firmwarexeon_d-1748teatom_c3336atom_c3958xeon_d-1548_firmwareatom_c3850_firmwarexeon_d-1713nte_firmwareatom_c3808xeon_d-2183itxeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1622xeon_d-1739atom_p5962b_firmwarexeon_d-1543nxeon_d-1559_firmwarexeon_d-1528_firmwarexeon_d-1539_firmwarexeon_d-1559xeon_d-1702xeon_d-1521xeon_d-2145ntatom_c3950xeon_d-1748te_firmwarexeon_d-1749ntxeon_d-1637_firmwarexeon_d-1529_firmwarexeon_d-1712tr_firmwarexeon_d-1540_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_d-2798nx_firmwareatom_c3558atom_p5362_firmwareatom_p5721_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwareatom_c3308xeon_d-2143it_firmwarexeon_d-2753ntxeon_d-1736xeon_d-2775texeon_d-1557atom_p5962bxeon_d-1735trxeon_d-1513n_firmwarexeon_d-1714_firmwarexeon_d-2795nt_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_d-2752ntexeon_d-1523n_firmwarexeon_d-1726xeon_d-2753nt_firmwarexeon_d-2177ntatom_c3758atom_c3958_firmwarexeon_d-1553n_firmwareatom_c3558ratom_c3830Intel(R) Processors
CWE ID-CWE-284
Improper Access Control
CVE-2023-32617
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-02 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7i5bnknuc_7_home_nuc7i3bnhxfnuc_board_nuc7i3bnbnuc_7_home_nuc7i3bnhxf_firmwarenuc_kit_nuc7i3bnhx1_firmwarenuc_kit_nuc7i5bnh_firmwarenuc_board_nuc8cchbnuc_kit_nuc7i5bnk_firmwarenuc_kit_nuc7i7bnhx1_firmwarecompute_stick_stk2mv64cc_firmwarenuc_7_enthusiast_nuc7i7bnkq_firmwarenuc_8_rugged_kit_nuc8cchkrn_firmwarenuc_8_rugged_kit_nuc8cchkrnuc_kit_nuc7i5bnhx1nuc_kit_nuc6cayh_firmwarenuc_7_home_nuc7i5bnkpnuc_7_enthusiast_nuc7i7bnhxg_firmwarenuc_kit_nuc7i5bnhx1_firmwarenuc_kit_nuc7i3bnk_firmwarenuc_kit_nuc7i7bnhx1nuc_board_nuc8cchb_firmwarenuc_7_home_nuc7i5bnhxfnuc_8_rugged_board_nuc8cchbn_firmwarenuc_kit_nuc7i5bnhnuc_8_rugged_kit_nuc8cchkr_firmwarenuc_board_nuc7i5bnbnuc_kit_nuc7i3bnknuc_kit_nuc6cays_firmwarenuc_board_nuc7i5bnb_firmwarenuc_board_nuc7i3bnb_firmwarenuc_7_home_nuc7i5bnkp_firmwarenuc_7_enthusiast_nuc7i7bnhxgnuc_kit_nuc7i7bnhnuc_kit_nuc7i3bnh_firmwarenuc_kit_nuc7i3bnhx1nuc_7_home_nuc7i5bnhxf_firmwarecompute_stick_stk2mv64ccnuc_kit_nuc6caysnuc_kit_nuc7i7bnh_firmwarenuc_8_rugged_board_nuc8cchbnnuc_board_nuc7i7bnb_firmwarenuc_8_rugged_kit_nuc8cchkrnnuc_7_enthusiast_nuc7i7bnkqnuc_kit_nuc7i3bnhnuc_board_nuc7i7bnbnuc_kit_nuc6cayhIntel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-36339
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.05%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) NUC 8 Compute Element, Intel(R) NUC 11 Compute Element, Intel(R) NUC 12 Compute Element may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-cm11ebi58w_firmwarecm8i3cb4ncm11ebc4wcm11ebi38w_firmwarecm8pcb4r_firmwareelm12hbccm8pcb4relm12hbc_firmwareelm12hbi5_firmwareelm12hbi3_firmwarecm11ebi716welm12hbi5elm12hbi3cm8i3cb4n_firmwarecm11ebi716w_firmwarecm8i7cb8n_firmwarecm8i5cb8n_firmwarecm11ebi38wcm8ccb4r_firmwarecm8ccb4rcm8i7cb8nelm12hbi7_firmwareelm12hbi7cm11ebi58wcm11ebc4w_firmwarecm8i5cb8nIntel(R) NUC 8 Compute Element, Intel(R) NUC 11 Compute Element, Intel(R) NUC 12 Compute Element
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0107
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 36.92%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-core_i7-6870hqxeon_e-2286gatom_c3950core_i3-9100ecore_i3-10100xeon_silver_4109tcore_i3-7300core_i5-1038ng7core_i5-11400core_i9-7900xcore_i7-10510yxeon_d-1548xeon_bronze_3106xeon_platinum_8260yxeon_d-1633nxeon_d-1653nxeon_platinum_8153xeon_e-2246gcore_i5-6350hqcore_i9-9960xcore_i3-6300txeon_e-2374gxeon_gold_5218txeon_w-2123core_i5-11260hxeon_e-2236xeon_gold_5218nxeon_w-1270exeon_d-1531core_i5-6500tcore_i5-7500core_i5-6260uxeon_e-2278gecore_i5-7440hqxeon_platinum_8156core_i7-8709gatom_c3758xeon_d-2177ntxeon_gold_6142fxeon_silver_4214ycore_i9-11900kfxeon_w-10855mxeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_w-3235core_i9-10900txeon_e-2126gcore_i5-8200ycore_i7-10700tecore_i9-10900kxeon_gold_5220rcore_i5-8260ucore_i5-11400fxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-1185g7core_i7-9700kfcore_i9-10900xxeon_platinum_9221xeon_d-2142itcore_m7-6y75xeon_w-3335core_i9-11900kcore_i5-10500hxeon_w-11555mrecore_i5-10600kfxeon_e-2146gcore_i3-1005g1core_i7-1068ng7xeon_silver_4112xeon_gold_6140xeon_d-1637core_i5-9400fcore_i3-10100ecore_i7-6800kcore_i7-7560uatom_c3538core_i7-9700txeon_gold_5120xeon_gold_6238core_i5-11600kfcore_i5-7600tcore_i7-4820kxeon_d-1602core_i5-8365uatom_c3508xeon_w-2245core_i5-9600kfxeon_d-2145ntxeon_platinum_8256xeon_gold_6130fxeon_e-2276mxeon_e-2224gcore_i5-8269uxeon_d-2163itcore_i3-1120g4core_i7-3930kcore_i5-11400hcore_i9-11900hxeon_d-1623ncore_i7-1185g7ecore_i7-10810ucore_i3-10300txeon_d-1521core_i3-8100core_i3-8145uecore_i5-1130g7core_i9-11900core_i5-6585rcore_i5-9600kxeon_gold_6144core_i5-8265ucore_i7-10700tcore_i9-9900kfcore_i3-7100core_m5-6y54core_i5-6300hqxeon_gold_5118core_i5-1145g7core_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kxeon_silver_4114tcore_i5-8500bxeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_gold_6212ucore_i5-6600core_i3-8100hcore_i7-8706gcore_i3-6300core_i9-11900fxeon_silver_4215xeon_gold_6230ncore_i9-10920xcore_i9-11950hatom_c3750xeon_gold_6138pcore_i7-1195g7core_i5-10310ucore_i9-10885hcore_i7-8557ucore_i5-7440eqcore_i3-6320xeon_e-2386gcore_i7-1165g7core_m3-7y32core_i7-11850hexeon_e-2134xeon_w-1290tecore_i5-1145g7ecore_i5-6440eqcore_i5-1030g7core_i9-10980hkxeon_e-2176mxeon_w-11155mlexeon_gold_6130xeon_silver_4210txeon_e-2274gxeon_gold_6136core_i5-6287ucore_i7-8500yxeon_w-3323core_i5-9600tatom_c3558rcore_i9-7960xxeon_w-1370atom_c3808core_i5-9600xeon_d-1559xeon_gold_6134xeon_w-3375xeon_e-2174gcore_i5-8600txeon_d-1537xeon_gold_5218bxeon_gold_6128core_i7-1180g7xeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_gold_6146xeon_w-1370pxeon_gold_6254core_i3-10320xeon_gold_5218rcore_i3-10105fxeon_w-2235core_i3-6098pcore_i5-6400xeon_d-1649nxeon_w-3175xcore_i7-10875hxeon_w-3225core_i3-7101tecore_i7-7700xeon_d-1540core_i3-11100hecore_i5-10400hxeon_gold_6246rcore_i5-7300hqxeon_d-1513nxeon_w-10885mxeon_gold_6126xeon_d-1527core_i9-9940xcore_i9-9900xcore_i5-6600kcore_i9-7940xcore_i7-9700exeon_e-2254mecore_i7-9700tecore_i7-6700txeon_gold_6248rxeon_silver_4214xeon_w-2125xeon_platinum_9222core_i3-10105tcore_i5-11300hcore_i5-6500texeon_gold_5220sxeon_platinum_8260core_i5-6500core_i3-1000g4core_i3-9100hlcore_i9-10900kfcore_i3-10100tatom_c3858xeon_d-2146ntxeon_e-2144gcore_i9-9980hkxeon_w-11555mlecore_i5-11500hexeon_e-2244gcore_i3-7100tcore_i3-6102exeon_w-1390txeon_silver_4216core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqxeon_platinum_8180xeon_platinum_8276lxeon_gold_6138tcore_i7-7740xcore_i7-11375hcore_i7-7y75core_i7-8559ucore_i5-9500eatom_c3850core_i5-11500txeon_e-2124gcore_i7-4930kcore_i5-9400core_i7-4960xcore_i7-5960xcore_i7-6600uxeon_gold_6138core_i7-1185grecore_i3-10325xeon_gold_6138fxeon_e-2356gcore_i7-8700xeon_d-1557core_i3-7130ucore_i5-8400atom_c3436lxeon_w-3245mxeon_e-2334core_i7\+8700core_i7-9850hatom_c3708xeon_w-1350core_i5-7600core_i9-10980xecore_i7-6500ucore_i5-1035g1xeon_w-11865mlecore_i7-11850hxeon_w-1290xeon_e-2186gxeon_silver_4210core_i3-10110uxeon_gold_6234atom_c3336core_i7-4930mxxeon_w-1350pcore_i9-10900xeon_w-1250core_i5-9400tcore_i5-7360ucore_i5-7300ucore_i7-11800hcore_i3-10300core_i5-6600tcore_i7-8565uxeon_gold_6154xeon_silver_4110core_i7-7700katom_c3830xeon_platinum_8176core_i7-10870hcore_i3-10100fcore_i7-10510uxeon_bronze_3104xeon_w-1290pcore_i5-8310yxeon_gold_5217core_i5-6440hqcore_i7-6850kxeon_gold_5120txeon_e-2324gxeon_w-3245core_i7-6660ucore_i9-7980xecore_i3-6100exeon_gold_6210ucore_i5-7200uxeon_gold_5115core_i7-9700fxeon_w-3345core_i5-10210ucore_i7-6820hqxeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500core_i5-8400bcore_i3-7100hcore_i7-8850hxeon_gold_5215core_i3-6100ucore_i9-9900kscore_i9-7920xxeon_w-11865mrecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i5-6360ucore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_e-2378core_i7-7820xcore_i3-1115g4ecore_i5-10600tcore_i5-7640xcore_i7-7800xxeon_w-3275mxeon_gold_6250lcore_i5-9400hxeon_gold_6209ucore_i9-9920xxeon_platinum_8253xeon_gold_6252ncore_i7-7660ucore_i3-9320xeon_platinum_8158core_i7-7700hqatom_c3308xeon_platinum_8280core_i5-6402pcore_m3-7y30xeon_w-11155mrexeon_gold_6252xeon_w-2135core_i3-10105core_i5-11400tcore_i7-11700kcore_i7-4940mxcore_i7-8550uxeon_e-2276mlxeon_gold_6246xeon_silver_4214rcore_i9-10940xcore_i7-9700core_i7-6700hqcore_i3-8300core_i7-9850hexeon_gold_6230rcore_i7-10700kfcore_i5-8400tcore_i5-7500txeon_d-2187ntxeon_silver_4116tcore_i7-1065g7xeon_d-1518core_i7-9800xxeon_silver_4208core_i5-6267ucore_i3-1000g1xeon_gold_6126txeon_w-2225xeon_silver_4116xeon_e-2276mecore_i5-7y54xeon_w-1250ecore_i5-7400core_i7-6950xfas\/aff_biosxeon_platinum_8160fxeon_platinum_8164core_i7-6567uxeon_platinum_8176fxeon_gold_5215lcore_i5-7287uxeon_platinum_8168core_i7-3970xcore_i7-3960xcore_i7-11600hcore_i7-7920hqcore_i7-10700core_i5-1145grecore_i3-7020uxeon_d-1533nxeon_gold_6240lxeon_w-3265mxeon_gold_6248core_i5-1135g7xeon_w-2195xeon_e-2136core_i5-9300hfxeon_w-1270pcore_i3-1115g4xeon_gold_6258rxeon_platinum_9282core_i3-8145ucore_i3-9300core_i5-10400xeon_d-2173itxeon_d-2161icore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_d-2123itxeon_platinum_8160tcore_i3-8109ucore_i5-8365uexeon_gold_6142core_i3-1110g4xeon_bronze_3206rxeon_gold_6148core_i7-3820xeon_w-3275xeon_gold_6240core_i3-7320core_i7-10700ecore_i5-8350ucore_i7-3940xmxeon_gold_5220xeon_gold_6126fcore_i3-10100tecore_m5-6y57xeon_e-2388gcore_i7-11390hxeon_platinum_8268xeon_e-2226gcore_i5-7y57core_i7-6700texeon_gold_6240rcore_i7-3920xmcore_i5-7260uxeon_e-2278gxeon_silver_4215rcore_i9-10900ecore_i3-9100core_i7-9750hxeon_e-2124core_i5-8250ucore_i5-8600core_i9-11980hkxeon_w-3265core_i5-10500tecore_i5-11500core_i3-6100tecore_i7-11700xeon_platinum_8160xeon_gold_5119tcore_i7-8700bcore_i5-10500txeon_gold_6148fcore_i5-10600core_i5-10310yxeon_w-1250texeon_gold_6208ucore_i3-9100teatom_c3338core_i5-8259uxeon_gold_6242core_i7-10700kxeon_e-2336xeon_d-1627xeon_e-2186mxeon_e-2286mcore_i9-9880hcore_i7-6650ucore_i7-11370hcore_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i5-1035g4core_i5-11600tcore_i7-8650ucore_i5-10200hcore_i9-9900kcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220tcore_i7-5930kcore_i5-10400fcore_i7-1160g7core_i7-7600uxeon_gold_6244xeon_gold_6242rcore_i3-7100exeon_w-2275xeon_w-2265core_i5-9500xeon_gold_6226rcore_i3-7101ecore_i9-9900xeon_bronze_3204core_i9-9820xxeon_d-1567xeon_w-3365core_i7-9850hlcore_i5-8400hcore_i5-6300ucore_m3-6y30core_i7-9750hfxeon_d-2141ixeon_w-2175xeon_silver_4108core_i3-10110ycore_i5-1035g7core_i7-7820hkxeon_e-2254mlxeon_w-11855mcore_i5-8305gcore_i3-6100xeon_gold_6240ycore_i3-9350kxeon_gold_6238lxeon_w-1390cloud_backupcore_i3-1115grecore_i5-11600core_i5-7400tcore_i7-11700fcore_i3-6100tcore_i7-8750hcore_i7-8665ucore_i3-10305txeon_d-2183itcore_i5-8300hcore_i3-8140ucore_i3-8350kcore_i5-10600kcore_i7-8086kxeon_gold_5222core_i7-10850hxeon_d-1523nxeon_gold_6256core_i5-9500teatom_c3958xeon_gold_6130tatom_c3338rxeon_d-1520core_i3-8100bcore_i3-6167ucore_i5-8279uxeon_platinum_8280lcore_m3-8100ycore_i5-7267ucore_i5-8600kcore_i3-7100uxeon_d-1543ncore_i5-6442eqcore_i7-8700txeon_silver_4114xeon_d-1541core_i7-11700txeon_d-1622xeon_platinum_9242core_i7-6700kcore_i7-6970hqxeon_w-2223core_i7-6822eqcore_i3-7300txeon_gold_6238tatom_c3955core_i5-8500core_i9-11900tcore_i5-8210ycore_i7-6785rcore_i7-6560ucore_i7-1060g7core_i5-8257ucore_i7-8569ucore_i7-5820kcore_i9-9900tcore_i7-6900kcore_i7-7700tcore_i9-9980xeatom_c3558core_i5-6685rxeon_w-2133xeon_gold_6250core_i3-9350kfxeon_platinum_8260lxeon_platinum_8270xeon_w-1290tcore_i5-8500tcore_i7-8809gxeon_gold_6226core_i5-11320hxeon_d-1577xeon_gold_6132xeon_e-2314core_i5-6400tcore_i3-10305xeon_d-2166ntcore_i3-7350kxeon_w-1390pcore_i5-10505xeon_d-1539core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i5-7600kcore_i7-6820hkxeon_w-2255xeon_gold_6262vcore_i3-6006ucore_i7-10710ucore_i5-10210ycore_i5-10300hxeon_w-1270texeon_e-2224xeon_gold_5218xeon_w-2145xeon_gold_6238rcore_i3-9100fxeon_platinum_8170core_i9-10900fcore_i3-1125g4xeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_e-2378gcore_i3-8100tcore_i5-9500txeon_w-3223xeon_w-2155xeon_gold_6152core_i3-7102exeon_gold_6150xeon_e-2276gcore_i5-6200uxeon_gold_6222vcore_i7-10700fxeon_d-1571xeon_gold_5122atom_c3758rxeon_gold_6230Intel(R) Processors
CWE ID-CWE-252
Unchecked Return Value
CVE-2022-36374
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 23.78%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmi Windows 5.27.03.0003 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel CorporationMicrosoft Corporation
Product-windowslinux_kernelaptio_v_uefi_firmware_integrator_toolsIntel(R) Aptio* V UEFI Firmware Integrator Toolsintel_aptio_v_uefi_firmware_integrator_tools
CWE ID-CWE-284
Improper Access Control
CVE-2021-0067
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.18%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:07
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

 Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_8_compute_element_cm8pcbnuc_10_performance_kit_nuc10i5fnhf_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_8_mainstream-g_kit_nuc8i7inh_firmwarenuc_8_pro_board_nuc8i3pnb_firmwarenuc_11_performance_kit_nuc11pahi3nuc_8_business\,_a_mini_pc_with_windows_10_nuc8i7hnkqcnuc_m15_laptop_kit_lapbc710_firmwarenuc_8_mainstream-g_kit_nuc8i5inhnuc_10_performance_mini_pc_nuc10i5fnkpanuc_11_pro_kit_nuc11tnhi30lnuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvanuc_11_pro_kit_nuc11tnhi70qnuc_10_performance_kit_nuc10i5fnh_firmwarenuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarenuc_9_pro_compute_element_nuc9v7qnbnuc_10_performance_mini_pc_nuc10i7fnkpanuc_10_performance_mini_pc_nuc10i5fnhca_firmwarenuc_11_pro_kit_nuc11tnhi70q_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inh_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnhi7nuc_11_pro_kit_nuc11tnhi50lnuc_11_pro_board_nuc11tnbi7nuc_10_performance_kit_nuc10i7fnhcnuc_10_performance_mini_pc_nuc10i3fnhfa_firmwarenuc_10_performance_kit_nuc10i7fnknuc_10_performance_mini_pc_nuc10i5fnhjanuc_kit_nuc8i7hvk_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_m15_laptop_kit_lapbc710nuc_11_performance_kit_nuc11paki5_firmwarenuc_10_performance_mini_pc_nuc10i5fnhja_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_10_performance_mini_pc_nuc10i3fnhja_firmwarenuc_10_performance_kit_nuc10i3fnhfnuc_10_performance_kit_nuc10i3fnk_firmwarenuc_10_performance_kit_nuc10i5fnhj_firmwarenuc_11_pro_kit_nuc11tnhi3_firmwarenuc_10_performance_kit_nuc10i7fnh_firmwarenuc_8_pro_kit_nuc8i3pnknuc_8_pro_board_nuc8i3pnbnuc_11_pro_board_nuc11tnbi5nuc_7_essential\,_a_mini_pc_with_windows_10_nuc7cjysal_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc_10_performance_mini_pc_nuc10i5fnhcanuc_10_performance_kit_nuc10i5fnhnuc_8_compute_element_cm8pcb_firmwarenuc_9_pro_compute_element_nuc9vxqnbnuc_10_performance_kit_nuc10i7fnk_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inhnuc_11_performance_kit_nuc11pahi5_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_8_compute_element_cm8ccbnuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_11_performance_kit_nuc11paki3nuc_11_pro_kit_nuc11tnhi30pnuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_8_rugged_kit_nuc8cchkr_firmwarenuc_10_performance_kit_nuc10i5fnkp_firmwarenuc_10_performance_kit_nuc10i5fnkpnuc_11_performance_mini_pc_nuc11paqi70qanuc_10_performance_mini_pc_nuc10i7fnkpa_firmwarenuc_m15_laptop_kit_lapbc510nuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmwarenuc_10_performance_kit_nuc10i5fnknuc_10_performance_kit_nuc10i7fnkpnuc_10_performance_mini_pc_nuc10i7fnhjanuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_10_performance_kit_nuc10i3fnhf_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_10_performance_mini_pc_nuc10i3fnhfanuