Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-30763

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-12 May, 2023 | 14:01
Updated At-24 Jan, 2025 | 15:24
Rejected At-
Credits

Heap-based overflow in Intel(R) SoC Watch based software before version 2021.1 may allow a privileged user to potentially enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:12 May, 2023 | 14:01
Updated At:24 Jan, 2025 | 15:24
Rejected At:
▼CVE Numbering Authority (CNA)

Heap-based overflow in Intel(R) SoC Watch based software before version 2021.1 may allow a privileged user to potentially enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) SoC Watch based software
Default Status
unaffected
Versions
Affected
  • before version 2021.1
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-122Heap-based overflow
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-122
Description: Heap-based overflow
Metrics
VersionBase scoreBase severityVector
3.17.2HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:12 May, 2023 | 15:15
Updated At:07 Nov, 2023 | 04:14

Heap-based overflow in Intel(R) SoC Watch based software before version 2021.1 may allow a privileged user to potentially enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.2HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H
CPE Matches

Intel Corporation
intel
>>battery_life_diagnostic_tool>>Versions before 1.2(exclusive)
cpe:2.3:a:intel:battery_life_diagnostic_tool:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>oneapi_base_toolkit>>Versions before 2021.4.0(exclusive)
cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>soc_watch>>Versions before 2021.1(exclusive)
cpe:2.3:a:intel:soc_watch:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE-122Secondarysecure@intel.com
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-122
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.htmlsecure@intel.com
Patch
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html
Source: secure@intel.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

782Records found

CVE-2022-29262
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.06% / 19.87%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-30 Aug, 2024 | 15:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bps24compute_module_hns2600bpblc24rserver_board_s2600bpsserver_board_s2600bpqrcompute_module_hns2600bps_firmwarecompute_module_hns2600bpq24_firmwarecompute_module_hns2600bpq_firmwarecompute_module_hns2600bpblc24_firmwareserver_board_s2600bpqr_firmwareserver_system_vrn2224bphy6compute_module_hns2600bpq24r_firmwarecompute_module_hns2600bps24rcompute_module_hns2600bpbserver_board_s2600bpb_firmwarecompute_module_hns2600bpsrcompute_module_liquid-cooled_hns2600bpbrctserver_system_m70klp4s2uhhserver_system_vrn2224bphy6_firmwarecompute_module_hns2600bpblc_firmwarecompute_module_hns2600bpblcrcompute_module_hns2600bpbr_firmwareserver_system_m20ntp1ur304server_system_vrn2224bpaf6compute_module_hns2600bpqrcompute_module_hns2600bpbrserver_system_vrn2224bpaf6_firmwarecompute_module_hns2600bpb_firmwareserver_board_m20ntp2sbserver_board_m10jnp2sb_firmwareserver_board_s2600bpbrserver_system_m70klp4s2uhh_firmwareserver_board_m70klp2sbcompute_module_hns2600bps24_firmwarecompute_module_hns2600bps24r_firmwareserver_system_zsb2224bpaf2compute_module_hns2600bpsr_firmwarecompute_module_hns2600bpb24_firmwareserver_system_mcb2208wfaf5_firmwarecompute_module_liquid-cooled_hns2600bpbrct_firmwareserver_board_s2600bpbr_firmwarecompute_module_hns2600bpqcompute