Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-27383

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-14 Nov, 2023 | 19:05
Updated At-02 Aug, 2024 | 12:09
Rejected At-
Credits

Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:14 Nov, 2023 | 19:05
Updated At:02 Aug, 2024 | 12:09
Rejected At:
▼CVE Numbering Authority (CNA)

Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.

Affected Products
Vendor
n/a
Product
Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software
Default Status
unaffected
Versions
Affected
  • before version 2021.9
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-693Protection mechanism failure
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-693
Description: Protection mechanism failure
Metrics
VersionBase scoreBase severityVector
3.16.8MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:14 Nov, 2023 | 19:15
Updated At:30 Nov, 2023 | 16:39

Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.16.8MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Intel Corporation
intel
>>advisor>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>inspector>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:inspector:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>mpi_library>>Versions before 2021.9(exclusive)
cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>oneapi_base_toolkit>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>oneapi_hpc_toolkit>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE-693Secondarysecure@intel.com
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-693
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.htmlsecure@intel.com
Patch
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
Source: secure@intel.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

16Records found

CVE-2022-21216
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.38%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-13 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8358xeon_gold_5315yxeon_platinum_8352s_firmwarexeon_platinum_8362atom_p5322_firmwarexeon_platinum_8354hxeon_gold_6338xeon_silver_4310_firmwarexeon_gold_6338t_firmwarexeon_gold_6338n_firmwarexeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_platinum_8360hl_firmwarexeon_platinum_8368xeon_gold_6354_firmwareatom_p5322xeon_gold_6326xeon_silver_4310tatom_p5362xeon_gold_5317_firmwarexeon_platinum_8380xeon_gold_6314u_firmwareatom_c5320_firmwarexeon_silver_4316xeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_gold_5318y_firmwarexeon_gold_6330n_firmwarexeon_platinum_8352vxeon_gold_6336yatom_p5921batom_c5325xeon_gold_6348_firmwarexeon_gold_5318s_firmwarexeon_platinum_8380hxeon_platinum_8360hlatom_p5332xeon_platinum_8368q_firmwarexeon_platinum_8380_firmwarexeon_platinum_8376hxeon_gold_6330_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8362_firmwarexeon_silver_4310t_firmwarexeon_gold_6314uxeon_gold_5320_firmwareatom_p5332_firmwareatom_c5310xeon_platinum_8380hl_firmwareatom_c5315_firmwarexeon_platinum_8360h_firmwarexeon_gold_6354xeon_gold_6336y_firmwareatom_p5942bxeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwareatom_p5352xeon_gold_6330hxeon_gold_5318hxeon_platinum_8376hlxeon_silver_4316_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8358p_firmwarexeon_gold_5320xeon_platinum_8360yxeon_gold_6330h_firmwareatom_c5310_firmwarexeon_gold_6338txeon_gold_6346xeon_gold_5318sxeon_gold_6338natom_p5342_firmwarexeon_platinum_8356h_firmwareatom_p5931bxeon_platinum_8360hxeon_gold_5315y_firmwareatom_p5342atom_c5315xeon_gold_6348atom_p5352_firmwarexeon_gold_6330nxeon_platinum_8368_firmwarexeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8358pxeon_platinum_8352v_firmwarexeon_gold_6328h_firmwarexeon_platinum_8368qatom_p5931b_firmwarexeon_gold_5320t_firmwarexeon_silver_4310xeon_gold_6328hl_firmwarexeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_platinum_8356hxeon_gold_6348h_firmwareatom_p5962b_firmwareatom_c5325_firmwarexeon_gold_6342xeon_platinum_8360y_firmwarexeon_gold_5318h_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_gold_5320tatom_c5320xeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yatom_p5362_firmwareatom_p5942b_firmwarexeon_gold_6312uxeon_gold_5320h_firmwarexeon_gold_6328hatom_p5921b_firmwarexeon_gold_6334_firmwareatom_p5962bxeon_gold_6328hlxeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwareIntel(R) Atom and Intel Xeon Scalable Processors
CVE-2023-31273
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-10||CRITICAL
EPSS-0.36% / 57.75%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managerIntel DCM software
CWE ID-CWE-693
Protection Mechanism Failure
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-32644
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.10% / 28.17%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-29 Oct, 2024 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-killer_wi-fi_6e_ax1690proset\/wirelesskillerwi-fi_6_ax201wi-fi_6e_ax211killer_wi-fi_6e_ax1675wi-fi_6e_ax210wi-fi_6_ax200wi-fi_6e_ax411killer_wi-fi_6_ax1650Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2023-25080
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 28.55%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-02 Aug, 2024 | 11:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-openvinoIntel(R) Distribution of OpenVINO toolkit software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2023-22655
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 8.23%
||
7 Day CHG~0.00%
Published-14 Mar, 2024 | 16:45
Updated-13 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX4th_gen_intel_xeon_scalable_processors_with_intel_vran4th_gen_intel_xeon_bronze_processors4th_gen_intel_xeon_gold_processorsxeon_d_processorxeon_cpu_max_series_processors4th_generation_intel_xeon_gold_processors4th_gen_intel_xeon_platinum_processors4th_gen_intel_xeon_silver_processors4th_generation_intel_xeon_platinum_processors4th_gen_intel_xeon_scalable_processors3rd_gen_intel_xeon_scalable_processor_family