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmwarenuc_11_pro_kit_nuc11tnhi70lnuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_8_compute_element_cm8i5cbnuc_kit_nuc7pjyhnuc_11_enthusiast_kit_nuc11phki7cnuc_11_pro_kit_nuc11tnki3_firmwarenuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnhi3nuc_8_pro_kit_nuc8i3pnhnuc_11_performance_kit_nuc11pahi3_firmwarenuc_8_enthusiast\,_a_mini_pc_with_windows_10_nuc8i7hvkvawnuc_10_performance_kit_nuc10i7fnhnuc_8_compute_element_cm8i3cb_firmwarenuc_8_business\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_board_nuc8cchbnuc_kit_nuc8i7hnknuc_11_pro_board_nuc11tnbi3nuc_11_compute_element_cm11ebi58wnuc_11_performance_mini_pc_nuc11paqi50wanuc_10_performance_kit_nuc10i3fnknuc_kit_nuc8i7hvknuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_board_nuc8cchb_firmwarenuc_11_performance_kit_nuc11pahi7nuc_10_performance_kit_nuc10i5fnhjnuc_kit_nuc8i7hnk_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_10_performance_mini_pc_nuc10i7fnhaanuc_8_compute_element_cm8i3cbnuc_10_performance_kit_nuc10i5fnhfnuc_11_pro_kit_nuc11tnhi5nuc_10_performance_kit_nuc10i3fnhnuc_10_performance_mini_pc_nuc10i7fnhja_firmwarenuc_kit_nuc7cjyhnuc_11_compute_element_cm11ebc4nuc_10_performance_kit_nuc10i7fnkp_firmwarenuc_8_pro_kit_nuc8i3pnh_firmwarenuc_11_pro_kit_nuc11tnki7nuc_10_performance_mini_pc_nuc10i7fnhaa_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_10_performance_kit_nuc10i3fnh_firmwarenuc_11_performance_kit_nuc11paki5nuc_10_performance_mini_pc_nuc10i5fnkpa_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_performance_kit_nuc11paki3_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc_8_pro_kit_nuc8i3pnk_firmwarenuc_11_compute_element_cm11ebc4_firmwarenuc_8_mainstream-g_kit_nuc8i7inhnuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_10_performance_kit_nuc10i7fnhc_firmwarenuc_11_compute_element_cm11ebi38wnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_10_performance_kit_nuc10i5fnk_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_performance_kit_nuc11paki7nuc_8_rugged_kit_nuc8cchkrnuc_kit_nuc7cjyh_firmwarenuc_kit_nuc7pjyh_firmwarenuc_11_performance_kit_nuc11pahi5nuc_11_performance_kit_nuc11pahi7_firmwarenuc_8_compute_element_cm8i7cb_firmwarenuc_11_compute_element_cm11ebi716wnuc_10_performance_mini_pc_nuc10i3fnhjanuc_11_pro_kit_nuc11tnki5nuc_9_pro_kit_nuc9v7qnxnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_pro_kit_nuc11tnhi30l_firmwarenuc_11_pro_kit_nuc11tnhi50w_firmwarenuc_11_pro_kit_nuc11tnki3nuc_7_essential\,_a_mini_pc_with_windows_10_nuc7cjysalnuc_8_compute_element_cm8i7cbnuc_11_pro_kit_nuc11tnhi50wnuc_m15_laptop_kit_lapbc510_firmwareIntel(R) NUCs
CVE-2023-32662
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.58%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-30 Aug, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in some Intel Battery Life Diagnostic Tool installation software before version 2.2.1 may allow a privilaged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-battery_life_diagnostic_toolIntel Battery Life Diagnostic Tool installation software
CWE ID-CWE-285
Improper Authorization
CVE-2020-8700
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.24% / 46.30%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:50
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-xeon_platinum_8153xeon_e3-1230_v5xeon_e3-1558l_v5xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7e-series_bioscore_i7-1160g7xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-1660_v4xeon_e7-8891_v4xeon_platinum_8164xeon_e-2226gxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_w-2255xeon_d-1518core_i7-11700core_i7-6822eqcore_i7-6700texeon_e3-1501l_v6xeon_gold_6262vcore_i7-11370hxeon_e5-2683_v4xeon_platinum_8168core_i7-7600uxeon_e5-2608l_v4xeon_e5-2640_v3xeon_e-2224xeon_gold_5218xeon_e5-1620_v4core_i7-11850hxeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122xeon_w-2245xeon_d-1587xeon_e5-2699_v3xeon_d-2191xeon_gold_6248rcore_i7-7820hkxeon_e5-2689_v4xeon_e7-8870_v4xeon_w-1290tcore_i5-l16g7xeon_gold_6240core_i7-6970hqxeon_gold_6262xeon_platinum_8156xeon_e-2136core_i7-10510ucore_i7-1060g7xeon_w-2265xeon_e5-2667_v4xeon_platinum_8274xeon_w-10855mxeon_gold_6126fxeon_d-1539xeon_e3-1535m_v5xeon_e5-1680_v4core_i7-7700xeon_gold_5220rxeon_d-2146ntxeon_e3-1268l_v5xeon_platinum_8160fxeon_e5-2658_v3xeon_e5-4660_v4core_i7-8750hxeon_e3-1501m_v6xeon_gold_6250lxeon_gold_6210uxeon_d-2187ntxeon_platinum_8160mcore_i7-10700fxeon_d-2166ntxeon_e3-1270_v6xeon_e-2286mxeon_e3-1505m_v5core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_e5-2630l_v4xeon_w-2195xeon_e5-4667_v4xeon_e5-2628l_v4xeon_e-2276gxeon_e5-2685_v3xeon_w-1390xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622core_i7-8809gxeon_e5-4667_v3xeon_platinum_8160hcore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pxeon_silver_4208xeon_e3-1585_v5xeon_w-2104xeon_e5-2623_v4core_i7-6560uxeon_w-2123xeon_gold_5220sxeon_w-3275mxeon_platinum_9282xeon_e5-2683_v3core_i7-10700exeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-11700kfcloud_backupcore_i7-10870hxeon_e7-8867_v4xeon_bronze_3106xeon_w-2102xeon_e-2274gcore_i7-10700kxeon_e-2278gelxeon_d-1540xeon_e3-1280_v6hci_compute_node_biosxeon_e5-2698_v4xeon_platinum_8160tcore_i7-11700kxeon_d-1528xeon_silver_4214rcore_i7-6500uxeon_e5-2697_v3xeon_e5-4627_v4xeon_e-2124core_i7-10710uxeon_d-2141icore_i7-10700kfxeon_d-1541xeon_e5-2660_v4xeon_e7-4830_v4xeon_w-1250texeon_platinum_8268xeon_platinum_8176mxeon_e-2276mecore_i7-8565uxeon_gold_5222xeon_e5-2687w_v4xeon_e5-1603_v3core_i7-7560uxeon_gold_5117fxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e5-2428l_v3core_i7-6700hqxeon_e7-4809_v4xeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fxeon_gold_6132biosxeon_e5-2618l_v4xeon_w-2155xeon_gold_6137core_i7-7500ucore_i7-8550uxeon_e-2224gxeon_w-2135xeon_d-1623nxeon_w-2145xeon_e-2226gecore_i7-6650uxeon_gold_6142core_i7-10610ucore_i7-8500ycore_i7-7567uxeon_silver_4214xeon_w-1390pxeon_d-2161ixeon_silver_4210rxeon_d-1632core_i7-7820hqxeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_gold_5218bxeon_e5-2648l_v3xeon_gold_6142mxeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1240_v5xeon_e5-2650_v3xeon_gold_6222core_i7-6567uxeon_e5-2648l_v4xeon_e5-4620_v4xeon_e7-8855_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5xeon_w-1290texeon_e3-1225_v5xeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223xeon_gold_5120txeon_w-3175xxeon_gold_6134xeon_gold_6162xeon_e5-2628l_v3xeon_e-2254mexeon_w-3235core_i7-7y75xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133core_i7-6700xeon_d-1557xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6148xeon_e3-1505m_v6xeon_gold_6144xeon_gold_6140mxeon_gold_5220txeon_platinum_8276lxeon_w-2223xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_gold_6129xeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-6600ucore_i7-8706gxeon_gold_6126tcore_i7-11700fxeon_platinum_8165xeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_e-2236xeon_w-1370core_i7-10850hxeon_e5-1603_v4core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i7-8700core_i7-7700tcore_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_gold_6246core_i7-8086kxeon_w-2295core_i7-6770hqcore_i7-8700kxeon_e5-2603_v3fas_biosxeon_e-2134xeon_e5-2667_v3xeon_gold_5215xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_w-1390txeon_w-1270xeon_e3-1225_v6xeon_platinum_8284xeon_silver_4109tcore_i7-10510yxeon_e3-1240l_v5xeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5215lxeon_silver_4215rxeon_e5-2658_v4xeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_silver_4210txeon_e5-2680_v3xeon_gold_6212uxeon_e3-1205_v6core_i7-7700hqxeon_w-1270texeon_silver_4114xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5core_i7-6870hqxeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_gold_6250xeon_d-2173itcore_i7-11700txeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_w-3265mxeon_d-1627xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_5218txeon_e5-2697a_v4xeon_gold_6150xeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i7-10700core_i9-10920xxeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_gold_6126xeon_e3-1260l_v5xeon_w-1250exeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4core_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2176gxeon_gold_6142fcore_i3-l13g4core_i7-8709gxeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_e-2104gxeon_platinum_8260core_i7-8557ucore_i7-8700txeon_platinum_9242core_i7-6820hqxeon_platinum_8280lxeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_gold_5119tcore_i7-1180g7core_i7-6700tcore_i7-6920hqxeon_gold_6246rxeon_e3-1230_v6xeon_gold_5217xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_w-3245xeon_gold_5120core_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3core_i7-10700texeon_e-2288gxeon_d-1653nxeon_gold_5220xeon_e-2234xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269yxeon_silver_4114tcore_i7-6700kxeon_gold_6240yxeon_e5-4669_v4aff_biosxeon_gold_6154xeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208uxeon_e7-8893_v4xeon_w-1290exeon_e5-1650_v3xeon_w-3275core_i7-11700bxeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633ncore_i7-7820eqxeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_e5-2695_v3xeon_gold_6248xeon_e3-1220_v6xeon_w-1370pxeon_platinum_8280xeon_e-2186mxeon_e5-1660_v3xeon_d-1520xeon_e-2176mcore_i7-6785rcore_i7-6820hkxeon_platinum_8256xeon_gold_6152core_i7-1060ng7xeon_e5-2623_v3xeon_platinum_8158xeon_e5-2658a_v3xeon_e5-2418l_v3xeon_w-1290pxeon_e-2286gxeon_gold_6222vxeon_platinum_8176xeon_gold_6242xeon_e3-1275_v6xeon_d-1531core_i7-10810uxeon_e3-1575m_v5xeon_e-2278gxeon_e5-2650_v4xeon_platinum_8260yxeon_e3-1505l_v5xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_platinum_8180mcore_i7-8850hxeon_gold_5118xeon_w-2235xeon_e5-2695_v4xeon_gold_6130fxeon_w-11955mcore_i7-6820eqxeon_gold_6134mcore_i9-10900xxeon_platinum_8276xeon_gold_6238txeon_e3-1235l_v5xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-4628l_v4xeon_e7-8860_v4xeon_w-1350xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_w-1290xeon_platinum_8176fxeon_d-1524nsolidfire_biosxeon_gold_6240rxeon_w-10885mxeon_w-2275xeon_d-1543nxeon_gold_6226xeon_e-2144gxeon_gold_6256xeon_d-1521xeon_w-1350pxeon_gold_6230rcore_i7-8569uxeon_gold_6252xeon_e5-4640_v3core_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_platinum_8170mxeon_e-2146gxeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8742
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.65%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:15
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc5i3ryhsnnuc7i7dnbenuc7i5bnhx1nuc7i5bnhxfcd1c32gk_firmwarecd1c64gknuc7i5dnkpcnuc5i3mybe_firmwarenuc8i7hvknuc7i5dnbe_firmwarede3815tykhe_firmwarenuc7i3dnktc_firmwarenuc8i7hnk_firmwarenuc7i5dnbenuc6i7kyknuc5i5ryhsnuc5i3ryk_firmwarenuc8i5behfa_firmwarenuc7i3bnb_firmwarenuc7pjyhnuc7i5dnhe_firmwarenuc7i3bnhx1_firmwarenuc5ppyh_firmwarenuc8i5behs_firmwarenuc8i5behfanuc5i7ryh_firmwarenuc8i7hvkvaw_firmwarenuc5i3ryhnuc8i7hvkvanuc6caysnuc5i5mybe_firmwarenuc5i5myhenuc7i3bnbnuc7i3bnk_firmwarenuc5i3myhe_firmwarenuc5i5ryk_firmwarenuc8i7hnkqcnuc7i3dnke_firmwarenuc8i3behfa_firmwarenuc7i3bnhnuc7i3bnknuc5i5mybenuc7pjyh_firmwarestk2mv64cc_firmwarenuc7i3bnhxf_firmwarenuc7i7bnhnuc5i5ryh_firmwarenuc8i3behnuc8i7hnknuc8i5bek_firmwarenuc5i3ryhs_firmwarenuc7i3bnh_firmwarenuc8i7beh_firmwarenuc5pgyh_firmwarenuc5i5rykcd1p64gknuc7i3dnhncnuc7i5bnkpnuc8i5bekpa_firmwarenuc7i3dnhe_firmwarenuc5i7ryhnuc6cayhde3815tybe_firmwarenuc7cjysalnuc7i5dnkenuc7i7bnkqnuc5i3ryhsn_firmwarenuc8i7hnkqc_firmwarenuc7i7bnhxgcd1c64gk_firmwarestk2mv64ccnuc6i7kyk_firmwarenuc7i3dnhnc_firmwarenuc6cays_firmwarenuc8i7hvk_firmwarenuc7i5dnke_firmwarenuc5i5ryhs_firmwarenuc8i7behga_firmwarenuc8i3behs_firmwarenuc8i7bekqa_firmwarenuc7i5bnknuc7i3dnbenuc7cjyhnuc7i5bnhxf_firmwarenuc7i5bnhnuc5i3mybenuc8i7bek_firmwarede3815tykhenuc7i3dnhenuc5i3ryhsnuc8i7behganuc7i3dnktcnuc7i7dnbe_firmwarenuc7i3dnbe_firmwarenuc8i5beh_firmwarenuc5i3ryknuc7i7dnhe_firmwarenuc7i5bnkp_firmwarenuc7i7bnbnuc5cpyhnuc5pgyhnuc5i5ryhnuc8i5bekpanuc7i5bnh_firmwarenuc7i5dnhenuc8i3beknuc7i7bnkq_firmwarecd1p64gk_firmwarenuc5ppyhnuc8i7beknuc7i5bnb_firmwarenuc8i7behnuc7i7dnke_firmwarenuc7i5dnkpc_firmwarenuc7i7bnhxg_firmwarenuc6cayh_firmwarenuc8i7bekqanuc7i3bnhxfnuc5i3ryh_firmwarenuc8i3behfanuc7i5bnk_firmwarenuc7i5bnhx1_firmwarenuc8i5behsnuc7i5bnbnuc7cjyh_firmwarenuc7i7bnhx1nuc7i7bnb_firmwarenuc7i7bnhx1_firmwarenuc7i3dnkenuc8i5beknuc5cpyh_firmwarenuc8i5behcd1c32gknuc8i7hvkva_firmwarenuc5i5myhe_firmwarenuc5i3myhenuc7i7bnh_firmwarenuc7i3bnhx1de3815tybenuc7i7dnkenuc7cjysal_firmwarenuc7i7dnhenuc8i7hvkvawnuc8i3beh_firmwarenuc8i3behsnuc8i3bek_firmwareIntel(R) NUCs Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2022-35276
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.99%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in BIOS firmware for some Intel(R) NUC 8 Compute Elements before version CBWHL357.0096 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_8_compute_element_cm8pcb_firmwarenuc_8_compute_element_cm8pcbnuc_8_compute_element_cm8i7cb_firmwarenuc_8_compute_element_cm8i7cbnuc_8_compute_element_cm8i5cbnuc_8_compute_element_cm8i3cb_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_8_compute_element_cm8ccbnuc_8_compute_element_cm8i3cbIntel(R) NUC 8 Compute Elements
CWE ID-CWE-284
Improper Access Control
CVE-2020-8711
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 33.62%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:42
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CVE-2020-8757
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.02%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:07
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-8738
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.28% / 51.11%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:04