_module_hns2600bpblcr_firmwareserver_board_s2600bpbcompute_module_hns2600bpblc24server_system_zsb2224bphy1_firmwareserver_system_m20ntp1ur304_firmwareserver_board_m70klp2sb_firmwarecompute_module_hns2600bpblc24r_firmwareserver_board_s2600bpqserver_board_m10jnp2sbserver_system_zsb2224bpaf1server_board_s2600bpq_firmwarecompute_module_hns2600bpblcserver_system_zsb2224bpaf1_firmwareserver_board_s2600bpsrcompute_module_hns2600bpqr_firmwareserver_board_s2600bps_firmwarecompute_module_hns2600bpsserver_board_s2600bpsr_firmwarecompute_module_hns2600bpb24server_system_zsb2224bphy1server_system_zsb2224bpaf2_firmwarecompute_module_hns2600bpq24rcompute_module_hns2600bpq24server_board_m20ntp2sb_firmwareserver_system_mcb2208wfaf5Intel(R) Server Board BIOS firmware
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CVE-2019-14600
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 20.49%
||
7 Day CHG~0.00%
Published-17 Jan, 2020 | 17:33
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled search path element in the installer for Intel(R) SNMP Subagent Stand-Alone for Windows* may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-snmp_subagent_stand-aloneIntel(R) SNMP Subagent Stand-Alone for Windows*
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2019-14611
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 33.62%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:11
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc7i7dnke_firmwarenuc8i3cysmnuc7i5dnke_firmwarenuc6i5syh_firmwarestk2mv64cc_firmwarestk2m3w64ccd34010wybnuc7cjyhnuc_8_mainstream_game_kitstk2m3w64cc_firmwarenuc8i7hnknuc_8_mainstream_game_mini_computer_firmwarenuc6i5syhcd1iv128mknuc8i7bek_firmwarenuc7i3dnhenuc8i7hnk_firmwarecd1iv128mk_firmwarenuc6i7kykcd1m3128mk_firmwared34010wyb_firmwarecd1m3128mknuc7cjyh_firmwarecd1p64gknuc7i3dnhe_firmwarenuc_8_mainstream_game_mini_computerde3815tybe_firmwarenuc7i5dnkenuc6cayscd1p64gk_firmwarenuc_8_mainstream_game_kit_firmwarede3815tybenuc7i7dnkestk2mv64ccnuc6i7kyk_firmwarenuc6cays_firmwarenuc8i7beknuc8i3cysm_firmwareIntel(R) NUC(R)
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2019-14598
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.26% / 48.71%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 18:21
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Authentication in subsystem in Intel(R) CSME versions 12.0 through 12.0.48 (IOT only: 12.0.56), versions 13.0 through 13.0.20, versions 14.0 through 14.0.10 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-converged_security_management_engine_firmwaresteelstore_cloud_integrated_storageIntel(R) CSME
CWE ID-CWE-287
Improper Authentication
CVE-2019-14626
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.25%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 17:43
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in PCIe function for the Intel® FPGA Programmable Acceleration Card N3000, all versions, may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-Intel Corporation
Product-field_programmable_gate_array_programmable_acceleration_card_n3000_firmwarefield_programmable_gate_array_programmable_acceleration_card_n3000Intel(R) FPGA Programmable Acceleration Card N3000
CVE-2019-14609
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 36.19%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:11