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2021-33079
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.06% / 17.36%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 14:24
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ssd_dc_s4500ssd_d5-p5316_firmwaressd_e_6100pssd_dc_p4511_edsff_firmwaressd_dc_p4510_sff_firmwaressd_pro_6000pssd_dc_p4500ssd_d7_p5600_firmwaressd_dc_p4500_firmwaressd_670pssd_e_6000pssd_dc_p4600_firmwaressd_e_6000p_firmwaressd_d3-s4610_m.2_firmwaressd_760p_firmwaressd_dc_p4610_sff_firmwaressd_dc_p4101_firmwaressd_dc_p4511_edsffssd_dc_p3100_firmwaressd_660p_firmwaressd_dc_p4600ssd_dc_p4511_m.2_firmwaressd_d5-p4326_firmwaressd_760pssd_dc_p4510_edsff_firmwaressd_660pssd_600pssd_dc_p4608ssd_dc_d4512_firmwaressd_dc_s4500_firmwaressd_665p_firmwaressd_dc_p4610_sffssd_dc_p3100ssd_dc_s4600ssd_pro_7600p_firmwaressd_pro_6000p_firmwaressd_dc_p4101ssd_d3-s4510_m.2ssd_700p_firmwaressd_dc_p4511_m.2ssd_pro_7600pssd_665pssd_dc_p4501_firmwaressd_e_6100p_firmwaressd_d3-s4610_m.2ssd_670p_firmwaressd_d5-p4326ssd_d7_p5600ssd_dc_p4501ssd_dc_s4600_firmwaressd_d3-s4510_m.2_firmwaressd_d7_p5510_firmwaressd_dc_p4510_sffssd_d7_p5510ssd_d5-p5316ssd_700pssd_dc_d4512ssd_dc_p4510_edsffssd_dc_p4608_firmwaressd_600p_firmwareIntel(R) SSD DC
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2021-33081
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.04% / 11.35%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 14:24
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ssd_dc_s4500ssd_d5-p5316_firmwaressd_e_6100pssd_dc_p4511_edsff_firmwaressd_dc_p4510_sff_firmwaressd_pro_6000pssd_dc_p4500ssd_d7_p5600_firmwaressd_dc_p4500_firmwaressd_670pssd_e_6000pssd_dc_p4600_firmwaressd_e_6000p_firmwaressd_d3-s4610_m.2_firmwaressd_760p_firmwaressd_dc_p4610_sff_firmwaressd_dc_p4101_firmwaressd_dc_p4511_edsffssd_dc_p3100_firmwaressd_660p_firmwaressd_dc_p4600ssd_dc_p4511_m.2_firmwaressd_d5-p4326_firmwaressd_760pssd_dc_p4510_edsff_firmwaressd_660pssd_600pssd_dc_p4608ssd_dc_d4512_firmwaressd_dc_s4500_firmwaressd_665p_firmwaressd_dc_p4610_sffssd_dc_p3100ssd_dc_s4600ssd_pro_7600p_firmwaressd_pro_6000p_firmwaressd_dc_p4101ssd_d3-s4510_m.2ssd_700p_firmwaressd_dc_p4511_m.2ssd_pro_7600pssd_665pssd_dc_p4501_firmwaressd_e_6100p_firmwaressd_d3-s4610_m.2ssd_670p_firmwaressd_d5-p4326ssd_d7_p5600ssd_dc_p4501ssd_dc_s4600_firmwaressd_d3-s4510_m.2_firmwaressd_d7_p5510_firmwaressd_dc_p4510_sffssd_d7_p5510ssd_d5-p5316ssd_700pssd_dc_d4512ssd_dc_p4510_edsffssd_dc_p4608_firmwaressd_600p_firmwareIntel(R) SSD DC
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2024-36242
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.3||HIGH
EPSS-0.03% / 8.54%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:11
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in the SPP for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Processorsprocessors
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2024-24983
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7||HIGH
EPSS-0.27% / 50.29%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-14 Aug, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 4.4 may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Ethernet Network Controllers and Adapters E810 Seriesethernet_complete_driver_pack
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2024-23499
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7||HIGH
EPSS-0.18% / 40.36%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-06 Sep, 2024 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 28.3 may allow an unauthenticated user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_800_series_controllers_driverIntel(R) Ethernet Network Controllers and Adapters E810 Seriesethernet_network_controller_e810
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-46329
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 6.30%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-debian_linuxfedorakillerwi-fi_6_ax201uefi_firmwareproset\/wireless_wifiIntel(R) PROSet/Wireless WiFi software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-41984
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 6.21%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-02 Oct, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure for some Intel(R) Arc(TM) graphics cards A770 and A750 Limited Edition sold between October of 2022 and December of 2022 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-arc_a750arc_a750_firmwarearc_a770arc_a770_firmwareIntel(R) Arc(TM) graphics cards A770 and A750 Limited Edition
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2023-25945
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.58%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-07 Nov, 2024 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-one_boot_flash_updateIntel(R) OFU software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2023-34427
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.18%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-04 Oct, 2024 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-41979
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.13% / 32.91%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-24 Jan, 2025 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in the Intel(R) DCM software before version 5.1 may allow an authenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managerIntel(R) DCM software
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-33942
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.15% / 36.72%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in the Intel(R) DCM software before version 5.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managerIntel(R) DCM software
CWE ID-CWE-693
Protection Mechanism Failure
Details not found