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-xeon_platinum_8153xeon_w-2223atom_c3750xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6230txeon_gold_6146xeon_e5-2660_v3xeon_gold_6126tcore_i7-6950xxeon_w-3225atom_c3758rxeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_e5-2408l_v3xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_gold_6138xeon_e5-4650_v4xeon_e7-8880_v4xeon_e5-1630_v4xeon_e5-4660_v3xeon_e5-1660_v4xeon_w-2295xeon_e7-8891_v4xeon_platinum_8164core_i7-3960xxeon_gold_6234xeon_e5-2603_v3xeon_e5-2699r_v4xeon_gold_6238rxeon_w-2255xeon_d-1518xeon_gold_5215xeon_e5-2667_v3xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_platinum_8168core_i9-7920xxeon_e5-2683_v4xeon_e5-2608l_v4xeon_e5-2699_v4xeon_e5-2640_v3xeon_gold_5218xeon_e5-1620_v4xeon_w-1270atom_c3538xeon_d-1567xeon_silver_4109txeon_e5-2630l_v3xeon_e5-4640_v4xeon_e5-2690_v3xeon_gold_5215lxeon_silver_4215rxeon_e5-4655_v4xeon_gold_6138fxeon_e5-2658_v4xeon_gold_5122xeon_w-2245xeon_e5-1630_v3xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_e5-2680_v3xeon_e5-2699_v3xeon_gold_6212uxeon_w-1270tecore_i9-7980xexeon_silver_4114xeon_e5-2698_v3core_i7-6900kcore_i9-9940xatom_c3508xeon_bronze_3104xeon_e7-8870_v4xeon_w-1290txeon_d-1571xeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_w-3265mxeon_d-1627core_i7-3930kxeon_e5-2637_v4xeon_w-2265xeon_e5-2667_v4xeon_e5-2687w_v3xeon_d-1602xeon_w-10855mxeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_6126fxeon_d-1539xeon_gold_5218txeon_e5-2697a_v4xeon_gold_6150xeon_e5-1680_v4xeon_gold_5220rxeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4xeon_d-2146ntxeon_platinum_8160fxeon_e5-2658_v3xeon_e5-4660_v4xeon_w-1270pxeon_gold_6210ucore_i9-10920xxeon_d-2187ntcore_i7-6850kxeon_gold_6126core_i9-7940xcore_i9-9960xxeon_d-2166ntxeon_w-1250ecore_i7-3920xmxeon_silver_4216xeon_e5-2643_v4xeon_gold_6230xeon_w-2195xeon_e5-2630l_v4xeon_e5-2699a_v4xeon_e5-4667_v4atom_c3336atom_c3958xeon_e5-2628l_v4xeon_d-2183itxeon_silver_4116txeon_e5-2630_v4xeon_d-1622xeon_e5-4667_v3xeon_gold_6142fxeon_e5-2643_v3xeon_d-2145ntxeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_gold_6130xeon_e5-2650l_v4xeon_w-1250pxeon_e5-4650_v3core_i7-7800xcore_i9-9920xxeon_silver_4208xeon_e5-2623_v4xeon_w-2123xeon_gold_5220sxeon_w-3275mcore_i7-3820xeon_e5-2683_v3xeon_silver_4110xeon_bronze_3204xeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-9800xatom_c3338rcloud_backupxeon_gold_5217xeon_e7-8867_v4xeon_gold_6230ncore_i7-4960xxeon_w-3265xeon_gold_5218nxeon_bronze_3106xeon_gold_6138txeon_w-3245xeon_e5-2620_v4xeon_gold_5120atom_c3708xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3xeon_d-1540hci_compute_node_biosxeon_gold_5220xeon_platinum_8160txeon_e5-2698_v4xeon_d-1653ncore_i7-7740xxeon_d-1528xeon_silver_4214rcore_i7-5820kxeon_d-1577xeon_d-1637xeon_e5-2697_v3xeon_silver_4114txeon_e5-4627_v4xeon_e5-4669_v4xeon_gold_6154xeon_d-2141ixeon_e5-2660_v4xeon_d-1541xeon_e7-4830_v4core_i7-3940xmxeon_w-1250texeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208ucore_i7-4940mxxeon_e7-8893_v4xeon_w-1290ecore_i7-4930kxeon_e5-1650_v3xeon_gold_5222xeon_w-3275xeon_e5-2687w_v4xeon_d-1553natom_c3955xeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633natom_c3850xeon_d-1548core_i7-4820kxeon_d-1649nxeon_d-1529xeon_e7-4820_v4xeon_e5-2695_v3xeon_platinum_8160xeon_e5-2428l_v3xeon_e7-4809_v4xeon_e5-4648_v3xeon_e5-1660_v3xeon_gold_6148fxeon_d-1520xeon_gold_6132biosatom_c3338xeon_gold_6152core_i9-9820xxeon_e5-2618l_v4xeon_platinum_8158xeon_w-2155xeon_e5-2623_v3core_i9-9900xxeon_e5-2418l_v3xeon_e5-2658a_v3xeon_w-1290pxeon_w-2135xeon_gold_6222vxeon_platinum_8176xeon_d-1623nxeon_w-2145xeon_d-1531xeon_gold_6142xeon_e5-2650_v4xeon_d-1533nxeon_gold_6128core_i9-9980xexeon_silver_4215xeon_w-2235xeon_d-2142itxeon_gold_5118xeon_gold_6130fxeon_e5-2695_v4core_i7-6800katom_c3436lcore_i9-10900xxeon_silver_4214xeon_silver_4210rxeon_d-2161iatom_c3858xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-2620_v3xeon_e5-4628l_v4xeon_gold_5218bxeon_e5-2670_v3xeon_e7-8860_v4xeon_e5-2648l_v3core_i7-3970xxeon_gold_6138pxeon_e5-2609_v3xeon_e5-2438l_v3xeon_w-1290xeon_platinum_8176fsolidfire_biosxeon_w-10885mxeon_e5-2650_v3atom_c3830xeon_e5-2648l_v4atom_c3808xeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_w-2275xeon_w-1290tecore_i9-7900xcore_i5-7640xxeon_d-1543nxeon_gold_6209uxeon_silver_4112xeon_w-3223xeon_d-1559xeon_gold_6226xeon_d-1521core_i7-5960xxeon_gold_5120txeon_gold_6230rxeon_w-3175xxeon_gold_6134atom_c3950xeon_e5-2628l_v3xeon_e5-4640_v3core_i7-4930mxxeon_w-3235atom_c3558core_i7-5930kxeon_gold_5218rxeon_gold_6226rxeon_e5-4669_v3xeon_w-2225xeon_bronze_3206rxeon_w-2133atom_c3308xeon_d-1557xeon_gold_6148xeon_e5-4627_v3xeon_e7-4850_v4fas\/aff_biosxeon_gold_6144xeon_e5-1428l_v3xeon_platinum_8180xeon_d-2177ntatom_c3758atom_c3558rxeon_e5-2650l_v3xeon_w-2175xeon_gold_5220tIntel BIOS platform sample code for some Intel(R) Processors
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-8710
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.19% / 41.55%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:31
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8740
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.38% / 58.77%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:04
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write in Intel BIOS platform sample code for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-xeon_platinum_8153xeon_w-2223xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6230txeon_gold_6146xeon_e5-2660_v3xeon_gold_6126tcore_i7-6950xxeon_w-3225xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_e5-2408l_v3xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_gold_6138xeon_e5-4650_v4xeon_e7-8880_v4xeon_e5-1630_v4xeon_e5-4660_v3xeon_e5-1660_v4xeon_w-2295xeon_e7-8891_v4xeon_platinum_8164core_i7-3960xxeon_gold_6234xeon_e5-2603_v3xeon_e5-2699r_v4xeon_gold_6238rxeon_w-2255xeon_d-1518fas_biosxeon_gold_5215xeon_e5-2667_v3xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_platinum_8168core_i9-7920xxeon_e5-2683_v4xeon_e5-2608l_v4xeon_e5-2699_v4xeon_e5-2640_v3xeon_gold_5218xeon_e5-1620_v4xeon_w-1270xeon_d-1567xeon_silver_4109txeon_e5-2630l_v3xeon_e5-4640_v4xeon_e5-2690_v3xeon_gold_5215lxeon_silver_4215rxeon_e5-4655_v4xeon_gold_6138fxeon_e5-2658_v4xeon_gold_5122xeon_w-2245xeon_e5-1630_v3xeon_silver_4210tcore_i9-7960xcore_i7-7820xxeon_e5-2680_v3xeon_e5-2699_v3xeon_gold_6212uxeon_w-1270tecore_i9-7980xexeon_silver_4114xeon_e5-2698_v3core_i7-6900kcore_i9-9940xxeon_bronze_3104xeon_e7-8870_v4xeon_w-1290txeon_d-1571xeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_w-3265mxeon_d-1627core_i7-3930kxeon_e5-2637_v4xeon_w-2265xeon_e5-2667_v4xeon_e5-2687w_v3xeon_d-1602xeon_w-10855mxeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_6126fxeon_d-1539xeon_gold_5218txeon_e5-2697a_v4xeon_gold_6150xeon_e5-1680_v4xeon_gold_5220rxeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4xeon_d-2146ntxeon_platinum_8160fxeon_e5-2658_v3xeon_e5-4660_v4xeon_w-1270pxeon_gold_6210ucore_i9-10920xxeon_d-2187ntcore_i7-6850kxeon_gold_6126core_i9-7940xcore_i9-9960xxeon_d-2166ntxeon_w-1250ecore_i7-3920xmxeon_silver_4216xeon_e5-2643_v4xeon_gold_6230xeon_w-2195xeon_e5-2630l_v4xeon_e5-2699a_v4xeon_e5-4667_v4xeon_e5-2628l_v4xeon_d-2183itxeon_silver_4116txeon_e5-2630_v4xeon_d-1622xeon_e5-4667_v3xeon_gold_6142fxeon_e5-2643_v3xeon_d-2145ntxeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_gold_6130xeon_e5-2650l_v4xeon_w-1250pxeon_e5-4650_v3core_i7-7800xcore_i9-9920xxeon_silver_4208xeon_e5-2623_v4xeon_w-2123xeon_gold_5220sxeon_w-3275mcore_i7-3820xeon_e5-2683_v3xeon_silver_4110xeon_bronze_3204xeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-9800xxeon_gold_5217xeon_e7-8867_v4xeon_gold_6230ncore_i7-4960xxeon_w-3265xeon_gold_5218nxeon_bronze_3106xeon_gold_6138txeon_w-3245xeon_e5-2620_v4xeon_gold_5120xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3xeon_d-1540hci_compute_node_biosxeon_gold_5220xeon_platinum_8160txeon_e5-2698_v4xeon_d-1653ncore_i7-7740xxeon_d-1528xeon_silver_4214rcore_i7-5820kxeon_d-1577xeon_d-1637xeon_e5-2697_v3xeon_silver_4114txeon_e5-4627_v4xeon_e5-4669_v4aff_biosxeon_gold_6154xeon_d-2141ixeon_e5-2660_v4xeon_d-1541xeon_e7-4830_v4core_i7-3940xmxeon_w-1250texeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208ucore_i7-4940mxxeon_e7-8893_v4xeon_w-1290ecore_i7-4930kxeon_e5-1650_v3xeon_gold_5222xeon_w-3275xeon_e5-2687w_v4xeon_d-1553nxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633nxeon_d-1548core_i7-4820kxeon_d-1649nxeon_d-1529xeon_e7-4820_v4xeon_e5-2695_v3xeon_platinum_8160xeon_e5-2428l_v3xeon_e7-4809_v4xeon_e5-4648_v3xeon_e5-1660_v3xeon_gold_6148fxeon_d-1520xeon_gold_6132biosxeon_gold_6152core_i9-9820xxeon_e5-2618l_v4xeon_platinum_8158xeon_w-2155xeon_e5-2623_v3core_i9-9900xxeon_e5-2418l_v3xeon_e5-2658a_v3xeon_w-1290pxeon_w-2135xeon_gold_6222vxeon_platinum_8176xeon_d-1623nxeon_w-2145xeon_d-1531xeon_gold_6142xeon_e5-2650_v4xeon_d-1533nxeon_gold_6128core_i9-9980xexeon_silver_4215xeon_w-2235xeon_d-2142itxeon_gold_5118xeon_gold_6130fxeon_e5-2695_v4core_i7-6800kcore_i9-10900xxeon_silver_4214xeon_silver_4210rxeon_d-2161ixeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-2620_v3xeon_e5-4628l_v4xeon_gold_5218bxeon_e5-2670_v3xeon_e7-8860_v4xeon_e5-2648l_v3core_i7-3970xxeon_gold_6138pxeon_e5-2609_v3xeon_e5-2438l_v3xeon_w-1290xeon_platinum_8176fsolidfire_biosxeon_w-10885mxeon_e5-2650_v3xeon_e5-2648l_v4xeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_w-2275xeon_w-1290tecore_i9-7900xcore_i5-7640xxeon_d-1543nxeon_gold_6209uxeon_silver_4112xeon_w-3223xeon_d-1559xeon_gold_6226xeon_d-1521core_i7-5960xxeon_gold_5120txeon_gold_6230rxeon_w-3175xxeon_gold_6134xeon_e5-2628l_v3xeon_e5-4640_v3core_i7-4930mxxeon_w-3235core_i7-5930kxeon_gold_5218rxeon_gold_6226rxeon_e5-4669_v3xeon_w-2225xeon_bronze_3206rxeon_w-2133xeon_d-1557xeon_gold_6148xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6144xeon_e5-1428l_v3xeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175xeon_gold_5220tIntel BIOS platform sample code for some Intel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-8733
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.65%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:22
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-m10jnp2sb_firmwarem10jnp2sbIntel(R) Server Board M10JNP2SB Advisory
CVE-2020-8765
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 8.61%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:57
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) RealSense(TM) DCM may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_camera_f200realsense_camera_sr300realsense_camera_r200realsense_depth_camera_managerIntel(R) RealSense(TM) DCM
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2022-33894
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.36%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i3-9100_firmwarexeon_e-2378gcore_i7-1068ng7core_i5-1035g7core_i3-10105f_firmwarecore_i3-8350k_firmwarecore_i3-9350k_firmwarexeon_e-2124g_firmwarecore_i7-9700kfcore_i5-8305g_firmwarecore_i5-7500_firmwarexeon_e-2314xeon_e-2254me_firmwarecore_i7-10870h_firmwarecore_i5-8400hxeon_e-2276me_firmwarecore_i5-7y54core_i7-1060g7_firmwarecore_i7-9700core_i5-10200hxeon_e-2226gcore_i9-9900kfcore_i3-10100f_firmwarecore_i5-1035g4core_i5-10400hcore_i3-8145ucore_i7-10700k_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i3-10100ycore_i3-7020ucore_i7-9700tecore_i5-10400tcore_i3-8109ucore_i5-10310ucore_i7-7600ucore_i5-9400f_firmwarexeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarecore_i7-10700t_firmwarecore_i7-9700f_firmwarecore_i5-9500e_firmwarecore_i3-7100e_firmwarecore_i3-7100ecore_i3-7300xeon_e-2378core_i5-8269u_firmwarexeon_e-2278gexeon_e-2134_firmwarecore_i5-10600_firmwarecore_i3-9100hlcore_i5-10400core_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarecore_i7-10710u_firmwarecore_i5-10500tecore_i7-7820hkcore_i5-9500_firmwarecore_i5-8400h_firmwarecore_i3-9100tecore_i7-9700fcore_i9-10980hkcore_i5-8600xeon_e-2136core_i7-10510ucore_i7-9700kcore_i5-10400t_firmwarecore_i5-9400_firmwarecore_i7-8500y_firmwarecore_i3-10100ecore_i3-8100core_i7-1060g7core_i9-10900xeon_e-2374g_firmwarecore_i3-7300_firmwarecore_i3-10100tcore_i5-7287u_firmwarecore_i7-7700xeon_e-2386gcore_i9-10900kcore_i3-10325_firmwarecore_i7-7820hq_firmwarecore_i3-7102ecore_i7-7920hq_firmwarecore_i5-8600kcore_i7-10700te_firmwarexeon_e-2124_firmwarecore_i9-10900fcore_i7-8700k_firmwarecore_i7-8700_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i5-8365uxeon_e-2226ge_firmwarecore_i5-9600kfcore_i5-8500b_firmwarecore_i3-10100tecore_i3-7100u_firmwarecore_i5-10400_firmwarecore_i5-7600core_i7-10700fxeon_e-2286mcore_i5-1030g4_firmwarecore_i7-9850he_firmwarecore_i7-8557u_firmwarecore_i7-1068ng7_firmwarecore_i7-10750hcore_i7-7820eq_firmwarexeon_e-2276gcore_i3-8300core_i3-1000g4xeon_e-2186gcore_i5-7267u_firmwarecore_i5-7400txeon_e-2174gcore_i3-7100core_i7-8809gcore_i3-8145uecore_i5-10400h_firmwarecore_i5-7260ucore_i7-8700bcore_i5-10500_firmwarecore_i7-7500u_firmwarecore_i5-7267uxeon_e-2334_firmwarecore_i5-10210ycore_i7-7820hk_firmwarecore_i5-10500ecore_i9-9900kf_firmwarecore_i5-9400tcore_i5-10210u_firmwarecore_i5-9500fcore_i5-8300hcore_i5-8600t_firmwarecore_i5-10600txeon_e-2356gcore_i7-9850hecore_i3-10110ycore_i5-10600kfcore_i3-7300t_firmwarecore_i7-10700ecore_i5-10500h_firmwarecore_i9-9900kscore_i5-9600core_i7-10870hcore_i5-7300u_firmwarecore_i5-8600_firmwarecore_i3-9100fcore_i5-9600kf_firmwarexeon_e-2224_firmwarecore_i7-9750hfcore_i5-9300h_firmwarexeon_e-2274gcore_i7-10700kcore_i5-9500core_i3-9320_firmwarexeon_e-2278gelcore_i3-8145ue_firmwarecore_i5-10500te_firmwarecore_i5-8400b_firmwarecore_i3-8100_firmwarexeon_e-2124core_i9-9880hcore_i7-10710ucore_i5-7287ucore_i7-10700kfcore_i5-8500t_firmwarecore_i3-7100h_firmwarecore_i5-8300h_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e-2276mecore_i7-8565ucore_m3-7y32_firmwarecore_i5-7300hq_firmwarexeon_e-2274g_firmwarecore_i3-10300_firmwarecore_i5-7300hqcore_i7-7560ucore_i7-8706g_firmwarecore_i5-7400t_firmwarecore_i3-8100t_firmwarecore_i5-8259ucore_i9-9900core_i7-10510y_firmwarecore_i3-10100e_firmwarecore_i7-9850hl_firmwarexeon_e-2146g_firmwarecore_i7-8850h_firmwarecore_i5-1038ng7_firmwarecore_i3-8140uxeon_e-2336xeon_e-2388gcore_i7-9700kf_firmwarecore_i3-10105core_i7-9850h_firmwarecore_i3-10100te_firmwarecore_i3-7100_firmwarecore_i5-7600tcore_i9-10900k_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2276ml_firmwarexeon_e-2224gcore_i3-9100tcore_i5-8310y_firmwarexeon_e-2226gecore_i3-10300t_firmwarecore_i5-9300hcore_i9-10900_firmwarecore_i3-7167u_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i7-10610ucore_i5-10505_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarexeon_e-2176g_firmwarecore_i3-7167ucore_i5-9400hcore_i7-8500ycore_i7-7567ucore_i9-9900tcore_i3-8145u_firmwarecore_i7-9700e_firmwarecore_i5-10300h_firmwarecore_i7-7660u_firmwarecore_i7-7820hqcore_i5-8210ycore_i7-8750h_firmwarecore_i5-10200h_firmwarecore_i3-7300tcore_i5-7400_firmwarecore_i3-8109u_firmwarecore_i3-8300t_firmwarecore_i7-9700k_firmwarexeon_e-2288g_firmwarecore_i3-9100f_firmwarecore_i5-7y54_firmwarexeon_e-2246g_firmwarexeon_e-2176m_firmwarexeon_e-2174g_firmwarecore_i3-10300tcore_i3-7101ecore_i3-8100b_firmwarecore_i9-8950hk_firmwarecore_i5-8500core_i5-9500te_firmwarecore_i5-7600_firmwarecore_i5-8265ucore_i7-10700kf_firmwarexeon_e-2254mecore_i7-9750hxeon_e-2336_firmwarecore_i7-7y75core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i5-7y57core_i3-10305tcore_i7-10700_firmwarecore_i3-8350kcore_i5-7500tcore_i5-9600k_firmwarecore_i9-9900t_firmwarecore_i3-9100xeon_e-2224g_firmwarexeon_e-2276mcore_i7-7700kcore_i7-8705gcore_i5-9500ecore_i7-8665ucore_i3-8300tcore_i7-7660ucore_i7-8706gxeon_e-2236core_i9-9880h_firmwarecore_i7-10850hxeon_e-2236_firmwarecore_i7-8700t_firmwarexeon_e-2126g_firmwarecore_i7-8700core_i5-10400fcore_i5-8259u_firmwarecore_i7-8665ue_firmwarecore_i3-7130u_firmwarecore_i5-8400core_i7-8705g_firmwarecore_i9-10900te_firmwarecore_i3-10300core_i7-7700tcore_i7-10700tcore_i3-7100tcore_i7-8086kcore_i5-10210ucore_i5-7260u_firmwarecore_i5-7600k_firmwarecore_i5-8257ucore_i5-8365ue_firmwarecore_i7-8700kcore_i5-7200u_firmwarecore_i5-8600k_firmwarecore_i7-10510u_firmwarecore_i5-7442eqxeon_e-2134xeon_e-2226g_firmwarecore_i3-10100_firmwarecore_i5-10505core_i5-1030g7core_i5-7442eq_firmwarecore_i5-10310y_firmwarecore_i7-8569u_firmwarecore_i7\+8700_firmwarexeon_e-2144g_firmwarecore_i3-1000g1core_i7-10510ycore_i5-7360u_firmwarecore_i5-10600kf_firmwarecore_i3-10110ucore_i5-8210y_firmwarecore_i3-9100e_firmwarecore_i5-9600kcore_i3-10305t_firmwarecore_i5-10310u_firmwarecore_i7-7700hqcore_i9-10900f_firmwarecore_i3-9100hl_firmwarecore_i3-10105fcore_i3-8100hcore_i3-9100t_firmwarexeon_e-2386g_firmwarecore_i5-10300hcore_i5-8350ucore_i3-1005g1_firmwarecore_i5-7300uxeon_e-2246gcore_i5-8500tcore_i3-10100y_firmwarecore_i5-7500core_i5-7200ucore_i5-8350u_firmwarecore_i7-8700b_firmwarecore_i9-8950hkcore_i9-10900ecore_i9-10850kcore_i7-7920hqcore_i5-9300hf_firmwarexeon_e-2314_firmwarexeon_e-2254mlcore_i9-9900ks_firmwarecore_i3-9300_firmwarecore_i5-8400tcore_i7-10700core_i3-9100te_firmwarexeon_e-2254ml_firmwarecore_i7-10750h_firmwarexeon_e-2334core_i3-7350k_firmwarecore_i3-10105tcore_i9-10885hcore_i3-10325core_i3-7100hcore_i3-7101te_firmwarecore_i3-9300xeon_e-2276mlcore_i7-10875hxeon_e-2244gcore_i9-9900kcore_i3-9350kf_firmwarexeon_e-2176gxeon_e-2324gcore_i7-8709gcore_i3-10100core_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwarecore_i5-9400core_m3-8100y_firmwarecore_i3-8100tcore_i7-8557uxeon_e-2278ge_firmwarecore_i5-9500tcore_i5-7500t_firmwarecore_i3-10305_firmwarecore_i7-8700tcore_i5-8260u_firmwarecore_m3-7y32core_i5-7400core_i7-8650ucore_i3-7102e_firmwarecore_m3-7y30_firmwarecore_i9-10900e_firmwarexeon_e-2286m_firmwarecore_i3-7320xeon_e-2378g_firmwarecore_i7-9750h_firmwarexeon_e-2234_firmwarecore_i5-1035g1core_i5-1038ng7core_i7-8565u_firmwarecore_i7-10700e_firmwarexeon_e-2186g_