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc7i7dnke_firmwarenuc8i3cysmnuc7i5dnke_firmwarenuc6i5syh_firmwarestk2mv64cc_firmwarestk2m3w64ccd34010wybnuc7cjyhnuc_8_mainstream_game_kitstk2m3w64cc_firmwarenuc8i7hnknuc_8_mainstream_game_mini_computer_firmwarenuc6i5syhcd1iv128mknuc8i7bek_firmwarenuc7i3dnhenuc8i7hnk_firmwarecd1iv128mk_firmwarenuc6i7kykcd1m3128mk_firmwared34010wyb_firmwarecd1m3128mknuc7cjyh_firmwarecd1p64gknuc7i3dnhe_firmwarenuc_8_mainstream_game_mini_computerde3815tybe_firmwarenuc7i5dnkenuc6cayscd1p64gk_firmwarenuc_8_mainstream_game_kit_firmwarede3815tybenuc7i7dnkestk2mv64ccnuc6i7kyk_firmwarenuc6cays_firmwarenuc8i7beknuc8i3cysm_firmwareIntel(R) NUC(R)
CWE ID-CWE-20
Improper Input Validation
CVE-2023-32617
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.49%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-02 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7i5bnknuc_7_home_nuc7i3bnhxfnuc_board_nuc7i3bnbnuc_7_home_nuc7i3bnhxf_firmwarenuc_kit_nuc7i3bnhx1_firmwarenuc_kit_nuc7i5bnh_firmwarenuc_board_nuc8cchbnuc_kit_nuc7i5bnk_firmwarenuc_kit_nuc7i7bnhx1_firmwarecompute_stick_stk2mv64cc_firmwarenuc_7_enthusiast_nuc7i7bnkq_firmwarenuc_8_rugged_kit_nuc8cchkrn_firmwarenuc_8_rugged_kit_nuc8cchkrnuc_kit_nuc7i5bnhx1nuc_kit_nuc6cayh_firmwarenuc_7_home_nuc7i5bnkpnuc_7_enthusiast_nuc7i7bnhxg_firmwarenuc_kit_nuc7i5bnhx1_firmwarenuc_kit_nuc7i3bnk_firmwarenuc_kit_nuc7i7bnhx1nuc_board_nuc8cchb_firmwarenuc_7_home_nuc7i5bnhxfnuc_8_rugged_board_nuc8cchbn_firmwarenuc_kit_nuc7i5bnhnuc_8_rugged_kit_nuc8cchkr_firmwarenuc_board_nuc7i5bnbnuc_kit_nuc7i3bnknuc_kit_nuc6cays_firmwarenuc_board_nuc7i5bnb_firmwarenuc_board_nuc7i3bnb_firmwarenuc_7_home_nuc7i5bnkp_firmwarenuc_7_enthusiast_nuc7i7bnhxgnuc_kit_nuc7i7bnhnuc_kit_nuc7i3bnh_firmwarenuc_kit_nuc7i3bnhx1nuc_7_home_nuc7i5bnhxf_firmwarecompute_stick_stk2mv64ccnuc_kit_nuc6caysnuc_kit_nuc7i7bnh_firmwarenuc_8_rugged_board_nuc8cchbnnuc_board_nuc7i7bnb_firmwarenuc_8_rugged_kit_nuc8cchkrnnuc_7_enthusiast_nuc7i7bnkqnuc_kit_nuc7i3bnhnuc_board_nuc7i7bnbnuc_kit_nuc6cayhIntel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2022-28699
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.73%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc8i3cysnnuc8i7inh_firmwarenuc8i7hvk_firmwarenuc7cjyhn_firmwarenuc8cchbnuc7pjyh_firmwarenuc8cchbn_firmwarestk2mv64cc_firmwarenuc8i7inhnuc7cjyhnuc8i5inhnuc8i7hnknuc8cchkrnnuc8i7hvknuc7cjyhnnuc8i7hnk_firmwarenuc8i3cysn_firmwarenuc8cchkrn_firmwarenuc8cchkrnuc7cjyh_firmwarenuc7pjyhn_firmwarenuc7cjysamn_firmwarenuc7pjyhnuc8i5inh_firmwarenuc8cchbnnuc7cjysamnnuc7pjyhnnuc8i7hvkvaw_firmwarenuc7cjysalnuc8i7hvkvanuc8i7hvkva_firmwarenuc8cchkr_firmwarenuc8cchb_firmwarenuc8i7hnkqc_firmwarenuc7cjysal_firmwarestk2mv64ccnuc8i7hvkvawnuc8i7hnkqcIntel(R) NUC BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-32662
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.64%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-30 Aug, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in some Intel Battery Life Diagnostic Tool installation software before version 2.2.1 may allow a privilaged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-battery_life_diagnostic_toolIntel Battery Life Diagnostic Tool installation software
CWE ID-CWE-285
Improper Authorization
CVE-2023-30768
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.04% / 11.12%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 14:01