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarexeon_e-2124gcore_i5-7600t_firmwarecore_i5-8500bcore_i5-8269ucore_i5-7440hq_firmwarecore_i5-1030g4core_i7-10700texeon_e-2288gcore_i3-9100exeon_e-2234core_i5-10500core_i7-8709g_firmwarexeon_e-2356g_firmwarecore_i7-9850hcore_i5-9400fcore_i7-9700t_firmwarecore_i5-10500e_firmwarecore_i5-7440eqcore_i5-8279ucore_i5-8279u_firmwarecore_i3-8130u_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarecore_i5-9300hfcore_i3-7100ucore_i5-10210y_firmwarecore_i3-7101tecore_i3-7350kcore_i5-7600kcore_i5-8250ucore_i3-10305core_i3-8140u_firmwarecore_i3-1000g4_firmwarexeon_e-2126gcore_i7-9700tcore_i3-7100t_firmwarecore_i7-7820eqcore_i7-9850hlcore_i5-7360ucore_i7-8650u_firmwarecore_i5-10600kcore_i3-9350kfxeon_e-2388g_firmwarecore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_m3-8100ycore_i9-10900kfcore_i5-8250u_firmwarexeon_e-2186mcore_i7-9700ecore_i7-7567u_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarexeon_e-2176mcore_i7-7700hq_firmwarecore_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwarexeon_e-2286gcore_i5-8365u_firmwarecore_i5-10500hcore_i5-8260ucore_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i3-10100t_firmwarecore_i3-9300txeon_e-2244g_firmwarecore_i7-10810ucore_i5-10400f_firmwarexeon_e-2278gcore_i3-8100h_firmwarecore_i3-10105_firmwarecore_i7-10875h_firmwarexeon_e-2378_firmwarecore_i7-8850hcore_i5-10500t_firmwarecore_i3-7130ucore_i5-8265u_firmwarexeon_e-2374gcore_i3-10100fcore_i3-8300_firmwarecore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i5-10600core_i7\+8700core_i5-8257u_firmwarecore_i9-10900kf_firmwarecore_m3-7y30core_i3-9350kcore_i5-8500_firmwarecore_i9-10850k_firmwarecore_i5-8365uecore_i7-8665uecore_i7-8809g_firmwarecore_i9-10885h_firmwarecore_i7-7700t_firmwarecore_i9-9980hk_firmwarecore_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i3-10320core_i9-10900tcore_i5-8200ycore_i5-8310ycore_i3-10110u_firmwarexeon_e-2324g_firmwarexeon_e-2278gel_firmwarecore_i5-9500texeon_e-2144gcore_i5-7440hqcore_i5-9500t_firmwarecore_i7-8569ucore_i7-9700te_firmwarecore_i7-7700_firmwarecore_i5-10500tcore_i3-10320_firmwarecore_i3-1005g1core_i3-8100bcore_i5-9600tcore_i3-7020u_firmwarecore_i3-7101e_firmwarecore_i3-9320core_i7-10850h_firmwarecore_i7-1065g7core_i5-9400t_firmwarecore_i9-9980hkcore_i5-8305gcore_i7-8559ucore_i5-8600tcore_i9-10900texeon_e-2146gcore_i9-10980hk_firmwarecore_i7-9700_firmwarecore_i3-8130uIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8692
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 33.22%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:01
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in the firmware of the Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-x710-bm2_firmwarexl710-bm1xxv710-am2_firmwarev710-at2_firmwarexl710-bm1_firmwarexxv710-am1xl710-bm2x710-at2_firmwarexl710-bm2_firmwarexxv710-am2xxv710-am1_firmwarex710-tm4x710-at2x710-bm2v710-at2x710-tm4_firmwareIntel(R) Ethernet 700 Series Controllers
CVE-2020-8756
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.18%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:07
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_and_manageability_engineIntel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2022-33945
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.07% / 20.48%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-14 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Server board and Intel(R) Server System BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bps24compute_module_hns2600bpblc24rserver_board_s2600bpsserver_board_s2600bpqrcompute_module_hns2600bps_firmwarecompute_module_hns2600bpq24_firmwarecompute_module_hns2600bpq_firmwarecompute_module_hns2600bpblc24_firmwareserver_board_s2600bpqr_firmwareserver_system_vrn2224bphy6compute_module_hns2600bpq24r_firmwarecompute_module_hns2600bps24rcompute_module_hns2600bpbserver_board_s2600bpb_firmwarecompute_module_hns2600bpsrcompute_module_liquid-cooled_hns2600bpbrctserver_system_m70klp4s2uhhserver_system_vrn2224bphy6_firmwarecompute_module_hns2600bpblc_firmwarecompute_module_hns2600bpblcrcompute_module_hns2600bpbr_firmwareserver_system_m20ntp1ur304server_system_vrn2224bpaf6compute_module_hns2600bpqrcompute_module_hns2600bpbrserver_system_vrn2224bpaf6_firmwarecompute_module_hns2600bpb_firmwareserver_board_m20ntp2sbserver_board_m10jnp2sb_firmwareserver_board_s2600bpbrserver_system_m70klp4s2uhh_firmwareserver_board_m70klp2sbcompute_module_hns2600bps24_firmwarecompute_module_hns2600bps24r_firmwareserver_system_zsb2224bpaf2compute_module_hns2600bpsr_firmwarecompute_module_hns2600bpb24_firmwareserver_system_mcb2208wfaf5_firmwarecompute_module_liquid-cooled_hns2600bpbrct_firmwareserver_board_s2600bpbr_firmwarecompute_module_hns2600bpqcompute_module_hns2600bpblcr_firmwareserver_board_s2600bpbcompute_module_hns2600bpblc24server_system_zsb2224bphy1_firmwareserver_system_m20ntp1ur304_firmwareserver_board_m70klp2sb_firmwarecompute_module_hns2600bpblc24r_firmwareserver_board_s2600bpqserver_board_m10jnp2sbserver_system_zsb2224bpaf1server_board_s2600bpq_firmwarecompute_module_hns2600bpblcserver_system_zsb2224bpaf1_firmwareserver_board_s2600bpsrcompute_module_hns2600bpqr_firmwareserver_board_s2600bps_firmwarecompute_module_hns2600bpsserver_board_s2600bpsr_firmwarecompute_module_hns2600bpb24server_system_zsb2224bphy1server_system_zsb2224bpaf2_firmwarecompute_module_hns2600bpq24rcompute_module_hns2600bpq24server_board_m20ntp2sb_firmwareserver_system_mcb2208wfaf5Intel(R) Server board and Intel(R) Server System BIOS firmwareserver_system_m70klp_familyserver_board_m10jnp2sb_familyserver_board_s2600bp_familyserver_m20ntp_family
CWE ID-CWE-20
Improper Input Validation
CVE-2022-34152
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.7||HIGH
EPSS-0.04% / 11.63%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC Kits before version TY0070 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_board_de3815tybe_firmwarenuc_board_de3815tybenuc_kit_de3815tykhenuc_kit_de3815tykhe_firmwareIntel(R) NUC Boards, Intel(R) NUC Kits
CWE ID-CWE-20
Improper Input Validation
CVE-2022-34147
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.36%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in BIOS firmware for some Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc10i7fnhaa_firmwarecm8i3cb4nnuc10i7fnk_firmwarecm8pcb4r_firmwarenuc10i7fnhc_firmwarenuc8i3pnk_firmwarenuc10i3fnhja_firmwarenuc10i3fnhfnuc10i5fnhnnuc10i7fnhccm8i5cb8n_firmwarenuc9i9qn_firmwarenuc10i5fnknuc8i3pnh_firmwarenuc10i3fnkn_firmwarelapqc71d_firmwarenuc10i5fnhja_firmwarenuc10i7fnkpanuc10i7fnh_firmwarenuc10i3fnhnuc10i5fnkpnuc10i5fnhjnuc10i7fnhnnuc10i3fnkcm8pcb4rnuc10i5fnkpa_firmwarenuc8i3pnknuc10i5fnkpanuc10i3fnk_firmwarenuc10i5fnh_firmwarelapqc71b_firmwarecm8i3cb4n_firmwarenuc10i3fnhncm8i7cb8n_firmwarelapqc71acm8ccb4r_firmwarelapqc71c_firmwarenuc10i7fnhjacm8i7cb8nlapqc71bnuc10i7fnkpa_firmwarenuc9i5qnnuc10i5fnhfnuc10i3fnhfanuc10i5fnhj_firmwarenuc10i7fnkn_firmwarenuc10i5fnhnuc9i7qnlapqc71dnuc10i7fnknnuc10i5fnhca_firmwarenuc10i5fnknnuc10i5fnkp_firmwarenuc10i7fnhnuc8i3pnb_firmwarenuc8i3pnbnuc9i5qn_firmwarenuc10i3fnknnuc10i3fnhfa_firmwarenuc9i7qn_firmwarenuc10i7fnhaanuc10i5fnhf_firmwarenuc8i3pnhnuc10i5fnhn_firmwarenuc10i5fnk_firmwarelapqc71cnuc10i7fnknuc10i7fnkpnuc10i7fnhn_firmwarenuc10i3fnhn_firmwarecm8ccb4rnuc10i5fnkn_firmwarenuc10i3fnhf_firmwarenuc10i7fnkp_firmwarenuc10i3fnhjanuc9i9qnlapqc71a_firmwarenuc10i5fnhjanuc10i5fnhcanuc10i7fnhja_firmwarenuc10i3fnh_firmwarecm8i5cb8nIntel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8734
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.65%
||
7 Day CHG~0.00%
Published-02 Feb, 2021 | 20:20
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-m10jnp2sb_firmwarem10jnp2sbIntel® Server Board M10JNP2SB Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2022-32231
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.79%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276lxeon_silver_4210r_firmwarexeon_platinum_8170_firmwarexeon_platinum_9222xeon_bronze_3104_firmwarexeon_gold_6230txeon_gold_6146xeon_gold_6126f_firmwarexeon_gold_6126txeon_platinum_8362xeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_6338xeon_gold_6338t_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_silver_4309yxeon_platinum_8352yxeon_gold_5217_firmwarexeon_platinum_8380h_firmwarexeon_gold_6138xeon_platinum_8360hl_firmwarexeon_gold_6354_firmwarexeon_gold_6246xeon_gold_6326xeon_platinum_8164xeon_gold_5317_firmwarexeon_gold_6240_firmwarexeon_gold_6234xeon_silver_4116t_firmwarexeon_gold_6238rxeon_silver_4316xeon_gold_5318y_firmwarexeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_gold_6348_firmwarexeon_platinum_8168xeon_gold_5318s_firmwarexeon_gold_6244_firmwarexeon_gold_5218xeon_silver_4109txeon_bronze_3206r_firmwarexeon_platinum_8380hxeon_gold_5215lxeon_silver_4215rxeon_gold_6138t_firmwarexeon_gold_5220r_firmwarexeon_silver_4116_firmwarexeon_gold_5122_firmwarexeon_silver_4215_firmwarexeon_platinum_8368q_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_platinum_8376hxeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_silver_4210txeon_platinum_8362_firmwarexeon_gold_6212u_firmwarexeon_gold_6126_firmwarexeon_silver_4310t_firmwarexeon_gold_6212uxeon_silver_4114xeon_gold_6240l_firmwarexeon_gold_6314uxeon_gold_6248rxeon_gold_6250l_firmwarexeon_silver_4214r_firmwarexeon_platinum_8276_firmwarexeon_gold_6258rxeon_bronze_3104xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6150_firmwarexeon_gold_6250xeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwarexeon_platinum_8156xeon_bronze_3106_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8260y_firmwarexeon_platinum_8358p_firmwarexeon_gold_5320xeon_gold_6144_firmwarexeon_platinum_8360yxeon_gold_6330h_firmwarexeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_6338txeon_gold_5218txeon_gold_6150xeon_gold_6240y_firmwarexeon_gold_6242_firmwarexeon_gold_5220rxeon_silver_4114_firmwarexeon_gold_5318sxeon_gold_6140xeon_gold_6230_firmwarexeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_platinum_8356h_firmwarexeon_gold_6250lxeon_gold_6210uxeon_gold_6126xeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8158_firmwarexeon_platinum_8358pxeon_gold_5120_firmwarexeon_gold_6328h_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6134_firmwarexeon_gold_6328hl_firmwarexeon_gold_6130t_firmwarexeon_gold_6242r_firmwarexeon_gold_6342_firmwarexeon_gold_5218r_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4116txeon_gold_6130f_firmwarexeon_gold_6348h_firmwarexeon_platinum_8356hxeon_gold_6246r_firmwarexeon_gold_6142fxeon_platinum_8360y_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_platinum_8153_firmwarexeon_gold_6130xeon_gold_5318h_firmwarexeon_silver_4214y_firmwarexeon_gold_5320txeon_silver_4208xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_gold_6312uxeon_silver_4214_firmwarexeon_gold_5320h_firmwarexeon_gold_5220sxeon_platinum_9242xeon_platinum_9282xeon_gold_5119t_firmwarexeon_platinum_8280lxeon_silver_4110xeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_bronze_3204xeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarexeon_platinum_8280_firmwarexeon_gold_6240r_firmwarexeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_6246rxeon_platinum_8358xeon_gold_5315yxeon_gold_5217xeon_platinum_8352s_firmwarexeon_gold_6230nxeon_silver_4215r_firmwarexeon_platinum_8354hxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_bronze_3106xeon_gold_6138txeon_silver_4310_firmwarexeon_gold_6338n_firmwarexeon_gold_6248r_firmwarexeon_gold_6256_firmwarexeon_platinum_9221_firmwarexeon_gold_5120xeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_platinum_8368xeon_gold_6154_firmwarexeon_gold_5220xeon_platinum_8160txeon_silver_4214rxeon_gold_6254xeon_silver_4209t_firmwarexeon_silver_4310txeon_silver_4114txeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_gold_6230t_firmwarexeon_platinum_8380xeon_gold_6314u_firmwarexeon_gold_5215l_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_silver_4208_firmwarexeon_gold_6208uxeon_gold_6330n_firmwarexeon_platinum_8268xeon_platinum_8352vxeon_gold_6336yxeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_6230n_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_gold_6230r_firmwarexeon_silver_4209txeon_silver_4116xeon_gold_6234_firmwarexeon_gold_6210u_firmwarexeon_platinum_8360hlxeon_gold_6252nxeon_platinum_8380_firmwarexeon_platinum_9221xeon_gold_6244xeon_gold_6330_firmwarexeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_gold_5320_firmwarexeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_gold_6354xeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_6336y_firmwarexeon_gold_5218_firmwarexeon_gold_6132xeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_platinum_8158xeon_gold_6238l_firmwarexeon_gold_6330hxeon_gold_5218b_firmwarexeon_gold_6222vxeon_gold_5318hxeon_platinum_8176xeon_platinum_8160_firmwarexeon_silver_4316_firmwarexeon_platinum_8376hlxeon_gold_6242xeon_silver_4112_firmwarexeon_gold_6262v_firmwarexeon_gold_6142xeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_6148_firmwarexeon_gold_6128xeon_gold_6346xeon_silver_4215xeon_gold_5220t_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_silver_4210t_firmwarexeon_gold_5220_firmwarexeon_gold_6338nxeon_gold_6208u_firmwarexeon_silver_4214xeon_gold_6142f_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarexeon_platinum_8276xeon_gold_6250_firmwarexeon_gold_6238txeon_silver_4210rxeon_platinum_8164_firmwarexeon_silver_4214yxeon_gold_6348xeon_gold_5218bxeon_gold_6330nxeon_platinum_8368_firmwarexeon_silver_4216_firmwarexeon_gold_6138pxeon_gold_6254_firmwarexeon_gold_6138p_firmwarexeon_platinum_8176fxeon_platinum_8352v_firmwarexeon_platinum_8368qxeon_gold_5320t_firmwarexeon_gold_6240rxeon_silver_4310xeon_gold_6258r_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_6256xeon_gold_6238r_firmwarexeon_gold_6342xeon_gold_5120txeon_gold_6230rxeon_gold_6252xeon_gold_6134xeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_5218rxeon_bronze_3206rxeon_gold_6226rxeon_gold_6328hxeon_gold_6252_firmwarexeon_gold_6334_firmwarexeon_gold_6148xeon_silver_4110_firmwarexeon_gold_6209u_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6328hlxeon_platinum_9282_firmwarexeon_platinum_8180xeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_gold_5220tIntel(R) Processors
CWE ID-CWE-665
Improper Initialization
CVE-2023-30763
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 8.46%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 14:01
Updated-24 Jan, 2025 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based overflow in Intel(R) SoC Watch based software before version 2021.1 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-battery_life_diagnostic_toolsoc_watchoneapi_base_toolkitIntel(R) SoC Watch based software
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-31199
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.04% / 11.65%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 14:01
Updated-24 Jan, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Solid State Drive Toolbox(TM) before version 3.4.5 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-solid_state_drive_toolboxIntel(R) Solid State Drive Toolbox(TM)
CWE ID-CWE-284
Improper Access Control
CVE-2022-30542
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 11.63%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for some Intel(R) Server Board S2600WF, Intel(R) Server System R1000WF and Intel(R) Server System R2000WF families before version R02.01.0014 may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-r2000wf_firmwarer2000wfr1000wfs2600wf_firmwarer1000wf_firmwares2600wfIntel(R) Server Board S2600WF, Intel(R) Server System R1000WF and Intel(R) Server System R2000WF families
CWE ID-CWE-20
Improper Input Validation
CVE-2023-30768
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.04% / 11.07%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 14:01
Updated-24 Jan, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s2600wp_firmwareserver_board_s1200btlr_firmwareserver_board_s1400fp2_firmwareserver_board_s1200v3rposerver_board_s2600kptr_firmwareserver_board_s1400sp2_firmwareserver_board_s2600wpqserver_board_s2600cp4ioc_firmwareserver_board_s2600kprserver_board_s2600jfqserver_board_s2600kpfserver_board_s2600tpr_firmwareserver_board_s2600cwtserver_board_s2600kpserver_board_s1200v3rpo_firmwareserver_board_s2600cp2_firmwareserver_board_s2600wttr_firmwareserver_board_s2600jffserver_board_s2600cwtr_firmwareserver_board_s2600wpserver_board_s2400ep4server_board_s2600cw2rserver_board_s1400sp2server_board_s1400fp2server_board_s2600jfq_firmwareserver_board_s2600wtts1rserver_board_s1200bts_firmwareserver_board_s2600kpr_firmwareserver_board_s2600cw2s_firmwareserver_board_s1200btsrserver_board_s1600jp4server_board_s1600jp2_firmwareserver_board_s2600cp2server_board_s1400fp4_firmwareserver_board_s2600tpnr_firmwareserver_board_s1200v3rpm_firmwareserver_board_s1200v3rpmserver_board_s2600kptrserver_board_s2600wpf_firmwareserver_board_s2600cw2srserver_board_s1600jp2server_board_s1400sp4_firmwareserver_board_s1200v3rplserver_board_s2600tpserver_board_s2600cw2sserver_board_s2600jf_firmwareserver_board_s2600cwtrserver_board_s2600wpfserver_board_s2600gzserver_board_s2600kpf_firmwareserver_board_s4600lh2_firmwareserver_board_s1600jp4_firmwareserver_board_s2600co4_firmwareserver_board_s2400ep2server_board_s2600tpfserver_board_s2600cwtsserver_board_s2600wttrserver_board_s2600ip4l_firmwareworkstation_board_w2600cr2l_firmwareserver_board_s2600wt2server_board_s2600cp2iocserver_board_s2600cp4_firmwareserver_board_s2600gz_firmwareserver_board_s2600wt2r_firmwareserver_board_s2600jff_firmwareworkstation_board_w2600cr2lserver_board_s1200btlrm_firmwareserver_board_s1200btsserver_board_s2600coe_firmwareserver_board_s2600tpnrserver_board_s2400bb4_firmwareserver_board_s2600cp4server_board_s1200btlserver_board_s2600tpf_firmwareserver_board_s1200btsr_firmwareserver_board_s2600wt2_firmwareserver_board_s2600tp_firmwareserver_board_s2600cp2jserver_board_s2600glserver_board_s2600ip4server_board_s2600ip4_firmwareserver_board_s2600tpfr_firmwareserver_board_s2600wtts1r_firmwareserver_board_s2600co4server_board_s2600cw2sr_firmwareserver_board_s2600wt2rserver_board_s2600wtt_firmwareserver_board_s2600tpfrserver_board_s4600lh2server_board_s2400bb4server_board_s2600cwtsrserver_board_s2600coeioc_firmwareserver_board_s2600cw2r_firmwareserver_board_s1400fp4server_board_s2400sc2server_board_s2600cwts_firmwareworkstation_board_w2600cr2_firmwareserver_board_s2600jfserver_board_s2600cp2j_firmwareserver_board_s2600wttserver_board_s2600cwt_firmwareserver_board_s2600cp2ioc_firmwareserver_board_s4600lt2_firmwareserver_board_s2600ip4lserver_board_s2400ep4_firmwareserver_board_s4600lt2server_board_s1200btl_firmwareserver_board_s1400sp4server_board_s2600cp4iocserver_board_s2600wpq_firmwareserver_board_s1200v3rpl_firmwareserver_board_s2600gl_firmwareserver_board_s2400sc2_firmwareserver_board_s2600cw2server_board_s2600kpfr_firmwareserver_board_s1200btlrworkstation_board_w2600cr2server_board_s2600kp_firmwareserver_board_s1200v3rpsserver_board_s2600cwtsr_firmwareserver_board_s2600coeserver_board_s2600kpfrserver_board_s2600cw2_firmwareserver_board_s2600tprserver_board_s2600coeiocserver_board_s1200v3rps_firmwareserver_board_s2400ep2_firmwareserver_board_s1200btlrmIntel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family
CWE ID-CWE-284
Improper Access Control
CVE-2023-28714
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 10.42%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-17 Oct, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsproset\/wireless_wifiIntel(R) PROSet/Wireless WiFi software for Windowsintel_proset_wireless_wifi_software_for_windows
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-284
Improper Access Control
CVE-2023-28743
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.20%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-17 Jun, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel NUC BIOS firmware before version QN0073 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_9_pro_kit_nuc9v7qnbnuc_9_pro_compute_element_nuc9v7qnbnuc_9_pro_compute_element_nuc9v7qnxnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_9_pro_kit_nuc9v7qnb_firmwarenuc_pro_compute_element_nuc9v7qnx_firmwarenuc_9_pro_kit_nuc9v7qnxIntel NUC BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28738
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.92%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-21 Oct, 2024 | 12:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel NUC BIOS firmware before version JY0070 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7cjyhn_firmwarenuc_kit_nuc7cjysalnuc_kit_nuc7cjyhnuc_kit_nuc7cjyh_firmwarenuc_kit_nuc7cjyhnnuc_kit_nuc7pjyh_firmwarenuc_kit_nuc7cjysal_firmwarenuc_kit_nuc7pjyhn_firmwarenuc_kit_nuc7pjyhnnuc_7_essential_nuc7cjysamnnuc_kit_nuc7pjyhnuc_7_essential_nuc7cjysamn_firmwareIntel NUC BIOS firmwareintel_nuc_bios_firmware
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28378
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.66%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-02 Aug, 2024 | 12:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsquickassist_technology_libraryquickassist_technology_firmwarequickassist_technologyIntel(R) QAT drivers for Windows - HW Version 2.0
CWE ID-CWE-285
Improper Authorization
CVE-2022-30539
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.80%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6330hxeon_platinum_8358xeon_gold_5318hxeon_gold_5315yxeon_platinum_8376hlxeon_silver_4316_firmwarexeon_platinum_8352s_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8362xeon_platinum_8358p_firmwarexeon_gold_5320xeon_platinum_8360yxeon_gold_6330h_firmwarexeon_platinum_8354hxeon_gold_6338xeon_silver_4310_firmwarexeon_gold_6338t_firmwarexeon_gold_6338n_firmwarexeon_gold_6338txeon_gold_6346xeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_gold_5318sxeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_gold_6338nxeon_platinum_8360hl_firmwarexeon_platinum_8368xeon_gold_6354_firmwarexeon_platinum_8356h_firmwarexeon_gold_6326xeon_platinum_8360hxeon_gold_5315y_firmwarexeon_silver_4310txeon_gold_5317_firmwarexeon_platinum_8380xeon_gold_6348xeon_gold_6314u_firmwarexeon_gold_6330nxeon_silver_4316xeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_platinum_8368_firmwarexeon_gold_5318y_firmwarexeon_platinum_8380hlxeon_gold_6330n_firmwarexeon_gold_5318nxeon_platinum_8358pxeon_platinum_8352vxeon_gold_6336yxeon_platinum_8352v_firmwarexeon_gold_6348_firmwarexeon_gold_6328h_firmwarexeon_platinum_8368qxeon_gold_5318s_firmwarexeon_gold_5320t_firmwarexeon_silver_4310xeon_gold_6328hl_firmwarexeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_platinum_8356hxeon_gold_6348h_firmwarexeon_platinum_8380hxeon_platinum_8360hlxeon_platinum_8368q_firmwarexeon_platinum_8380_firmwarexeon_gold_6342xeon_platinum_8376hxeon_gold_6330_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8360y_firmwarexeon_platinum_8362_firmwarexeon_gold_5318h_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_silver_4310t_firmwarexeon_gold_5320txeon_gold_6314uxeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_5320_firmwarexeon_gold_6312uxeon_gold_5320h_firmwarexeon_gold_6328hxeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_gold_6334_firmwarexeon_gold_6354xeon_gold_6336y_firmwarexeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_gold_6328hlxeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8353hxeon_platinum_8352y_firmwarexeon_gold_6348hxeon_gold_6338_firmwareIntel(R) Processors
CWE ID-CWE-416
Use After Free
CVE-2022-30704
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.04% / 12.63%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_2957uxeon_w-10885m_firmwarexeon_w-1350_firmwarecore_i7-11850he_firmwarexeon_w-3245mcore_i5-12600heceleron_3955u_firmwarecore_i7-1280pcore_i7-11370h_firmwareceleron_g1620_firmwarexeon_e-2378gcore_i7-1068ng7celeron_j1900_firmwarecore_i7-1160g7core_i5-12600tcore_i5-1035g7core_i3-10105f_firmwarepentium_gold_g5420celeron_5305upentium_gold_g6600_firmwarepentium_gold_g5420t_firmwarexeon_e-2314xeon_w-2125core_i7-10870h_firmwareceleron_j1850core_i7-1260upentium_gold_g6400t_firmwarepentium_gold_g5420_firmwarecore_i3-1110g4_firmwarecore_i9-12900te_firmwarecore_i5-11600_firmwarecore_i3-1110g4celeron_g1610t_firmwareceleron_4305uxeon_w7-3455_firmwarecore_i7-1060g7_firmwareceleron_n2815core_i5-12500tcore_i5-12500hl_firmwarecore_i5-10200hceleron_2961yxeon_w-1250p_firmwarecore_i3-10100f_firmwarepentium_gold_g5400tcore_i5-12500hcore_i5-1035g4core_i5-10400hcore_i7-11700core_i3-1220pcore_i7-10700k_firmwareceleron_n5105celeron_4205uceleron_2002e_firmwarexeon_w-2255celeron_n3000_firmwarexeon_w-11555mlecore_i3-10100ycore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i5-1250pe_firmwarecore_i3-12300t_firmwarecore_i9-11900txeon_w3-2435core_i7-1270pcore_i7-10700t_firmwarexeon_w3-2425core_i7-1270p_firmwareceleron_n4500core_i7-1195g7_firmwareceleron_g1830core_i5-11600tcore_i5-1235ul_firmwarexeon_e-2378core_i7-11850hcore_i5-12600hcore_i9-11900core_i7-12800hxcore_i5-12500te_firmwarecore_i5-10600_firmwarexeon_w-2245celeron_n3150core_i7-12700eceleron_n4100celeron_g6900celeron_n5100_firmwarexeon_w-3335_firmwarecore_i3-12100tceleron_n3060core_i5-10400celeron_1020ecore_i5-12600k_firmwarepentium_gold_g6605_firmwarecore_i7-10610u_firmwareceleron_g5920core_i7-10710u_firmwarecore_i5-10500teceleron_1020mxeon_w-1250e_firmwarexeon_w-1250te_firmwarecore_i5-1240pcore_i5-12500pentium_gold_g5620celeron_1020e_firmwarexeon_w-3335core_i7-11850hecore_i5-11600xeon_w-1290tcore_i7-12800hl_firmwarepentium_gold_g7400te_firmwareceleron_n4120xeon_w-11155mre_firmwareceleron_5305u_firmwarepentium_gold_g6505tcore_i9-10980hkpentium_gold_g6405t_firmwareceleron_g1820te_firmwarexeon_w-3345_firmwareceleron_3865u_firmwarepentium_gold_6405u_firmwarecore_i7-12800he_firmwareceleron_g3930tecore_i7-10510ucore_i5-10400t_firmwareceleron_n2840celeron_5205uceleron_3865ucore_i5-1245ulcore_i3-10100eceleron_g4930e_firmwarecore_i7-1060g7xeon_w-2265core_i9-11900hcore_i9-10900celeron_n2930celeron_n2840_firmwarecore_i5-11600k_firmwarexeon_w-10855mxeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarecore_i3-11100hexeon_e-2374g_firmwareceleron_g4900tcore_i7-12700core_i5-1235u_firmwarecore_i3-10100txeon_w-3375_firmwarexeon_w-1390t_firmwareceleron_3855u_firmwarexeon_w-11555mrecore_i7-11700k_firmwarexeon_w3-2423celeron_g3900te_firmwarepentium_gold_g7400ecore_i9-10900kcore_i3-10325_firmwarepentium_gold_g6505t_firmwarexeon_e-2386gceleron_g4932exeon_w3-2425_firmwareceleron_2955upentium_gold_g7400tceleron_5205u_firmwarecore_i5-12600he_firmwarecore_i9-10900fcore_i7-10700te_firmwarecore_i5-11500t_firmwarexeon_w-2223_firmwarecore_i7-1160g7_firmwareceleron_6305e_firmwarecore_i3-10105t_firmwareceleron_g3900_firmwareceleron_g6900t_firmwareceleron_j3060xeon_w9-3495x_firmwareceleron_n3160core_i3-10100tecore_i7-1255ul_firmwareceleron_7305celeron_g6900_firmwarecore_i5-10400_firmwareceleron_g4930core_i3-1115gre_firmwareceleron_n4505_firmwareceleron_2002exeon_w-3265_firmwarecore_i7-10700fcore_i5-12400tcore_i7-1180g7_firmwarecore_i5-12400_firmwarecore_i5-1030g4_firmwarexeon_w-1270te_firmwarecore_i5-1145g7core_i3-1125g4core_i7-1068ng7_firmwarecore_i7-10750hxeon_w-2195celeron_3867uxeon_w-1290p_firmwarexeon_w-3235_firmwarexeon_w-1390core_i3-1000g4xeon_w-3365_firmwarecore_i3-12300_firmwareceleron_6600he_firmwareceleron_j6413_firmwarecore_i3-1220pe_firmwareceleron_g4932e_firmwareceleron_j4105core_i5-12500e_firmwarecore_i5-10400h_firmwarecore_i9-12900h_firmwarexeon_w-2145_firmwarecore_i9-12950hx_firmwarecore_i5-10500_firmwareceleron_j1800pentium_gold_g6505xeon_w-1250pcore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-12650hceleron_j6412_firmwarecore_i3-1215uceleron_g5900t_firmwarexeon_e-2334_firmwarecore_i5-1245ul_firmwarecore_i7-1260u_firmwarecore_i7-1265uecore_i5-10210ycore_i5-1140g7pentium_gold_g6400te_firmwarecore_i5-12500hlcore_i5-10500ecore_i3-1215ul_firmwareceleron_2970mxeon_w-2123xeon_w-3275mceleron_j3355core_i5-10210u_firmwarecore_i7-12700e_firmwarecore_i5-10600txeon_e-2356gcore_i3-10110ycore_i5-10600kfceleron_1005m_firmwarecore_i7-10700ecore_i5-1245ueceleron_j3355ecore_i5-12600hlceleron_g4930eceleron_1047ue_firmwarecore_i7-12650h_firmwarepentium_gold_4410ycore_i5-11600kfcore_i5-10500h_firmwareceleron_j4125_firmwarecore_i7-11700kfpentium_gold_g5500tpentium_gold_g6500t_firmwarecore_i5-12600t_firmwarecore_i7-10870hxeon_w-11555mre_firmwareceleron_3205uxeon_w7-2475x_firmwarepentium_gold_g7400tecore_i5-1245u_firmwarecore_i9-11900_firmwarepentium_gold_g5600t_firmwarecore_i3-12300hl_firmwarecore_i7-1250upentium_gold_6405uceleron_g4920celeron_n3350celeron_3215u_firmwarexeon_w5-3435x_firmwarecore_i5-11500tcore_i7-12700k_firmwarecore_i7-10700kcore_i9-12900k_firmwareceleron_g1820core_i9-12900kceleron_g5925_firmwarecore_i5-1250pecore_i5-10500te_firmwareceleron_n2807core_i7-11700kcore_i5-1130g7_firmwarecore_i3-1215ulcore_i3-12100_firmwareceleron_g3902ecore_i7-10710ucore_i7-10700kfxeon_w-1350p_firmwarecore_i3-11100he_firmwarepentium_gold_7505_firmwarexeon_w-1250texeon_w7-2495x_firmwarecore_i7-1255u_firmwareceleron_g6900tcore_i3-1220peceleron_1047uepentium_gold_8505_firmwarepentium_gold_g6400e_firmwarecore_i7-12800heceleron_n3350_firmwareceleron_1019ycore_i3-10300_firmwareceleron_n2820xeon_w-2133_firmwarecore_i9-11900t_firmwareceleron_n4500_firmwarepentium_gold_g5420tpentium_gold_4415y_firmwarecore_i9-11900fxeon_w-11955m_firmwareceleron_j3355e_firmwarecore_i7-10510y_firmwareceleron_g5900tcore_i5-12600xeon_w-1250_firmwarecore_i3-10100e_firmwarecore_i7-11600hcore_i9-12900f_firmwarecore_i7-11390h_firmwareceleron_n2806core_i9-12900hk_firmwarepentium_gold_g5500xeon_w-3265m_firmwareceleron_3765uxeon_w-11555mle_firmwarexeon_w-11865mle_firmwarecore_i5-1038ng7_firmwareceleron_g5905tceleron_2980u_firmwarexeon_e-2336xeon_e-2388gxeon_w-2225_firmwarecore_i3-10105xeon_w9-3475x_firmwarepentium_gold_g6405_firmwarecore_i3-10100te_firmwarecore_i5-12400fpentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwarecore_i3-1120g4_firmwarecore_i9-12900e_firmwarecore_i9-10900k_firmwarexeon_w-1270_firmwarexeon_w-2155celeron_g1840_firmwarexeon_w7-2475xcore_i7-1280p_firmwareceleron_n3010xeon_w-2135core_i7-1185g7_firmwareceleron_j4025xeon_w-2145core_i5-12600h_firmwarecore_i5-11320hcore_i5-1235ulpentium_gold_4425ycore_i3-10300t_firmwareceleron_3205u_firmwarecore_i7-11375h_firmwarepentium_gold_g6500xeon_w-3323_firmwarecore_i9-10900_firmwarecore_i7-10610ucore_i5-10505_firmwarecore_i7-12850hx_firmwarecore_i5-1035g1_firmwareceleron_g6900teceleron_g1620core_i3-12300tcore_i9-12900t_firmwareceleron_g3900e_firmwarexeon_w-2295_firmwarecore_i9-12900kfceleron_n3160_firmwareceleron_1037u_firmwarecore_i5-11260hceleron_3755uxeon_w-1390pcore_i3-12100f_firmwarecore_i5-10300h_firmwarecore_i7-11850h_firmwareceleron_n2820_firmwarecore_i9-12900teceleron_n6211core_i7-12700kf_firmwarecore_i9-11900f_firmwarecore_i5-11300h_firmwarecore_i5-10200h_firmwareceleron_1007u_firmwareceleron_2955u_firmwareceleron_2980uceleron_n6210_firmwarecore_i7-11700t_firmwareceleron_n6211_firmwareceleron_n3010_firmwareceleron_n3060_firmwareceleron_3955ucore_i5-12600kf_firmwareceleron_n4000celeron_n2830core_i5-1145g7e_firmwareceleron_7300core_i7-1185gre_firmwarecore_i3-12100te_firmwarepentium_gold_g6400_firmwarecore_i7-12800hcore_i3-10300tceleron_n3450celeron_n5100core_i5-11500core_i5-1135g7celeron_n2805_firmwarexeon_w-1290teceleron_g3930_firmwarecore_i7-1265ue_firmwarexeon_w-3223celeron_j6412xeon_w-3275m_firmwarepentium_gold_g6600celeron_n2810xeon_w-3323xeon_w-3175xxeon_w5-2465xxeon_w-2235_firmwareceleron_g1610tceleron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarexeon_w5-2445pentium_gold