Updated-24 Jan, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_s2600wp_firmwareserver_board_s1200btlr_firmwareserver_board_s1400fp2_firmwareserver_board_s1200v3rposerver_board_s2600kptr_firmwareserver_board_s1400sp2_firmwareserver_board_s2600wpqserver_board_s2600cp4ioc_firmwareserver_board_s2600kprserver_board_s2600jfqserver_board_s2600kpfserver_board_s2600tpr_firmwareserver_board_s2600cwtserver_board_s2600kpserver_board_s1200v3rpo_firmwareserver_board_s2600cp2_firmwareserver_board_s2600wttr_firmwareserver_board_s2600jffserver_board_s2600cwtr_firmwareserver_board_s2600wpserver_board_s2400ep4server_board_s2600cw2rserver_board_s1400sp2server_board_s1400fp2server_board_s2600jfq_firmwareserver_board_s2600wtts1rserver_board_s1200bts_firmwareserver_board_s2600kpr_firmwareserver_board_s2600cw2s_firmwareserver_board_s1200btsrserver_board_s1600jp4server_board_s1600jp2_firmwareserver_board_s2600cp2server_board_s1400fp4_firmwareserver_board_s2600tpnr_firmwareserver_board_s1200v3rpm_firmwareserver_board_s1200v3rpmserver_board_s2600kptrserver_board_s2600wpf_firmwareserver_board_s2600cw2srserver_board_s1600jp2server_board_s1400sp4_firmwareserver_board_s1200v3rplserver_board_s2600tpserver_board_s2600cw2sserver_board_s2600jf_firmwareserver_board_s2600cwtrserver_board_s2600wpfserver_board_s2600gzserver_board_s2600kpf_firmwareserver_board_s4600lh2_firmwareserver_board_s1600jp4_firmwareserver_board_s2600co4_firmwareserver_board_s2400ep2server_board_s2600tpfserver_board_s2600cwtsserver_board_s2600wttrserver_board_s2600ip4l_firmwareworkstation_board_w2600cr2l_firmwareserver_board_s2600wt2server_board_s2600cp2iocserver_board_s2600cp4_firmwareserver_board_s2600gz_firmwareserver_board_s2600wt2r_firmwareserver_board_s2600jff_firmwareworkstation_board_w2600cr2lserver_board_s1200btlrm_firmwareserver_board_s1200btsserver_board_s2600coe_firmwareserver_board_s2600tpnrserver_board_s2400bb4_firmwareserver_board_s2600cp4server_board_s1200btlserver_board_s2600tpf_firmwareserver_board_s1200btsr_firmwareserver_board_s2600wt2_firmwareserver_board_s2600tp_firmwareserver_board_s2600cp2jserver_board_s2600glserver_board_s2600ip4server_board_s2600ip4_firmwareserver_board_s2600tpfr_firmwareserver_board_s2600wtts1r_firmwareserver_board_s2600co4server_board_s2600cw2sr_firmwareserver_board_s2600wt2rserver_board_s2600wtt_firmwareserver_board_s2600tpfrserver_board_s4600lh2server_board_s2400bb4server_board_s2600cwtsrserver_board_s2600coeioc_firmwareserver_board_s2600cw2r_firmwareserver_board_s1400fp4server_board_s2400sc2server_board_s2600cwts_firmwareworkstation_board_w2600cr2_firmwareserver_board_s2600jfserver_board_s2600cp2j_firmwareserver_board_s2600wttserver_board_s2600cwt_firmwareserver_board_s2600cp2ioc_firmwareserver_board_s4600lt2_firmwareserver_board_s2600ip4lserver_board_s2400ep4_firmwareserver_board_s4600lt2server_board_s1200btl_firmwareserver_board_s1400sp4server_board_s2600cp4iocserver_board_s2600wpq_firmwareserver_board_s1200v3rpl_firmwareserver_board_s2600gl_firmwareserver_board_s2400sc2_firmwareserver_board_s2600cw2server_board_s2600kpfr_firmwareserver_board_s1200btlrworkstation_board_w2600cr2server_board_s2600kp_firmwareserver_board_s1200v3rpsserver_board_s2600cwtsr_firmwareserver_board_s2600coeserver_board_s2600kpfrserver_board_s2600cw2_firmwareserver_board_s2600tprserver_board_s2600coeiocserver_board_s1200v3rps_firmwareserver_board_s2400ep2_firmwareserver_board_s1200btlrmIntel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family
CWE ID-CWE-284
Improper Access Control
CVE-2023-31199
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.1||HIGH
EPSS-0.04% / 11.71%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 14:01