_g6605xeon_w-3235xeon_e-2336_firmwareceleron_g5925pentium_gold_g5400t_firmwarecore_i7-12700f_firmwarepentium_gold_4410y_firmwarepentium_gold_g6405xeon_w-2225xeon_w-2133celeron_g3920_firmwarecore_i3-10305tcore_i7-10700_firmwarecore_i9-12900hxpentium_gold_g7400t_firmwarecore_i5-1250pcore_i7-12700h_firmwarepentium_gold_g5500_firmwarepentium_gold_g5600celeron_j4125core_i5-1145gre_firmwarexeon_w-2223core_i3-1215ue_firmwareceleron_g4950_firmwareceleron_j1750celeron_n2940_firmwareceleron_7305lxeon_w7-3465xcore_i5-12450h_firmwarecore_i7-11700fcore_i7-12650hxxeon_w-3225pentium_gold_g5620_firmwarecore_i7-12700hcore_i5-12500t_firmwarexeon_w-1370core_i7-10850hcore_i3-1210ucore_i7-1185grecore_i3-1125g4_firmwarecore_i7-11375hpentium_gold_4415u_firmwareceleron_g1820t_firmwarecore_i7-11800h_firmwarecore_i5-12600hx_firmwareceleron_g5905celeron_n6210core_i5-10400fceleron_g3950celeron_2981uxeon_w-2155_firmwarexeon_w-1290te_firmwarecore_i5-1245ue_firmwarecore_i9-10900te_firmwarecore_i3-10300pentium_gold_8500core_i7-10700tcore_i5-1140g7_firmwareceleron_7305l_firmwareceleron_n2930_firmwarexeon_w7-3465x_firmwarexeon_w-3225_firmwarecore_i5-10210upentium_gold_g5500t_firmwarexeon_w-2295core_i5-12450hpentium_gold_5405u_firmwarexeon_w7-2495xcore_i5-1240u_firmwarexeon_w-3245m_firmwarecore_i5-12500h_firmwarecore_i5-12500tecore_i7-1260pxeon_w-3175x_firmwarecore_i9-11900kf_firmwarecore_i5-1155g7_firmwarepentium_gold_g6405tceleron_n2940celeron_n2830_firmwarecore_i7-10510u_firmwareceleron_j3455celeron_g1610_firmwareceleron_3867u_firmwarecore_i3-10100_firmwareceleron_2000ecore_i5-10505core_i5-1030g7celeron_n2807_firmwarexeon_w-1390tpentium_gold_g7400e_firmwarexeon_w-1270core_i5-10310y_firmwarepentium_gold_4417ucore_i7-12700hlcore_i3-1000g1core_i7-10510ycore_i7-1185g7e_firmwarecore_i7-12700kceleron_g1820_firmwareceleron_g1620t_firmwarecore_i5-10600kf_firmwarecore_i3-10110ucore_i9-12900fceleron_j3160core_i7-11800hxeon_w-2275_firmwareceleron_n3150_firmwarecore_i7-1255ulceleron_1000m_firmwarecore_i5-12400celeron_g3900core_i3-10305t_firmwarecore_i5-10310u_firmwareceleron_g5905t_firmwarexeon_w-1270tecore_i3-12300hlceleron_7305e_firmwareceleron_n5105_firmwarecore_i9-10900f_firmwarecore_i7-1270pecore_i5-1155g7core_i9-12900ecore_i9-12900hkcore_i3-10105fceleron_g4900t_firmwarexeon_w5-3425core_i5-11320h_firmwarecore_i9-12900_firmwarepentium_gold_4415ycore_i3-1220p_firmwareceleron_3215ucore_i9-11950hceleron_g5900celeron_g5900texeon_e-2386g_firmwareceleron_1005mcore_i5-10300hxeon_w-11865mleceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_n4000_firmwareceleron_2950m_firmwarexeon_w-3223_firmwarecore_i7-11700tceleron_g1830_firmwareceleron_j3455_firmwareceleron_g3930core_i3-12300he_firmwarexeon_w-11855mceleron_g3930t_firmwarecore_i3-10100y_firmwareceleron_1017u_firmwarexeon_w-3265mceleron_3965y_firmwarecore_i5-11400h_firmwareceleron_n2806_firmwarecore_i7-12700hl_firmwarecore_i9-12900hx_firmwarexeon_w-2255_firmwareceleron_n2910celeron_g5900eceleron_j1800_firmwarepentium_gold_g7400_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kcore_i3-12100e_firmwareceleron_g1820tceleron_g3930ecore_i9-10900ecore_i9-10850kpentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarexeon_e-2314_firmwarecore_i7-12700tepentium_gold_g6400tceleron_1019y_firmwarexeon_w-2123_firmwarepentium_gold_g5600tceleron_g3930tcore_i7-12800hx_firmwarecore_i3-12100fcore_i7-10700xeon_w-1270pcore_i7-11600h_firmwarexeon_w5-2455xceleron_j4105_firmwarexeon_w-1290_firmwarecore_i7-10750h_firmwarexeon_e-2334xeon_w-1290e_firmwarecore_i5-1240p_firmwareceleron_g4920_firmwarecore_i3-10105tcore_i9-10885hcore_i5-11400tceleron_3965uxeon_w9-3495xcore_i5-11300hxeon_w-1250ecore_i9-11900kfcore_i3-10325celeron_g1840t_firmwarecore_i9-12950hxxeon_w-3375celeron_g1840core_i3-12300hecore_i3-12100ecore_i9-12900kscore_i5-12500exeon_w-3365core_i7-10875hceleron_n3350e_firmwareceleron_1037upentium_gold_g5400_firmwarecore_i7-12700te_firmwareceleron_4305ue_firmwarecore_i9-12900txeon_e-2324gcore_i9-11900k_firmwareceleron_g1630celeron_6305_firmwarecore_i3-10100celeron_j4025_firmwarecore_i5-1035g7_firmwarexeon_w7-3445_firmwarecore_i7-10700f_firmwareceleron_j1900pentium_gold_4417u_firmwareceleron_6305celeron_n4505core_i3-12100celeron_g4930_firmwareceleron_g1610core_i3-10305_firmwarecore_i7-12700fcore_i3-1210u_firmwareceleron_g4930t_firmwarecore_i9-12900xeon_w5-3425_firmwarecore_i5-11400fceleron_n2810_firmwarecore_i5-11500_firmwarecore_i9-10900e_firmwarecore_i5-1145grecore_i7-1180g7celeron_2970m_firmwarexeon_e-2378g_firmwarecore_i3-1215ueceleron_6600hecore_i7-12700t_firmwarexeon_w-1390_firmwarexeon_w-11865mreceleron_j1850_firmwarepentium_gold_g7400core_i9-11950h_firmwarepentium_gold_4415ucore_i5-1035g1celeron_2961y_firmwarecore_i5-1038ng7core_i5-11260h_firmwarexeon_w-3265pentium_gold_4425y_firmwareceleron_7305_firmwarexeon_w-3245core_i5-11400f_firmwarecore_i7-10700e_firmwarecore_i9-12900kf_firmwareceleron_g1850_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwareceleron_n2920_firmwarecore_i7-1185g7core_i7-1195g7core_i7-12800hlcore_i7-12700_firmwarecore_i7-1165g7core_i5-1250p_firmwareceleron_n3050core_i5-11600kcore_i7-11390hcore_i9-11900h_firmwarecore_i5-12400f_firmwarecore_i5-1030g4pentium_gold_8500_firmwarexeon_w3-2435_firmwarecore_i7-10700teceleron_n3000core_i3-12100t_firmwarecore_i5-10500core_i7-11700_firmwareceleron_g3930e_firmwareceleron_3965u_firmwarexeon_e-2356g_firmwarecore_i7-1265ulceleron_n4100_firmwarecore_i5-10500e_firmwareceleron_1007uxeon_w-1250celeron_g3900tcore_i5-11500he_firmwarexeon_w-1270p_firmwarecore_i7-1265uxeon_w-2195_firmwareceleron_2981u_firmwarexeon_w5-3435xcore_i5-1145g7_firmwareceleron_g3920xeon_w7-3455core_i5-10600t_firmwarexeon_w-1290ecore_i5-10210y_firmwareceleron_g1850pentium_gold_g6505_firmwarecore_i5-11400hcore_i7-1250u_firmwarexeon_w-2265_firmwarexeon_w-3275core_i3-10305core_i3-1000g4_firmwareceleron_g5900_firmwareceleron_g5920_firmwarexeon_w-1270ecore_i5-12600hl_firmwarexeon_w-1370p_firmwarecore_i5-11400_firmwarecore_i9-12900ks_firmwarecore_i5-1230u_firmwareceleron_g1840txeon_w5-2465x_firmwarecore_i7-1255uceleron_n3450_firmwarecore_i3-1215u_firmwarexeon_w-1290t_firmwareceleron_n2805xeon_w-3245_firmwarecore_i9-11980hkceleron_1017ucore_i5-10600kceleron_j1750_firmwareceleron_4305uexeon_e-2388g_firmwarexeon_w-1370pcore_i7-1165g7_firmwarexeon_w-2135_firmwarecore_i9-10900kfxeon_w-11155mrexeon_w-2235celeron_g3902e_firmwareceleron_n4120_firmwarecore_i3-1115g4e_firmwarecore_i5-1130g7celeron_n3350ecore_i5-12400t_firmwarecore_i3-1120g4core_i3-1000g1_firmwarecore_i5-10600k_firmwareceleron_4205u_firmwarecore_i5-10310yceleron_1020m_firmwarexeon_w-1290pceleron_4305u_firmwarecore_i5-1245uxeon_w-2125_firmwarecore_i7-12700txeon_w-11155mlecore_i5-10500hxeon_w-2175_firmwareceleron_n2808core_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i3-10100t_firmwarecore_i3-12300core_i5-11600kf_firmwarecore_i5-12450hx_firmwareceleron_2950mcore_i7-10810ucore_i7-11700kf_firmwarecore_i5-10400f_firmwarecore_i3-1115g4_firmwarecore_i5-12600kcore_i3-10105_firmwareceleron_j6413xeon_w-1370_firmwarexeon_w-1270e_firmwareceleron_j3160_firmwarecore_i3-1115grecore_i7-10875h_firmwareceleron_g5900te_firmwarexeon_e-2378_firmwarecore_i5-11500hcore_i5-10500t_firmwareceleron_j3455e_firmwarecore_i7-12800h_firmwareceleron_j4005_firmwareceleron_j3060_firmwarexeon_w-11955mxeon_e-2374gcore_i3-10100fpentium_gold_g6400eceleron_g4930txeon_w5-2445_firmwareceleron_n2920core_i7-12700kfcore_i7-1065g7_firmwarecore_i5-1135g7_firmwarepentium_gold_7505core_i5-10600celeron_g3930te_firmwarecore_i5-12500_firmwarecore_i3-12100teceleron_n2815_firmwarecore_i3-1115g4eceleron_3755u_firmwarecore_i9-10900kf_firmwarecore_i9-12900hceleron_7305eceleron_7300_firmwarexeon_w-1350core_i5-11600t_firmwarecore_i5-12450hxcore_i9-11980hk_firmwarexeon_w7-3445xeon_w-11155mle_firmwareceleron_n4020_firmwarecore_i9-10850k_firmwarexeon_w-1290xeon_w-3345core_i9-10885h_firmwarecore_i5-1235uceleron_g4950celeron_1000mcore_i7-1265u_firmwarecore_i5-1145g7ecore_i7-12650hx_firmwareceleron_j3455eceleron_6305ecore_i5-1240ucore_i5-11500hecore_i5-1030g7_firmwareceleron_g4900core_i3-10320celeron_g5900e_firmwarexeon_w-10885mcore_i9-10900txeon_w-3275_firmwarepentium_gold_g5400xeon_w-11855m_firmwareceleron_g3900t_firmwarexeon_w-2275core_i5-12600kfcore_i3-10110u_firmwareceleron_n4020celeron_g4900_firmwareceleron_g1620txeon_e-2324g_firmwareceleron_2957u_firmwareceleron_2000e_firmwarexeon_w-1350pceleron_g3900eceleron_g1820teceleron_g3950_firmwarexeon_w5-2455x_firmwarecore_i5-10500tceleron_3765u_firmwarecore_i3-10320_firmwarecore_i7-12850hxceleron_3965ycore_i7-1185g7ecore_i7-1265ul_firmwarexeon_w3-2423_firmwarexeon_w9-3475xpentium_gold_5405uceleron_g3900teceleron_j3355_firmwarecore_i3-1005g1celeron_j4005xeon_w-11865mre_firmwarecore_i5-12600hxceleron_3855ucore_i5-12600_firmwarecore_i5-11400celeron_n2910_firmwarecore_i7-10850h_firmwarecore_i7-1065g7celeron_g6900eceleron_g6900te_firmwarecore_i9-10900tecore_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230uceleron_g6900e_firmwarepentium_gold_6500ypentium_gold_g6400xeon_w-2175core_i7-1270pe_firmwareIntel(R) Processors
CWE ID-CWE-665
Improper Initialization
CVE-2022-28699
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.67%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc8i3cysnnuc8i7inh_firmwarenuc8i7hvk_firmwarenuc7cjyhn_firmwarenuc8cchbnuc7pjyh_firmwarenuc8cchbn_firmwarestk2mv64cc_firmwarenuc8i7inhnuc7cjyhnuc8i5inhnuc8i7hnknuc8cchkrnnuc8i7hvknuc7cjyhnnuc8i7hnk_firmwarenuc8i3cysn_firmwarenuc8cchkrn_firmwarenuc8cchkrnuc7cjyh_firmwarenuc7pjyhn_firmwarenuc7cjysamn_firmwarenuc7pjyhnuc8i5inh_firmwarenuc8cchbnnuc7cjysamnnuc7pjyhnnuc8i7hvkvaw_firmwarenuc7cjysalnuc8i7hvkvanuc8i7hvkva_firmwarenuc8cchkr_firmwarenuc8cchb_firmwarenuc8i7hnkqc_firmwarenuc7cjysal_firmwarestk2mv64ccnuc8i7hvkvawnuc8i7hnkqcIntel(R) NUC BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-27391
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.99%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-15 Oct, 2024 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_rendering_toolkitdpc\+\+_compatibility_tooloneapi_dpc\+\+\/c\+\+_compileroneapi_data_analytics_libraryosprayoneapi_toolkit_and_component_software_installeroneapi_iot_toolkitimplicit_spmd_program_compilervtune_profiler_for_oneapiopen_image_denoiseoneapi_deep_neural_network_libraryoneapi_video_processing_libraryintegrated_performance_primitivesdistribution_for_python_programming_languagefortran_compileroneapi_threading_building_blocksinspector_for_oneapiadvisor_for_oneapicpu_runtime_for_opencl_applicationsoneapi_base_toolkitoneapi_dpc\+\+_library_\(onedpl\)mpi_libraryoneapi_hpc_toolkitoneapi_math_kernel_libraryipp_cryptographytrace_analyzer_and_collectoropen_volume_kernel_libraryospray_studioembree_ray_tracing_kernel_libraryIntel(R) oneAPI Toolkit and component software installers
CWE ID-CWE-284
Improper Access Control
CVE-2022-26837
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.72%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i5-1145gre_firmwarexeon_w-2223xeon_e-2276mxeon_w-10885m_firmwarexeon_w-1350_firmwarecore_i7-11850he_firmwarexeon_w-3245mxeon_w7-3465xcore_i7-11370h_firmwarexeon_e-2378gxeon_platinum_8362core_i7-11700fxeon_w-3225core_i7-1160g7xeon_e-2236xeon_gold_6338xeon_w-1370xeon_e-2124g_firmwarexeon_gold_6338t_firmwarexeon_e-2236_firmwarecore_i7-1185grecore_i3-1125g4_firmwarexeon_e-2126g_firmwarecore_i7-11375hcore_i7-11800h_firmwarexeon_e-2314xeon_e-2254me_firmwarexeon_w-2125xeon_w-2155_firmwarexeon_silver_4309yxeon_platinum_8352yxeon_w-1290te_firmwarexeon_e-2276me_firmwarexeon_platinum_8380h_firmwarexeon_platinum_8360hl_firmwarecore_i3-1110g4_firmwarecore_i5-11600_firmwarexeon_gold_6354_firmwarecore_i5-1140g7_firmwarexeon_w-3225_firmwarecore_i3-1110g4xeon_w7-3465x_firmwarexeon_w-2295xeon_w7-3455_firmwarexeon_gold_6326xeon_w7-2495xxeon_w-3245m_firmwarexeon_gold_5317_firmwarexeon_e-2226gxeon_w-1250p_firmwarecore_i9-11900kf_firmwarecore_i5-1155g7_firmwarexeon_silver_4316xeon_w-2255core_i7-11700xeon_gold_5318y_firmwarexeon_w-11555mlexeon_e-2276m_firmwarexeon_e-2134xeon_e-2226g_firmwarexeon_gold_6348_firmwarecore_i7-11370hxeon_gold_5318s_firmwarecore_i9-11900txeon_e-2224xeon_w3-2435xeon_e-2186m_firmwarexeon_w3-2425xeon_w-1390txeon_w-1270core_i7-1195g7_firmwarecore_i5-11600txeon_e-2378core_i7-11850hxeon_e-2144g_firmwarecore_i9-11900xeon_platinum_8380hxeon_e-2278gecore_i7-1185g7e_firmwarexeon_e-2134_firmwarexeon_w-2275_firmwarexeon_platinum_8368q_firmwarexeon_w-2245core_i7-11800hxeon_platinum_8376hxeon_gold_6312u_firmwarexeon_gold_6330xeon_w-3335_firmwarexeon_platinum_8362_firmwarexeon_silver_4310t_firmwarexeon_w-1270texeon_gold_6314ucore_i5-1155g7xeon_w-1250e_firmwarexeon_w-1250te_firmwarexeon_w5-3425core_i5-11320h_firmwarexeon_w-3335core_i9-11950hxeon_e-2386g_firmwarecore_i7-11850hecore_i5-11600xeon_w-1290txeon_w-11155mre_firmwarexeon_platinum_8353hxeon_w-11865mlexeon_gold_6348hxeon_gold_6338_firmwarexeon_w-3223_firmwarexeon_w-3345_firmwarecore_i7-11700txeon_w-11855mxeon_e-2136xeon_e-2246gxeon_w-3265mcore_i5-11400h_firmwarexeon_w-2255_firmwarexeon_w-2265xeon_silver_4309y_firmwarecore_i9-11900hxeon_gold_5320hxeon_platinum_8358p_firmwarexeon_gold_5320core_i5-11600k_firmwarexeon_platinum_8360yxeon_gold_6330h_firmwarexeon_w-10855mxeon_w-2245_firmwarecore_i5-11500h_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarecore_i3-11100hexeon_e-2374g_firmwarecore_i9-11900kxeon_w-3375_firmwarexeon_gold_6338txeon_w-1390t_firmwarexeon_w-11555mrecore_i7-11700k_firmwarexeon_w3-2423xeon_gold_5318sxeon_e-2386gxeon_w3-2425_firmwarexeon_e-2314_firmwarexeon_e-2254mlxeon_e-2124_firmwarexeon_w-2123_firmwarecore_i5-11500t_firmwarexeon_w-2223_firmwarecore_i7-1160g7_firmwarexeon_platinum_8356h_firmwarexeon_w-1270pcore_i7-11600h_firmwarexeon_w5-2455xxeon_w9-3495x_firmwarexeon_e-2226ge_firmwarexeon_e-2254ml_firmwarexeon_w-1290_firmwarexeon_e-2334xeon_platinum_8380hlcore_i3-1115gre_firmwarexeon_w-1290e_firmwarexeon_gold_5318nxeon_w-3265_firmwarexeon_platinum_8358pxeon_w-1250ecore_i5-11400txeon_w9-3495xxeon_e-2286mcore_i7-1180g7_firmwarexeon_w-1270te_firmwarecore_i5-11300hcore_i9-11900kfcore_i5-1145g7xeon_gold_6328h_firmwarecore_i3-1125g4xeon_w-3375xeon_w-2195xeon_gold_6328hl_firmwarexeon_e-2276gxeon_w-1290p_firmwarexeon_w-1390xeon_w-3235_firmwarexeon_gold_6342_firmwarexeon_e-2186gxeon_w-3365xeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_e-2276mlxeon_e-2244gxeon_w-3365_firmwarexeon_e-2174gxeon_gold_6348h_firmwarexeon_platinum_8356hxeon_e-2176gxeon_e-2324gcore_i9-11900k_firmwarexeon_w-2145_firmwarexeon_platinum_8360y_firmwarexeon_w7-3445_firmwarexeon_w-1250pcore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarexeon_gold_5318h_firmwarexeon_e-2334_firmwarexeon_gold_5320tcore_i5-1140g7xeon_gold_6312uxeon_gold_5320h_firmwarexeon_w-2123xeon_w-3275mxeon_e-2278ge_firmwarexeon_e-2356gxeon_w5-3425_firmwarecore_i5-11400fxeon_silver_4314core_i5-11500_firmwarexeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarecore_i5-1145grexeon_e-2286m_firmwarecore_i7-1180g7xeon_e-2378g_firmwarecore_i5-11600kfxeon_platinum_8358xeon_w-1390_firmwarecore_i7-11700kfxeon_w-11865mrexeon_w-11555mre_firmwarecore_i9-11950h_firmwarexeon_platinum_8352s_firmwarexeon_e-2234_firmwarexeon_w7-2475x_firmwarecore_i5-11260h_firmwarexeon_platinum_8354hxeon_w-3265core_i9-11900_firmwarexeon_w-3245core_i5-11400f_firmwarexeon_silver_4310_firmwarexeon_e-2224_firmwarexeon_gold_6338n_firmwarexeon_e-2186g_firmwarexeon_e-2274gxeon_w5-3435x_firmwarecore_i5-11500txeon_e-2124gcore_i7-1195g7core_i7-1185g7xeon_platinum_8351n_firmwarexeon_gold_6326_firmwarecore_i7-1165g7core_i5-11600kxeon_e-2278gelcore_i7-11390hcore_i9-11900h_firmwarexeon_w3-2435_firmwarexeon_platinum_8368xeon_e-2288gxeon_e-2234core_i7-11700kcore_i7-11700_firmwarexeon_silver_4310tcore_i5-1130g7_firmwarexeon_e-2356g_firmwarexeon_e-2124xeon_platinum_8380xeon_gold_6314u_firmwarexeon_w-1350p_firmwarecore_i3-11100he_firmwarexeon_platinum_8351nxeon_w-1250texeon_platinum_8376hl_firmwarexeon_w-1250core_i5-11500he_firmwarexeon_w-1270p_firmwarexeon_w7-2495x_firmwarexeon_w-2195_firmwarexeon_gold_6330n_firmwarexeon_w5-3435xcore_i5-1145g7_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_platinum_8352vxeon_gold_6336yxeon_w7-3455xeon_w-1290exeon_e-2276mecore_i5-11400hxeon_w-2265_firmwarexeon_w-3275xeon_e-2274g_firmwarexeon_e-2126gxeon_w-2133_firmwarecore_i9-11900t_firmwarexeon_w-1270exeon_w-1370p_firmwarexeon_platinum_8360hlcore_i5-11400_firmwarecore_i9-11900fxeon_platinum_8380_firmwarexeon_w-11955m_firmwarexeon_w-1250_firmwarexeon_w-1290t_firmwarexeon_gold_6330_firmwarecore_i7-11600hcore_i7-11390h_firmwarexeon_w-3245_firmwarecore_i9-11980hkxeon_w-3265m_firmwarexeon_w-11555mle_firmwarexeon_w-11865mle_firmwarexeon_e-2146g_firmwarexeon_e-2388g_firmwarexeon_w-1370pxeon_gold_5320_firmwarecore_i7-1165g7_firmwarexeon_e-2336xeon_e-2388gxeon_w-2135_firmwarexeon_platinum_8380hl_firmwarexeon_w-2225_firmwarexeon_w-11155mrexeon_platinum_8360h_firmwarexeon_w9-3475x_firmwarexeon_e-2186mcore_i3-1115g4e_firmwarexeon_gold_6354xeon_gold_6336y_firmwarexeon_e-2176mxeon_platinum_8354h_firmwarecore_i5-1130g7xeon_platinum_8352mcore_i3-1120g4core_i3-1120g4_firmwarexeon_w-1270_firmwarexeon_w-2155xeon_e-2278g_firmwarexeon_w7-2475xxeon_e-2276ml_firmwarexeon_gold_6330hxeon_w-1290pxeon_e-2224gxeon_w-2135xeon_e-2286gxeon_gold_5318hxeon_w-2125_firmwarexeon_w-11155mlexeon_platinum_8376hlxeon_w-2175_firmwarexeon_silver_4316_firmwarecore_i7-1185g7_firmwarexeon_w-2145core_i5-11600kf_firmwarexeon_e-2226gecore_i5-11320hxeon_e-2244g_firmwarecore_i7-11700kf_firmwarexeon_e-2278gcore_i3-1115g4_firmwarexeon_w-1370_firmwarecore_i7-11375h_firmwarexeon_w-1270e_firmwarexeon_w-3323_firmwarexeon_gold_6346core_i3-1115grexeon_w-2235xeon_e-2378_firmwarexeon_w-3175x_firmwarecore_i5-11500hxeon_w-11955mxeon_e-2374gxeon_e-2176g_firmwarexeon_w5-2445_firmwarexeon_gold_6338ncore_i5-1135g7_firmwarexeon_w-2295_firmwarexeon_platinum_8360hcore_i5-11260hxeon_w-1390pcore_i3-1115g4ecore_i7-11850h_firmwarexeon_gold_6348xeon_gold_6330nxeon_w-1350core_i5-11600t_firmwarecore_i9-11900f_firmwarecore_i5-11300h_firmwarexeon_platinum_8368_firmwarexeon_w7-3445core_i9-11980hk_firmwarexeon_w-11155mle_firmwarecore_i7-11700t_firmwarexeon_w-1290xeon_platinum_8352v_firmwarexeon_w-3345xeon_e-2288g_firmwarexeon_platinum_8368qcore_i5-1145g7exeon_gold_5320t_firmwarexeon_w-10885mcore_i5-11500hexeon_w-3275_firmwarexeon_silver_4310xeon_e-2246g_firmwarecore_i5-1145g7e_firmwarecore_i7-1185gre_firmwarexeon_e-2176m_firmwarexeon_w-11855m_firmwarexeon_silver_4314_firmwarexeon_e-2174g_firmwarexeon_gold_6334xeon_w-2275core_i5-11500core_i5-1135g7xeon_w-1290texeon_e-2324g_firmwarexeon_w-3223xeon_e-2278gel_firmwarexeon_e-2144gxeon_w-3275m_firmwarexeon_w-1350pxeon_gold_6342xeon_w-3323xeon_w-3175xxeon_w5-2465xxeon_w-2235_firmwarexeon_w5-2455x_firmwarexeon_w5-2445xeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_e-2254mexeon_w-3235xeon_e-2336_firmwarecore_i7-1185g7exeon_w3-2423_firmwarexeon_w9-3475xxeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_w-2225xeon_w-11865mre_firmwarexeon_gold_6328hxeon_e-2286g_firmwarexeon_w-2133xeon_gold_6334_firmwarecore_i5-11400xeon_gold_6328hlxeon_e-2146gxeon_e-2224g_firmwarexeon_w-2175xeon_w5-2465x_firmwareIntel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2022-27635
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.08%
||
7 Day CHG+0.01%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-wireless-ac_9560killer_wireless-ac_1550i\/skillerwi-fi_6e_ax211wi-fi_6e_ax210wireless-ac_9462killer_wi-fi_6e_ax1675x\/wuefi_firmwarewireless-ac_9461killer_wi-fi_6e_ax1675i\/sdebian_linuxkiller_wi-fi_6_ax1650i\/sfedorawi-fi_6_ax201killer_wi-fi_6e_ax1690i\/swi-fi_6e_ax411proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-284
Improper Access Control
CVE-2023-25951
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.07% / 20.52%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-29 Oct, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-killer_wi-fi_6e_ax1690proset\/wirelesswi-fi_6e_ax211killerkiller_wi-fi_6e_ax1675wi-fi_6e_ax411proset_wi-fi_6e_ax210Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi softwareproset\/wirelesskiller_wifi_software
CWE ID-CWE-20
Improper Input Validation
CVE-2022-26006
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 12.08%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:49
Updated-05 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2699r_v4_firmwarecore_i7-3920xmxeon_e5-4667_v3_firmwarexeon_e5-4620_v4_firmwarexeon_e5-2623_v4xeon_e5-1630_v4xeon_e5-2603_v3xeon_e5-4660_v4xeon_e5-2640_v3_firmwarexeon_e5-2640_v4xeon_e5-2690_v3xeon_e5-2670_v3_firmwarexeon_e5-2687w_v4_firmwarecore_i7-6900k_firmwarexeon_e5-4640_v3xeon_e5-2699_v3core_i7-3940xm_firmwarecore_i7-6950x_firmwarexeon_e5-2630l_v4xeon_e5-2699_v3_firmwarexeon_e5-2698_v3_firmwarexeon_e5-2650_v3xeon_e5-4610_v3_firmwarecore_i7-6850k_firmwarexeon_e5-2620_v4_firmwarexeon_e5-2687w_v3xeon_e5-2618l_v3core_i9-10980xe_firmwarexeon_e5-2699a_v4core_i7-9800xxeon_e5-2695_v3_firmwarexeon_e5-2658_v3_firmwarexeon_e5-4620_v4core_i9-7920x_firmwarexeon_e5-2618l_v3_firmwarexeon_e5-1650_v3xeon_e5-2699_v4_firmwarexeon_e5-2630l_v4_firmwarecore_i5-7640x_firmwarexeon_e5-2650l_v4core_i7-7800x_firmwarexeon_e5-1630_v3_firmwarexeon_e5-2683_v4xeon_e5-2683_v3_firmwarecore_i7-5930k_firmwarexeon_e5-4660_v4_firmwarexeon_e5-2650_v3_firmwarexeon_e5-2623_v4_firmwarexeon_e5-2695_v3xeon_e5-1428l_v3_firmwarecore_i9-9940xxeon_e5-2658a_v3_firmwarexeon_e5-2680_v3xeon_e5-4628l_v4_firmwarexeon_e5-2650_v4_firmwarexeon_e5-4655_v3_firmwarecore_i7-6800kxeon_e5-2428l_v3xeon_e5-1620_v4_firmwarexeon_e5-2630l_v3_firmwarexeon_e5-2438l_v3xeon_e5-2667_v3_firmwarexeon_e5-2680_v4xeon_e5-1620_v4core_i7-4930kxeon_e5-1660_v3_firmwarexeon_e5-2667_v4core_i7-3960xxeon_e5-2648l_v4xeon_e5-2698_v4_firmwarecore_i7-3960x_firmwarexeon_e5-2628l_v3core_i9-7980xe_firmwarexeon_e5-2609_v4xeon_e5-4655_v4_firmwarexeon_e5-1680_v3_firmwarecore_i7-4820k_firmwarexeon_e5-1660_v4_firmwarecore_i9-7980xexeon_e5-2637_v3core_i7-9800x_firmwarexeon_e5-1620_v3xeon_e5-2680_v3_firmwarecore_i9-10980xexeon_e5-1660_v3xeon_e5-4640_v4xeon_e5-2667_v3core_i9-7940x_firmwarecore_i9-9980xe_firmwarexeon_e5-2630_v3_firmwarexeon_e5-2650l_v3xeon_e5-2628l_v3_firmwarecore_i7-3940xmcore_i9-9980xexeon_e5-2608l_v4_firmwarexeon_e5-2697_v3xeon_e5-4640_v4_firmwarecore_i7-4940mx_firmwarexeon_e5-2643_v4_firmwarexeon_e5-2667_v4_firmwarexeon_e5-2697_v4_firmwarexeon_e5-2428l_v3_firmwarexeon_e5-2643_v3_firmwarexeon_e5-2697_v3_firmwarexeon_e5-2640_v3xeon_e5-2418l_v3_firmwarexeon_e5-2648l_v4_firmwarexeon_e5-2695_v4xeon_e5-2683_v3xeon_e5-2609_v3core_i7-5820k_firmwarexeon_e5-2690_v3_firmwarecore_i7-5930kxeon_e5-2603_v3_firmwarexeon_e5-2630_v4core_i9-10900xcore_i7-7740x_firmwarecore_i7-6900kcore_i7-7820x_firmwarexeon_e5-4667_v4_firmwarecore_i9-9960x_firmwarecore_i9-7900x_firmwarexeon_e5-2408l_v3xeon_e5-4660_v3xeon_e5-2699r_v4core_i7-5820kxeon_e5-2628l_v4core_i7-5960x_firmwarexeon_e5-4610_v4_firmwarecore_i7-3970xcore_i7-6950xxeon_e5-2630_v3xeon_e5-4650_v3xeon_e5-2620_v4xeon_e5-1630_v3xeon_e5-2690_v4xeon_e5-2608l_v4xeon_e5-2609_v4_firmwarecore_i9-10940xxeon_e5-2695_v4_firmwarexeon_e5-1680_v4xeon_e5-2658a_v3xeon_e5-2620_v3_firmwarexeon_e5-2630_v4_firmwarexeon_e5-4669_v3xeon_e5-2438l_v3_firmwarexeon_e5-4627_v4_firmwarexeon_e5-2643_v3core_i9-7900xxeon_e5-2658_v4xeon_e5-2628l_v4_firmwarexeon_e5-4655_v4xeon_e5-2660_v4xeon_e5-4648_v3_firmwarecore_i7-6850kcore_i7-4930mxcore_i7-4940mxxeon_e5-4627_v3_firmwarexeon_e5-4669_v3_firmwarecore_i9-7960x_firmwarecore_i9-7920xxeon_e5-2670_v3xeon_e5-2697a_v4xeon_e5-2658_v4_firmwarexeon_e5-2623_v3core_i9-9960xxeon_e5-4610_v4xeon_e5-2697a_v4_firmwarexeon_e5-2623_v3_firmwarecore_i9-10920xcore_i9-9920xxeon_e5-2648l_v3xeon_e5-2637_v3_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2690_v4_firmwarecore_i5-7640xcore_i7-3930k_firmwarexeon_e5-4640_v3_firmwarexeon_e5-4660_v3_firmwarexeon_e5-2687w_v3_firmwarecore_i9-7940xxeon_e5-2660_v4_firmwarexeon_e5-2618l_v4_firmwarecore_i7-3970x_firmwarecore_i7-4930k_firmwarecore_i9-7960xcore_i9-9820xxeon_e5-2699a_v4_firmwarecore_i7-3820_firmwarexeon_e5-2608l_v3_firmwarexeon_e5-1650_v3_firmwarexeon_e5-2640_v4_firmwarecore_i7-4960x_firmwarexeon_e5-1650_v4xeon_e5-2609_v3_firmwarexeon_e5-2648l_v3_firmwarecore_i7-7820xcore_i7-3930kcore_i9-9900xxeon_e5-2603_v4_firmwarexeon_e5-4627_v4xeon_e5-1680_v3core_i9-10900x_firmwarecore_i7-4930mx_firmwarexeon_e5-4648_v3xeon_e5-2418l_v3core_i7-3820xeon_e5-4669_v4_firmwarecore_i7-3920xm_firmwarexeon_e5-2683_v4_firmwarexeon_e5-1680_v4_firmwarexeon_e5-1620_v3_firmwarexeon_e5-2698_v3xeon_e5-2630l_v3xeon_e5-4620_v3_firmwarexeon_e5-4655_v3core_i9-9920x_firmwarexeon_e5-2608l_v3xeon_e5-4669_v4xeon_e5-1630_v4_firmwarecore_i7-5960xxeon_e5-2699_v4core_i7-7800xxeon_e5-4627_v3xeon_e5-4610_v3xeon_e5-2650_v4xeon_e5-2660_v3xeon_e5-2698_v4core_i9-9820x_firmwarexeon_e5-4628l_v4core_i7-4960xxeon_e5-4667_v3xeon_e5-4620_v3xeon_e5-2408l_v3_firmwarecore_i9-9900x_firmwarexeon_e5-1428l_v3xeon_e5-2658_v3xeon_e5-2687w_v4xeon_e5-2643_v4xeon_e5-4650_v4core_i9-9940x_firmwarecore_i9-10920x_firmwarexeon_e5-2637_v4core_i7-6800k_firmwarecore_i7-4820kcore_i9-10940x_firmwarexeon_e5-2620_v3xeon_e5-2697_v4xeon_e5-2618l_v4xeon_e5-2660_v3_firmwarexeon_e5-4650_v4_firmwarexeon_e5-2680_v4_firmwarexeon_e5-1660_v4xeon_e5-2650l_v4_firmwarexeon_e5-2603_v4xeon_e5-1650_v4_firmwarexeon_e5-2650l_v3_firmwarecore_i7-7740xxeon_e5-4650_v3_firmwarexeon_e5-4667_v4Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2022-21794
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.7||HIGH
EPSS-0.05% / 16.77%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC Business, Intel(R) NUC Enthusiast, Intel(R) NUC Kits before version HN0067 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_8_enthusiast_nuc8i7hvkvawnuc_8_enthusiast_nuc8i7hvkva_firmwarenuc_8_enthusiast_nuc8i7hvkvaw_firmwarenuc_kit_nuc8i7hvk_firmwarenuc_kit_nuc8i7hnk_firmwarenuc_kit_nuc8i7hnknuc_kit_nuc8i7hvknuc_8_business_nuc8i7hnkqcnuc_8_business_nuc8i7hnkqc_firmwarenuc_8_enthusiast_nuc8i7hvkvaIntel(R) NUC Boards, Intel(R) NUC Business, Intel(R) NUC Enthusiast, Intel(R) NUC Kits
CWE ID-CWE-287
Improper Authentication
CVE-2023-22449
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 6.71%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-09 Oct, 2024 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_pro_board_nuc12wsbi70znuc_13_extreme_compute_element_nuc13sbbi9_firmwarenuc_laptop_kit_lapkc51e_firmwarenuc_pro_board_nuc11tnhv50lnuc_12_compute_element_elm12hbc_firmwarenuc_pro_ki_nuc11tnkv5_firmwarenuc_pro_kit_nuc12wshi30l_firmwarenuc_pro_mini_pc_nuc11tnkv50z_firmwarenuc_laptop_kit_lapkc71e_firmwarenuc_13_extreme_kit_nuc13rngi7nuc_13_extreme_compute_element_nuc13sbbi5nuc_laptop_kit_lapbc710_firmwarenuc_pro_ki_nuc11tnkv50znuc_pro_board_nuc12wshi7nuc_pro_board_nuc12wsbi5_firmwarenuc_11_performance_mini_pc_nuc11pahi3nuc_pro_ki_nuc11tnbv7nuc_pro_board_nuc12wshi70z_firmwarenuc_pro_board_nuc12wski70z_firmwarenuc_boards_nuc11tnhi70l_firmwarenuc_13_extreme_compute_element_nuc13sbbi7fnuc_boards_nuc11tnbi30z_firmwarenuc_pro_mini_pc_nuc11tnkv7_firmwarenuc_11_performance_mini_pc_nuc11paki3nuc_13_extreme_compute_element_nuc13sbbi5_firmwarenuc_pro_ki_nuc11tnkv50z_firmwarenuc_11_performance_mini_pc_nuc11paki7_firmwarenuc_laptop_kits_lapac71g_firmwarenuc_11_performance_kit_nuc11pahi30znuc_pro_board_nuc12wsbi50z_firmwarenuc_11_performance_kit_nuc11pahi30z_firmwarenuc_11_compute_element_cm11ebc4w_firmwarenuc_pro_board_nuc12wshi30z_firmwarenuc_boards_nuc11tnbi50znuc_boards_nuc11tnhi70znuc_pro_kit_nuc12wsbi5_firmwarenuc_essential_nuc11atbc4_firmwarenuc_pro_mini_pc_nuc11tnbv7nuc_boards_nuc11tnki30z_firmwarenuc_pro_kit_nuc12wsbi70znuc_pro_board_nuc11tnkv50znuc_boards_nuc11tnki30znuc_pro_kit_nuc12wsbi5nuc_enthusiast_nuc12snki72nuc_boards_nuc11tnki50z_firmwarenuc_11_performance_mini_pc_nuc11paki3_firmwarenuc_extreme_nuc12dcmi9_firmwarenuc_11_performance_mini_pc_nuc11pahi7nuc_13_extreme_kit_nuc13rngi7_firmwarenuc_enthusiast_nuc12snki72vanuc_boards_nuc11tnki50znuc_pro_kit_nuc12wshi50znuc_pro_ki_nuc11tnhv7nuc_pro_board_nuc11tnbv7_firmwarenuc_pro_kit_nuc12wski50z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qanuc_boards_nuc11tnki5nuc_pro_board_nuc12wski7nuc_essential_nuc11atkc2nuc_boards_nuc11tnhi50znuc_pro_board_nuc12wsbi3nuc_boards_nuc11tnbi5_firmwarenuc_11_performance_mini_pc_nuc11paki7nuc_boards_nuc11tnki7nuc_pro_board_nuc12wsbi70z_firmwarenuc_laptop_kit_lapbc710nuc_11_performance_mini_pc_nuc11pahi7_firmwarenuc_pro_kit_nuc12wshi30znuc_11_performance_kit_nuc11paqi50wanuc_pro_mini_pc_nuc11tnhv5_firmwarenuc_13_extreme_compute_element_nuc13sbbi7_firmwarenuc_laptop_kit_lapkc71fnuc_11_performance_mini_pc_nuc11pahi50znuc_pro_mini_pc_nuc11tnhv70lnuc_11_performance_kit_nuc11pahi3_firmwarenuc_pro_board_nuc12wsbi30znuc_essential_nuc11atkc2_firmwarenuc_laptop_kit_lapbc510_firmwarenuc_pro_ki_nuc11tnhv70l_firmwarenuc_boards_nuc11tnki3_firmwarenuc_11_compute_element_cm11ebi58wnuc_boards_nuc11tnbi30znuc_13_extreme_kit_nuc13rngi9_firmwarenuc_11_performance_mini_pc_nuc11pahi70z_firmwarenuc_12_compute_element_elm12hbcnuc_essential_nuc11atkpenuc_boards_nuc11tnhi30l_firmwarenuc_11_performance_mini_pc_nuc11pahi70znuc_boards_nuc11tnhi30z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_boards_nuc11tnhi3nuc_pro_board_nuc12wshi5_firmwarenuc_laptop_kit_lapkc51enuc_11_performance_kit_nuc11pahi50znuc_pro_board_nuc12wshi30lnuc_pro_kit_nuc12wsbi3nuc_boards_nuc11tnhi50z_firmwarenuc_boards_nuc11tnhi7_firmwarenuc_pro_board_nuc11tnbv5nuc_laptop_kit_laprc710_firmwarenuc_pro_board_nuc12wshi3nuc_pro_board_nuc12wsbi50znuc_pro_board_nuc11tnhv7_firmwarenuc_pro_kit_nuc12wski70z_firmwarenuc_essential_nuc11atkc4nuc_11_performance_mini_pc_nuc11pahi50z_firmwarenuc_13_extreme_kit_nuc13rngi9nuc_11_compute_element_cm11ebi38w_firmwarenuc_11_performance_kit_nuc11paki3_firmwarenuc_11_performance_mini_pc_nuc11pahi5nuc_pro_kit_nuc12wski7nuc_12_compute_element_elm12hbi3nuc_pro_ki_nuc11tnhv5_firmwarenuc_boards_nuc11tnki70znuc_11_compute_element_cm11ebi38wnuc_boards_nuc11tnhi3_firmwarenuc_13_extreme_compute_element_nuc13sbbi7f_firmwarenuc_12_compute_element_elm12hbi5nuc_pro_board_nuc12wshi7_firmwarenuc_11_performance_kit_nuc11paki7nuc_pro_ki_nuc11tnbv5nuc_11_performance_kit_nuc11pahi70znuc_pro_ki_nuc11tnhv5nuc_pro_board_nuc11tnkv5_firmwarenuc_boards_nuc11tnbi7_firmwarenuc_boards_nuc11tnhi50lnuc_pro_kit_nuc12wski7_firmwarenuc_boards_nuc11tnhi30p_firmwarenuc_pro_mini_pc_nuc11tnhv7_firmwarenuc_boards_nuc11tnki7_firmwarenuc_boards_nuc11tnhi70q_firmwarenuc_pro_board_nuc12wski5_firmwarenuc_pro_kit_nuc12wski30znuc_laptop_kit_lapkc71enuc_pro_board_nuc12wshi50znuc_11_performance_mini_pc_nuc11paki5nuc_11_compute_element_cm11ebi716wnuc_extreme_nuc12dcmi7_firmwarenuc_pro_board_nuc12wshi30znuc_pro_ki_nuc11tnhv70lnuc_pro_kit_nuc12wski70znuc_pro_board_nuc12wski3_firmwarenuc_pro_mini_pc_nuc11tnkv5_firmwarenuc_pro_kit_nuc12wshi5_firmwarenuc_12_extreme_compute_element_nuc12dcmi9_firmwarenuc_laptop_kit_laprc510_firmwarenuc_pro_board_nuc11tnhv50l_firmwarenuc_pro_kit_nuc12wski3nuc_pro_ki_nuc11tnhv50l_firmwarenuc_pro_mini_pc_nuc11tnbv7_firmwarenuc_boards_nuc11tnki5_firmwarenuc_pro_kit_nuc12wski3_firmwarenuc_pro_kit_nuc12wsbi3_firmwarenuc_extreme_compute_element_nuc11dbbi9nuc_nuc11phki7cnuc_pro_mini_pc_nuc11tnbv5_firmwarenuc_extreme_compute_element_nuc11dbbi7nuc_11_performance_mini_pc_nuc11pahi5_firmwarenuc_13_extreme_compute_element_nuc13sbbi9fnuc_11_performance_kit_nuc11pahi3nuc_nuc11phki7c_firmwarenuc_13_extreme_compute_element_nuc13sbbi9f_firmwarenuc_pro_board_nuc11tnkv50z_firmwarenuc_11_performance_kit_nuc11pahi50z_firmwarenuc_pro_board_nuc12wshi70znuc_pro_board_nuc12wski30z_firmwarenuc_essential_nuc11atkc4_firmwarenuc_boards_nuc11tnhi50w_firmwarenuc_13_extreme_compute_element_nuc13sbbi5f_firmwarenuc_boards_nuc11tnhi70lnuc_12_extreme_compute_element_nuc12dcmi7nuc_boards_nuc11tnhi50l_firmwarenuc_extreme_nuc12dcmi7nuc_pro_board_nuc