Updated-24 Jan, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) Solid State Drive Toolbox(TM) before version 3.4.5 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-solid_state_drive_toolboxIntel(R) Solid State Drive Toolbox(TM)
CWE ID-CWE-284
Improper Access Control
CVE-2019-11157
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.33% / 55.28%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:12
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1501m_firmwarecore_i3-9100_firmwarexeon_e3-1235lcore_i3-6300core_i5-1035g7core_i5-6585rcore_i3-6100e_firmwarecore_i3-8350k_firmwarecore_i3-9350k_firmwarexeon_e-2124g_firmwarecore_i7-9700kfcore_i5-8305g_firmwarecore_i5-7500_firmwarecore_i5-8400hcore_i5-7y54xeon_e3-1535m_firmwarecore_i7-1060g7_firmwarecore_i7-9700core_i7-6650u_firmwarexeon_e-2226gxeon_e3-1268lcore_i5-1035g4core_i3-8145ucore_i7-6822eqcore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i7-6700tecore_i3-7020uxeon_e3-1285_firmwarecore_i7-6567u_firmwarecore_i7-9700tecore_i3-8109uxeon_e3-1565l_firmwarecore_i7-7600ucore_i5-9400f_firmwarexeon_e-2224core_i5-7y57_firmwarecore_i7-9700f_firmwarecore_i3-6100t_firmwarecore_i5-9500e_firmwarecore_i3-7100e_firmwarecore_i3-7100ecore_i3-7300xeon_e3-1275_firmwarecore_i5-6442eq_firmwarecore_i5-8269u_firmwarecore_i3-6098pxeon_e3-1268l_firmwarecore_i5-6287u_firmwarexeon_e-2134_firmwarexeon_e3-1578l_firmwarecore_i3-9100hlcore_i5-6600kcore_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarexeon_e3-1285core_i7-10710u_firmwarecore_i5-6500te_firmwarecore_i7-7820hkcore_i5-9500_firmwarecore_i5-8400h_firmwarecore_i7-6970hqcore_i3-9100tecore_i7-9700fxeon_e3-1225core_i5-8600xeon_e-2136core_i7-10510ucore_i7-9700kcore_i5-9400_firmwarecore_i7-8500y_firmwarecore_i5-6402pcore_i3-8100core_i7-1060g7xeon_e3-1545mxeon_e3-1270_firmwarecore_i5-6600t_firmwarecore_i3-7300_firmwarecore_i5-7287u_firmwarecore_i7-7700core_i7-7820hq_firmwarecore_i3-7102ecore_i7-7920hq_firmwarecore_i5-8600kcore_i7-8700k_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1220core_i7-8750hcore_i5-8365ucore_i5-9600kfcore_i5-8500b_firmwarecore_i3-7100u_firmwarecore_i3-6100h_firmwarecore_i5-7600core_i5-1030g4_firmwarecore_i7-9850he_firmwarecore_i7-8557u_firmwarecore_i7-7820eq_firmwarexeon_e-2276gcore_i3-8300core_i3-1000g4xeon_e-2186gcore_i5-7400tcore_i5-7267u_firmwarexeon_e3-1535mxeon_e3-1505m_firmwarexeon_e-2174gcore_i3-7100core_i7-8809gcore_i3-8145uecore_i5-7260ucore_i7-8700bcore_i7-7500u_firmwarecore_i5-7267ucore_i5-10210ycore_i7-7820hk_firmwarecore_i7-6560ucore_i5-9400txeon_e3-1505lcore_i5-10210u_firmwarecore_i5-9500fcore_i5-8600t_firmwarecore_i5-8300hcore_i7-9850hecore_i3-10110ycore_i3-7300t_firmwarecore_i5-6600_firmwarecore_i3-6006u_firmwarecore_i5-9600xeon_e3-1565lcore_i5-7300u_firmwarecore_i5-8600_firmwarecore_i3-9100fxeon_e3-1260lcore_i5-9600kf_firmwarexeon_e-2224_firmwarecore_i7-9750hfcore_i5-9300h_firmwarecore_i3-6167uxeon_e-2274gcore_i3-9320_firmwarecore_i5-9500core_i3-8145ue_firmwarecore_i5-8400b_firmwarecore_i7-6700t_firmwarecore_i3-8100_firmwarexeon_e3-1240_firmwarecore_i7-6500ucore_i7-6500u_firmwarexeon_e-2124core_i5-7287ucore_i7-10710ucore_i5-8500t_firmwarexeon_e3-1558lcore_i3-7100h_firmwarecore_i5-8300h_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarecore_i5-6300ucore_i7-8565ucore_i5-7300hq_firmwarexeon_e-2274g_firmwarexeon_e3-1245core_i5-7300hqcore_i7-8706g_firmwarecore_i7-7560ucore_i5-6600k_firmwarecore_i3-6100hcore_i5-7400t_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259ucore_i3-6098p_firmwarecore_i7-10510y_firmwarecore_i7-9850hl_firmwarexeon_e-2146g_firmwarecore_i7-8850h_firmwarecore_i7-6700hqcore_