12wshi30l_firmwarenuc_boards_nuc11tnhi30znuc_extreme_nuc12edbi7_firmwarenuc_12_extreme_compute_element_nuc12edbi9_firmwarenuc_pro_kit_nuc12wsbi50znuc_11_performance_kit_nuc11paqi50wa_firmwarenuc_pro_board_nuc11tnbv5_firmwarenuc_13_extreme_kit_nuc13rngi5nuc_pro_kit_nuc12wshi7_firmwarenuc_pro_kit_nuc12wshi7nuc_laptop_kit_lapbc510nuc_extreme_compute_element_nuc11dbbi9_firmwarenuc_pro_mini_pc_nuc11tnhv50lnuc_boards_nuc11tnbi7nuc_pro_ki_nuc11tnkv7_firmwarenuc_11_performance_kit_nuc11paki5_firmwarenuc_boards_nuc11tnhi30lnuc_pro_kit_nuc12wski30z_firmwarenuc_pro_ki_nuc11tnbv5_firmwarenuc_pro_ki_nuc11tnkv7nuc_essential_nuc11atkpe_firmwarenuc_pro_board_nuc12wsbi3_firmwarenuc_pro_kit_nuc12wshi5nuc_pro_board_nuc12wski50z_firmwarenuc_extreme_compute_element_nuc11btmi7nuc_extreme_nuc12edbi7nuc_pro_kit_nuc12wski5nuc_boards_nuc11tnhi7nuc_pro_mini_pc_nuc11tnhv7nuc_11_performance_kit_nuc11pahi5_firmwarenuc_pro_board_nuc12wski3nuc_12_extreme_compute_element_nuc12edbi7_firmwarenuc_12_compute_element_elm12hbi5_firmwarenuc_pro_kit_nuc12wshi50z_firmwarenuc_pro_mini_pc_nuc11tnbv5nuc_pro_board_nuc11tnkv7_firmwarenuc_boards_nuc11tnbi50z_firmwarenuc_11_performance_kit_nuc11paki3nuc_12_compute_element_elm12hbi7nuc_13_extreme_compute_element_nuc13sbbi5fnuc_pro_kit_nuc12wshi3nuc_11_performance_mini_pc_nuc11pahi30z_firmwarenuc_boards_nuc11tnhi70z_firmwarenuc_11_performance_kit_nuc11paqi70qanuc_pro_board_nuc11tnkv7nuc_nuc11phki7caa_firmwarenuc_pro_board_nuc12wski30znuc_boards_nuc11tnbi3_firmwarenuc_boards_nuc11tnhi5nuc_pro_ki_nuc11tnhv50lnuc_pro_board_nuc11tnhv5_firmwarenuc_11_performance_mini_pc_nuc11pahi3_firmwarenuc_pro_ki_nuc11tnhv7_firmwarenuc_extreme_nuc12dcmi9nuc_boards_nuc11tnhi50wnuc_13_extreme_compute_element_nuc13sbbi9nuc_boards_nuc11tnbi70z_firmwarenuc_pro_ki_nuc11tnbv7_firmwarenuc_extreme_compute_element_nuc11btmi9_firmwarenuc_enthusiast_nuc12snki72va_firmwarenuc_pro_mini_pc_nuc11tnhv5nuc_boards_nuc11tnki3nuc_pro_board_nuc12wski50znuc_11_performance_kit_nuc11paqi70qa_firmwarenuc_11_performance_mini_pc_nuc11paqi50wanuc_boards_nuc11tnki70z_firmwarenuc_pro_kit_nuc12wsbi50z_firmwarenuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_pro_kit_nuc12wshi70z_firmwarenuc_11_performance_kit_nuc11pahi7nuc_pro_board_nuc12wski70znuc_laptop_kits_lapac71gnuc_pro_mini_pc_nuc11tnhv50l_firmwarenuc_laptop_kit_laprc510nuc_pro_board_nuc11tnbv7nuc_11_compute_element_cm11ebc4wnuc_pro_board_nuc12wski7_firmwarenuc_pro_mini_pc_nuc11tnkv5nuc_pro_kit_nuc12wshi70znuc_boards_nuc11tnhi70qnuc_extreme_nuc12edbi9nuc_laptop_kit_lapkc71f_firmwarenuc_nuc11phki7caanuc_pro_mini_pc_nuc11tnkv7nuc_pro_kit_nuc12wsbi70z_firmwarenuc_11_performance_kit_nuc11paki5nuc_extreme_compute_element_nuc11btmi9nuc_pro_board_nuc12wski5nuc_pro_board_nuc11tnkv5nuc_pro_board_nuc11tnhv70l_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc_13_extreme_compute_element_nuc13sbbi7nuc_13_extreme_kit_nuc13rngi5_firmwarenuc_11_performance_kit_nuc11pahi70z_firmwarenuc_extreme_compute_element_nuc11btmi7_firmwarenuc_boards_nuc11tnbi70znuc_12_extreme_compute_element_nuc12dcmi7_firmwarenuc_12_extreme_compute_element_nuc12edbi7nuc_laptop_kits_lapac71h_firmwarenuc_extreme_nuc12edbi9_firmwarenuc_12_compute_element_elm12hbi7_firmwarenuc_12_compute_element_elm12hbi3_firmwarenuc_extreme_compute_element_nuc11dbbi7_firmwarenuc_boards_nuc11tnbi5nuc_11_performance_mini_pc_nuc11pahi30znuc_pro_board_nuc12wsbi5nuc_pro_board_nuc11tnhv70lnuc_boards_nuc11tnhi5_firmwarenuc_pro_kit_nuc12wshi30z_firmwarenuc_laptop_kits_lapac71hnuc_11_compute_element_cm11ebi58w_firmwarenuc_pro_kit_nuc12wsbi30z_firmwarenuc_11_performance_kit_nuc11pahi5nuc_boards_nuc11tnhi30pnuc_essential_nuc11atbc4nuc_11_performance_kit_nuc11pahi7_firmwarenuc_pro_kit_nuc12wsbi30znuc_pro_board_nuc12wshi5nuc_pro_kit_nuc12wshi30lnuc_pro_ki_nuc11tnkv5nuc_pro_kit_nuc12wshi3_firmwarenuc_pro_mini_pc_nuc11tnkv50znuc_12_extreme_compute_element_nuc12dcmi9nuc_pro_kit_nuc12wski50znuc_enthusiast_nuc12snki72_firmwarenuc_boards_nuc11tnbi3nuc_pro_board_nuc12wshi3_firmwarenuc_pro_board_nuc11tnhv7nuc_11_performance_mini_pc_nuc11paki5_firmwarenuc_12_extreme_compute_element_nuc12edbi9nuc_pro_mini_pc_nuc11tnhv70l_firmwarenuc_pro_board_nuc12wshi50z_firmwarenuc_laptop_kit_laprc710nuc_pro_board_nuc12wsbi30z_firmwarenuc_pro_kit_nuc12wski5_firmwarenuc_pro_board_nuc11tnhv5Intel(R) NUC BIOS firmwarebios
CWE ID-CWE-20
Improper Input Validation
CVE-2023-42766
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.58%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel NUC 8 Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_8_compute_element_cm8v5cb_firmwarenuc_8_compute_element_cm8v7cb_firmwarenuc_8_compute_element_cm8v7cbnuc_8_compute_element_cm8v5cbIntel NUC 8 Compute Element BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-26343
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.49%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276lxeon_d-2796texeon_silver_4210r_firmwarexeon_platinum_8170_firmwarexeon_platinum_9222xeon_bronze_3104_firmwarexeon_gold_6230txeon_d-1627_firmwarexeon_d-2738xeon_gold_6126f_firmwarexeon_gold_6146xeon_gold_6126txeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_d-1527xeon_d-2766ntxeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_gold_5217_firmwarexeon_gold_6138xeon_d-1746ter_firmwarexeon_d-2163it_firmwarexeon_gold_6246xeon_d-2776ntxeon_platinum_8164xeon_d-1521_firmwarexeon_d-1527_firmwarexeon_d-2798ntxeon_d-1733ntxeon_gold_6240_firmwarexeon_gold_6234xeon_d-1557_firmwarexeon_d-2775te_firmwarexeon_silver_4116t_firmwarexeon_d-2766nt_firmwarexeon_gold_6238rxeon_d-1518xeon_d-1714xeon_gold_5215xeon_platinum_p-8136_firmwarexeon_d-2799_firmwarexeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_d-2143itxeon_d-2163itxeon_platinum_8168xeon_gold_6244_firmwarexeon_d-1734nt_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_gold_5218xeon_d-1567_firmwarexeon_d-1567xeon_silver_4109txeon_bronze_3206r_firmwarexeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_6138t_firmwarexeon_gold_5220r_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_5122_firmwarexeon_silver_4215rxeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_d-1746terxeon_gold_6136_firmwarexeon_silver_4210txeon_gold_6212u_firmwarexeon_gold_6126_firmwarexeon_gold_6212uxeon_d-1531_firmwarexeon_gold_6240l_firmwarexeon_silver_4114xeon_d-2123it_firmwarexeon_gold_6248rxeon_gold_6250l_firmwarexeon_silver_4214r_firmwarexeon_d-1715terxeon_platinum_8276_firmwarexeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6150_firmwarexeon_d-1736_firmwarexeon_gold_6250xeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_gold_5218n_firmwarexeon_d-2796ntxeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_platinum_8260y_firmwarexeon_d-2779xeon_gold_6144_firmwarexeon_d-1602xeon_gold_6126fxeon_d-1712trxeon_d-1539xeon_d-2796te_firmwarexeon_silver_4109t_firmwarexeon_gold_5218txeon_platinum_p-8124xeon_d-1713ntexeon_gold_6150xeon_gold_6240y_firmwarexeon_gold_6242_firmwarexeon_d-2752ter_firmwarexeon_gold_5220rxeon_silver_4114_firmwarexeon_gold_6140xeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_gold_6230_firmwarexeon_d-2146ntxeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_d-1577_firmwarexeon_platinum_p-8136xeon_gold_6148f_firmwarexeon_d-2145nt_firmwarexeon_gold_6250lxeon_gold_6210uxeon_d-1726_firmwarexeon_d-2187ntxeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_gold_6126xeon_platinum_8158_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_d-2776nt_firmwarexeon_d-1732te_firmwarexeon_d-2712t_firmwarexeon_d-1623n_firmwarexeon_platinum_p-8124_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6134_firmwarexeon_d-1548_firmwarexeon_d-1713nte_firmwarexeon_gold_6130t_firmwarexeon_gold_6242r_firmwarexeon_gold_5218r_firmwarexeon_gold_6130f_firmwarexeon_d-2183itxeon_silver_4116txeon_d-1622xeon_d-1559_firmwarexeon_gold_6246r_firmwarexeon_gold_6142fxeon_d-2145ntxeon_gold_6238xeon_platinum_8153_firmwarexeon_gold_6126t_firmwarexeon_gold_6130xeon_d-1529_firmwarexeon_d-1540_firmwarexeon_d-1637_firmwarexeon_silver_4214y_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_silver_4208xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_silver_4214_firmwarexeon_d-2142it_firmwarexeon_gold_5220sxeon_d-2143it_firmwarexeon_d-1736xeon_platinum_9282xeon_platinum_9242xeon_gold_5119t_firmwarexeon_d-1735trxeon_d-1513n_firmwarexeon_d-2795nt_firmwarexeon_platinum_8280lxeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_silver_4110xeon_bronze_3204xeon_d-1523n_firmwarexeon_d-2752ntexeon_d-2753nt_firmwarexeon_platinum_8280_firmwarexeon_gold_6240r_firmwarexeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_6246rxeon_gold_5217xeon_gold_6230nxeon_silver_4215r_firmwarexeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_bronze_3106xeon_gold_6138txeon_d-1718txeon_gold_6248r_firmwarexeon_gold_6256_firmwarexeon_platinum_9221_firmwarexeon_gold_5120xeon_d-1523nxeon_d-2786nte_firmwarexeon_d-2786ntexeon_d-1540xeon_d-1653nxeon_gold_5220xeon_platinum_8160txeon_gold_6154_firmwarexeon_d-1528xeon_silver_4214rxeon_d-1577xeon_d-1637xeon_gold_6254xeon_silver_4114txeon_d-1715ter_firmwarexeon_silver_4209t_firmwarexeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_gold_6230t_firmwarexeon_d-2141ixeon_d-1541xeon_gold_5215l_firmwarexeon_d-1543n_firmwarexeon_silver_4208_firmwarexeon_gold_6208uxeon_d-1633n_firmwarexeon_platinum_8268xeon_d-1722ne_firmwarexeon_gold_6252n_firmwarexeon_d-1747ntexeon_gold_5120t_firmwarexeon_gold_6230n_firmwarexeon_d-1653n_firmwarexeon_gold_5222xeon_d-1734ntxeon_d-1735tr_firmwarexeon_d-1747nte_firmwarexeon_platinum_8270_firmwarexeon_gold_6230r_firmwarexeon_d-1553nxeon_d-1571_firmwarexeon_silver_4209txeon_gold_6234_firmwarexeon_silver_4116xeon_d-1633nxeon_gold_6210u_firmwarexeon_d-1548xeon_gold_6252nxeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_gold_6244xeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_d-1518_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_d-2738_firmwarexeon_gold_6152_firmwarexeon_d-1713ntxeon_gold_6146_firmwarexeon_platinum_8176f_firmwarexeon_gold_6148fxeon_d-1520xeon_gold_5218_firmwarexeon_gold_6132xeon_d-2752terxeon_d-2799xeon_gold_6238t_firmwarexeon_d-2146nt_firmwarexeon_gold_6152xeon_platinum_8256xeon_gold_6238l_firmwarexeon_d-2795ntxeon_platinum_8158xeon_d-1739_firmwarexeon_gold_5218b_firmwarexeon_d-1736ntxeon_gold_6222vxeon_d-1713nt_firmwarexeon_d-1520_firmwarexeon_platinum_8176xeon_platinum_8160_firmwarexeon_gold_6242xeon_d-2798nt_firmwarexeon_silver_4112_firmwarexeon_d-1623nxeon_d-1531xeon_gold_6262v_firmwarexeon_gold_6142xeon_platinum_8260yxeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_d-1722nexeon_gold_6148_firmwarexeon_gold_6128xeon_silver_4215xeon_gold_5220t_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_d-1718t_firmwarexeon_d-2142itxeon_gold_5118xeon_gold_5220_firmwarexeon_gold_6130fxeon_d-1622_firmwarexeon_silver_4210t_firmwarexeon_gold_6208u_firmwarexeon_d-2796nt_firmwarexeon_silver_4214xeon_gold_6142f_firmwarexeon_d-1702_firmwarexeon_platinum_8276xeon_d-1749nt_firmwarexeon_gold_6250_firmwarexeon_d-2161ixeon_silver_4210rxeon_platinum_8164_firmwarexeon_gold_6238txeon_d-2141i_firmwarexeon_silver_4214yxeon_gold_5218bxeon_silver_4216_firmwarexeon_gold_6138pxeon_gold_6254_firmwarexeon_gold_6138p_firmwarexeon_platinum_8176fxeon_gold_6240rxeon_d-1748texeon_gold_6258r_firmwarexeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1739xeon_d-1543nxeon_gold_6209uxeon_d-1528_firmwarexeon_d-1539_firmwarexeon_silver_4112xeon_d-1559xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_6256xeon_d-1521xeon_d-1702xeon_gold_6238r_firmwarexeon_gold_5120txeon_gold_6230rxeon_gold_6252xeon_gold_6134xeon_d-1748te_firmwarexeon_d-1749ntxeon_d-1712tr_firmwarexeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_d-2183it_firmwarexeon_gold_6252_firmwarexeon_d-2753ntxeon_d-1557xeon_gold_6148xeon_d-2775texeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lxeon_gold_6144xeon_d-1714_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_d-1726xeon_platinum_9282_firmwarexeon_platinum_8180xeon_d-2177ntxeon_d-1553n_firmwarexeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_gold_5220tIntel(R) Processors
CVE-2020-24509
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.09%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:47
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient control flow management in subsystem in Intel(R) SPS versions before SPS_E3_05.01.04.300.0, SPS_SoC-A_05.00.03.091.0, SPS_E5_04.04.04.023.0, or SPS_E5_04.04.03.263.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_platform_servicesIntel(R) SPS versions
CVE-2022-24382
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.65%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_11_pro_kit_nuc11tnhi30l_firmwarenuc11dbbi7_firmwarenuc_9_pro_compute_element_nuc9vxqnb_firmwarenuc_11_pro_kit_nuc11tnki7nuc11pa_firmwarenuc8i3cysnnuc_9_pro_kit_nuc9vxqnx_firmwarenuc_11_compute_element_cm11ebi58w_firmwarenuc_11_pro_board_nuc11tnbi50znuc_11_pro_kit_nuc11tnki30z_firmwarenuc_8_compute_element_cm8pcbnuc_8_compute_element_cm8pcb_firmwarelapkc71fnuc_11_pro_board_nuc11tnbi70z_firmwarenuc_11_pro_board_nuc11tnbi7nuc_11_compute_element_cm11ebc4w_firmwarenuc_11_pro_kit_nuc11tnki50znuc_11_pro_kit_nuc11tnki5nuc_kit_nuc8i5benuc8i3cysmlapbc710nuc_11_pro_kit_nuc11tnhi50znuc_8_compute_element_cm8i3cbnuc8i3cysn_firmwarenuc_kit_nuc8i5be_firmwarenuc11pahnuc_11_pro_board_nuc11tnbi30z_firmwarenuc_9_pro_kit_nuc9v7qnx_firmwarenuc_8_compute_element_cm8ccbnuc11dbbi9_firmwarenuc_11_pro_board_nuc11tnbi5nuc_9_pro_compute_element_nuc9v7qnblapbc710_firmwarelapkc51enuc_11_pro_kit_nuc11tnki3nuc_11_pro_kit_nuc11tnki70znuc_8_compute_element_cm8i7cblapkc71f_firmwarenuc_11_enthusiast_kit_nuc11phki7cnuc11panuc_11_pro_kit_nuc11tnhi70lnuc_11_pro_kit_nuc11tnhi50lnuc_8_compute_element_cm8i7cb_firmwarenuc9i9qnnuc_11_pro_board_nuc11tnbi70znuc_11_pro_kit_nuc11tnhi30znuc_11_pro_kit_nuc11tnhi50w_firmwarelapbc510_firmwarenuc_11_compute_element_cm11ebi716wnuc_11_pro_kit_nuc11tnki30znuc_kit_nuc8i3b_firmwarenuc11btmi9nuc11btmi7nuc9i7qnnuc9i7qn_firmwarenuc_8_compute_element_cm8i5cb_firmwarenuc_11_compute_element_cm11ebi38w_firmwarenuc_11_pro_kit_nuc11tnhi70l_firmwarenuc_11_pro_kit_nuc11tnhi70qnuc_11_pro_kit_nuc11tnhi70znuc9i5qn_firmwarenuc_kit_nuc8i7be_firmwarenuc_11_pro_kit_nuc11tnhi30lnuc8i3cysm_firmwarelapkc71e_firmwarenuc_11_pro_kit_nuc11tnhi30z_firmwarenuc_11_pro_board_nuc11tnbi5_firmwarenuc_11_pro_kit_nuc11tnki50z_firmwarenuc11paq_firmwarenuc_11_pro_board_nuc11tnbi3_firmwarenuc_11_pro_kit_nuc11tnhi5_firmwarenuc_11_pro_kit_nuc11tnhi7_firmwarenuc_kit_nuc8i3bnuc_11_pro_kit_nuc11tnhi50l_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caanuc11btmi9_firmwarenuc_9_pro_kit_nuc9vxqnxnuc_11_pro_board_nuc11tnbi30znuc_11_pro_kit_nuc11tnhi3nuc_11_enthusiast_kit_nuc11phki7c_firmwarenuc_11_pro_board_nuc11tnbi3nuc_11_pro_kit_nuc11tnhi7nuc_11_pro_board_nuc11tnbi7_firmwarenuc_11_pro_kit_nuc11tnki5_firmwarelapbc510nuc_11_pro_kit_nuc11tnki3_firmwarenuc_8_compute_element_cm8i5cbnuc_11_pro_kit_nuc11tnhi70q_firmwarenuc11pah_firmwarenuc_8_compute_element_cm8i3cb_firmwarelapkc51e_firmwarenuc_11_compute_element_cm11ebi716w_firmwarenuc11paqnuc_9_pro_compute_element_nuc9v7qnb_firmwarenuc_11_pro_kit_nuc11tnki70z_firmwarenuc_9_pro_kit_nuc9v7qnxnuc_11_compute_element_cm11ebi58wnuc_11_pro_kit_nuc11tnhi5nuc_11_pro_kit_nuc11tnhi3_firmwarenuc_11_pro_board_nuc11tnbi50z_firmwarenuc_11_compute_element_cm11ebc4wnuc11dbbi9nuc11btmi7_firmwarenuc_11_pro_kit_nuc11tnhi50wnuc_kit_nuc8i7benuc_11_pro_kit_nuc11tnki7_firmwarenuc_11_pro_kit_nuc11tnhi30p_firmwarenuc_11_pro_kit_nuc11tnhi30pnuc_11_pro_kit_nuc11tnhi70z_firmwarenuc_8_compute_element_cm8ccb_firmwarenuc_11_enthusiast_mini_pc_nuc11phki7caa_firmwarenuc9i5qnnuc11dbbi7nuc9i9qn_firmwarenuc_11_pro_kit_nuc11tnhi50z_firmwarenuc_9_pro_compute_element_nuc9vxqnblapkc71enuc_11_compute_element_cm11ebi38wIntel(R) NUCs
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found