i7-9700kf_firmwarecore_i7-9850h_firmwarecore_i5-6350hqxeon_e3-1515m_firmwarecore_i7-6660u_firmwarecore_i3-7100_firmwarecore_i5-7600tcore_i3-6100te_firmwarecore_i5-6350hq_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550uxeon_e-2224gxeon_e3-1505mcore_i3-9100tcore_i5-8310y_firmwarecore_i5-6400_firmwarecore_i7-6650ucore_i5-9300hxeon_e3-1240core_i3-7167u_firmwarecore_i7-8559u_firmwarecore_i7-8086k_firmwarecore_i5-6585r_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwarecore_i3-7167ucore_i3-6100txeon_e-2176g_firmwarecore_i7-8500ycore_i5-9400hcore_i7-7567uxeon_e3-1240l_firmwarecore_i3-8145u_firmwarecore_i7-9700e_firmwarecore_i7-7660u_firmwarecore_i7-7820hqcore_i5-6260u_firmwarecore_i5-8210ycore_i7-8750h_firmwarecore_i3-7300tcore_i3-6100ecore_i3-8300t_firmwarecore_i3-8109u_firmwarexeon_e3-1280core_i5-7400_firmwarexeon_e3-1260l_firmwarecore_i7-9700k_firmwarexeon_e-2288g_firmwarecore_i5-7y54_firmwarecore_i3-9100f_firmwarexeon_e-2246g_firmwarecore_i7-6567uxeon_e-2174g_firmwarecore_i3-7101ecore_i3-8100b_firmwarecore_i5-8500core_i7-6870hq_firmwarecore_i5-7600_firmwarecore_i5-9500te_firmwarecore_i5-6267u_firmwarecore_i5-8265ucore_i5-6300hqcore_i7-9750hcore_i5-6440hqcore_i7-7y75core_i7-7560u_firmwarexeon_e-2286g_firmwarecore_i7-6700core_i5-7y57core_i3-8350kcore_i5-7500tcore_i3-9100core_i5-9600k_firmwarexeon_e-2224g_firmwarecore_i3-6102e_firmwarexeon_e3-1230_firmwarecore_i7-7700kcore_i7-8705gcore_i7-8665ucore_i5-9500ecore_i3-8300tcore_i7-7660ucore_i7-6600ucore_i3-6100u_firmwarecore_i7-8706gxeon_e-2236core_i7-8700t_firmwarecore_i3-6006uxeon_e-2236_firmwarexeon_e-2126g_firmwarecore_i7-8700xeon_e3-1501lcore_i5-8259u_firmwarecore_i3-6300tcore_i7-8665ue_firmwarecore_i3-7130u_firmwarecore_i5-8400core_i7-8705g_firmwarecore_i3-7100tcore_i7-7700tcore_i7-8086kcore_i5-7260u_firmwarecore_i5-10210ucore_i7-6600u_firmwarecore_i5-7600k_firmwarecore_i7-6770hqcore_i5-8257ucore_i5-8365ue_firmwarecore_i7-8700kcore_i5-8600k_firmwarecore_i5-7200u_firmwarecore_i5-7442eqcore_i7-10510u_firmwarexeon_e-2134xeon_e3-1545m_firmwarexeon_e-2226g_firmwarexeon_e3-1515mcore_i5-1030g7core_i5-7442eq_firmwarecore_i5-10310y_firmwarecore_i7-8569u_firmwarexeon_e-2144g_firmwarecore_i3-1000g1core_i7-10510ycore_i5-7360u_firmwarecore_i3-10110ucore_i5-8210y_firmwarecore_i5-6442eqcore_i3-9100e_firmwarecore_i5-9600kcore_i3-6300_firmwarecore_i7-7700hqcore_i3-9100hl_firmwarecore_i3-8100hcore_i3-9100t_firmwarexeon_e3-1225_firmwarecore_i7-6870hqcore_i5-8350ucore_i3-1005g1_firmwarecore_i5-7300ucore_i5-6440hq_firmwarexeon_e-2246gcore_i5-8500tcore_i5-7500core_i5-6400core_i5-7200ucore_i5-8350u_firmwarecore_i7-8700b_firmwarexeon_e-2104g_firmwarecore_i3-6320_firmwarecore_i7-6820hq_firmwarecore_i7-7920hqxeon_e3-1575m_firmwarecore_i5-9300hf_firmwarecore_i5-8400tcore_i3-9300_firmwarexeon_e3-1578lcore_i3-6100_firmwarecore_i3-9100te_firmwarecore_i7-6660ucore_i3-7350k_firmwarexeon_e3-1240lcore_i5-6500_firmwarecore_i3-7100hcore_i3-7101te_firmwarexeon_e3-1220_firmwarecore_i5-6500t_firmwarecore_i3-9300xeon_e3-1501l_firmwarexeon_e-2244gcore_i3-9350kf_firmwarexeon_e-2176gcore_i7-8709gcore_i5-6685r_firmwarecore_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-6287ucore_i5-1035g7_firmwarecore_i5-9400core_i3-8100txeon_e-2104gcore_i5-6500tcore_i5-6260ucore_i7-6700k_firmwarecore_i7-8557ucore_i5-9500tcore_i5-7500t_firmwarecore_i7-6820hk_firmwarecore_i7-8700tcore_i7-6820hqcore_i5-7400xeon_e3-1501mcore_i7-8650uxeon_e3-1585_firmwarecore_i3-7102e_firmwarexeon_e3-1245_firmwarecore_i5-6600core_i3-7320core_i7-6700tcore_i7-6920hqcore_i7-9750h_firmwarecore_i3-6167u_firmwarexeon_e3-1585core_i3-6100ucore_i7-6700_firmwarexeon_e-2234_firmwarecore_i5-1035g1xeon_e3-1280_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwarexeon_e-2186g_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwarecore_i5-8500bcore_i5-7600t_firmwarexeon_e-2124gcore_i5-8269ucore_i5-6402p_firmwarecore_i3-6157ucore_i5-7440hq_firmwarecore_i5-1030g4core_i5-6300hq_firmwarexeon_e-2288gcore_i3-9100exeon_e-2234core_i7-8709g_firmwarecore_i3-6320core_i7-6700kcore_i7-9850hcore_i7-9700t_firmwarecore_i5-9400fcore_i7-6820eq_firmwarecore_i5-7440eqcore_i5-8279ucore_i5-8279u_firmwarecore_i3-8130u_firmwarecore_i5-9500f_firmwarecore_i5-6400tcore_i5-9300hfcore_i3-7100ucore_i5-10210y_firmwarecore_i3-7101tecore_i3-7350kcore_i5-7600kcore_i5-8250ucore_i3-1000g4_firmwarexeon_e-2126gcore_i7-6920hq_firmwarecore_i7-9700tcore_i3-7100t_firmwarecore_i7-7820eqxeon_e3-1275core_i7-9850hlcore_i5-7360ucore_i5-6500core_i7-8650u_firmwarexeon_e3-1235l_firmwarecore_i3-6157u_firmwarecore_i3-9350kfcore_i7-6785r_firmwarecore_i5-6200ucore_i7-6700hq_firmwarecore_i7-7700k_firmwarecore_i5-8250u_firmwarecore_i7-7567u_firmwarecore_i7-9700ecore_i3-7320_firmwarecore_i5-8400_firmwarecore_i7-6970hq_firmwarecore_i7-6785rcore_i7-7700hq_firmwarecore_i7-6820hkcore_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i7-9750hf_firmwarecore_i5-10310ycore_i5-8400t_firmwarexeon_e-2286gcore_i3-6102ecore_i5-6400t_firmwarecore_i5-8365u_firmwarecore_i7-6700te_firmwarecore_i5-6600tcore_i3-9300txeon_e-2244g_firmwarecore_i5-6360u_firmwarecore_i3-8100h_firmwarexeon_e-2278gcore_i7-8850hcore_i3-7130ucore_i5-8265u_firmwarecore_i7-6560u_firmwarecore_i3-8300_firmwarecore_i7-6820eqcore_i7-1065g7_firmwarexeon_e3-1558l_firmwarecore_i5-6500tecore_i5-8257u_firmwarecore_i3-9350kcore_i5-8500_firmwarecore_i5-8365uecore_i7-8665uecore_i5-6300u_firmwarecore_i7-8809g_firmwarexeon_e3-1575mxeon_e3-1230core_i5-6685rcore_i7-7700t_firmwarecore_i5-1030g7_firmwarecore_i5-9400h_firmwarecore_i5-8200ycore_i3-6100core_i5-8310ycore_i3-10110u_firmwarecore_i5-9500tecore_i5-7440hqcore_i5-6360uxeon_e-2144gxeon_e3-1505l_firmwarecore_i5-9500t_firmwarecore_i3-6300t_firmwarecore_i7-8569ucore_i7-9700te_firmwarecore_i7-7700_firmwarecore_i7-6770hq_firmwarecore_i5-6267ucore_i3-1005g1core_i3-8100bcore_i5-9600tcore_i3-7101e_firmwarecore_i3-7020u_firmwarecore_i3-9320core_i5-6440eqcore_i5-6440eq_firmwarecore_i5-8600tcore_i5-8305gcore_i7-1065g7core_i5-9400t_firmwarecore_i7-8559ucore_i7-9700_firmwarecore_i3-6100texeon_e-2146gcore_i3-8130uxeon_e3-1270xeon_e3-1585l_firmwarexeon_e3-1585lIntel(R) Processors
CVE-2019-11136
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 35.29%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:56
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient access control in system firmware for Intel(R) Xeon(R) Scalable Processors, 2nd Generation Intel(R) Xeon(R) Scalable Processors and Intel(R) Xeon(R) Processors D Family may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationHewlett Packard Enterprise (HPE)
Product-xeon_platinum_8153atom_c3858_firmwarexeon_bronze_3104_firmwarexeon_e5-4610_v4xeon_e7-8894_v4xeon_e5-2608l_v4_firmwarexeon_gold_6146xeon_gold_6126f_firmwareatom_c3830_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwareapollo_4200_gen10_serverxeon_d-1527xeon_e5-2697_v4xeon_gold_5115synergy_620_gen9_compute_modulexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_gold_5217_firmwareproliant_bl460c_gen9_server_bladeproliant_dl160_gen9_server_firmwarexeon_gold_6138xeon_e5-4650_v4xeon_e7-8880_v4atom_c3336_firmwarexeon_d-2163it_firmwarexeon_e5-1660_v4proliant_bl660c_gen9_serverxeon_e7-8891_v4xeon_platinum_8164xeon_d-1521_firmwareproliant_ml350_gen9_server_firmwarexeon_gold_6240_firmwarexeon_d-1557_firmwareatom_c3708_firmwareproliant_dl60_gen9_serverxeon_d-1518atom_c2550synergy_620_gen9_compute_module_firmwarexeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_e5-2609_v4_firmwarexeon_platinum_8168xeon_e5-2683_v4atom_c2538_firmwarexeon_e5-2608l_v4xeon_gold_5218xeon_e5-1620_v4xeon_gold_6238m_firmwarexeon_d-1567_firmwarexeon_d-1567xeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwareapollo_4200_gen9_server_firmwarexeon_gold_6126_firmwarexeon_d-2191proliant_dl380_gen9_serverxeon_e7-8870_v4_firmwarexeon_e5-4627_v4_firmwareproliant_ml110_gen9_server_firmwarexeon_platinum_8276_firmwarexeon_e7-8870_v4xeon_gold_6240xeon_gold_6150_firmwarexeon_platinum_8156xeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_e7-8893_v4_firmwarexeon_d-1533n_firmwarexeon_e5-2667_v4_firmwarexeon_gold_5220s_firmwarexeon_gold_5215_firmwarexeon_e5-2667_v4proliant_xl230a_gen9_server_firmwarexeon_platinum_8274proliant_dl580_gen9_serverxeon_gold_6126fxeon_d-1539xeon_silver_4109t_firmwarexeon_e5-1680_v4xeon_silver_4114_firmwarexeon_gold_6230_firmwarexeon_d-2146ntproliant_xl250a_gen9_server_firmwarexeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_d-1577_firmwareatom_c2550_firmwarexeon_e5-4660_v4atom_c3538_firmwarexeon_gold_6210uxeon_d-2187ntatom_c2738xeon_e5-4669_v4_firmwarexeon_platinum_8158_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_gold_6140m_firmwarexeon_silver_4216xeon_platinum_8253xeon_gold_6230xeon_e5-2630l_v4xeon_gold_6134_firmwarexeon_e5-4667_v4atom_c3336atom_c3958xeon_e5-2628l_v4xeon_gold_6130t_firmwareproliant_dl380_gen10_server_firmwarexeon_d-2183itxeon_e5-2690_v4_firmwarexeon_e5-2630_v4xeon_d-1622atom_c2350_firmwarexeon_d-2145ntxeon_e5-1650_v4xeon_gold_6238xeon_gold_6126t_firmwarexeon_silver_4208xeon_e5-2623_v4xeon_e5-4620_v4_firmwarexeon_gold_5220sxeon_platinum_8280m_firmwarexeon_e7-8890_v4_firmwareapollo_4200_gen9_serverxeon_platinum_9282xeon_d-1513n_firmwarexeon_platinum_9242_firmwarexeon_e5-1620_v4_firmwarexeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_e5-2618l_v4_firmwarexeon_e5-2637_v4_firmwarexeon_e7-8867_v4atom_c2358_firmwareproliant_ml350_gen10_serverproliant_ml150_gen9_server_firmwarexeon_platinum_8276matom_c2338xeon_bronze_3106synergy_480_gen10_compute_module_firmwarexeon_gold_6238matom_c3708atom_c2518_firmwarexeon_d-1540xeon_platinum_8160txeon_e5-2698_v4xeon_d-1528xeon_e5-4627_v4proliant_e910_server_blade_firmwarexeon_d-2141ixeon_e5-2660_v4xeon_d-1541xeon_e7-4830_v4xeon_silver_4208_firmwarexeon_d-1633n_firmwarexeon_platinum_8268xeon_e5-2650_v4_firmwareproliant_xl230a_gen9_serverxeon_gold_5222proliant_ws460c_gen9_graphics_server_blade_firmwarexeon_e5-2687w_v4xeon_e5-2630_v4_firmwareatom_c2516synergy_680_gen9_compute_module_firmwarexeon_gold_6240mxeon_e5-4667_v4_firmwarexeon_d-1548xeon_e5-2699a_v4_firmwarexeon_d-1649nxeon_d-1529xeon_e5-2603_v4_firmwareatom_c3308_firmwarexeon_platinum_8160xeon_gold_5115_firmwareproliant_ml110_gen10_server_firmwarexeon_platinum_8156_firmwarexeon_e5-4660_v4_firmwareproliant_xl270d_gen10_serverxeon_gold_5118_firmwarexeon_e7-4809_v4proliant_xl450_gen9_serveratom_c2718xeon_gold_6146_firmwarexeon_gold_6148fxeon_e5-2630l_v4_firmwareatom_c2750xeon_gold_5218_firmwarexeon_gold_6132xeon_gold_6238t_firmwareatom_c3338atom_c2316xeon_e5-2618l_v4xeon_e7-8891_v4_firmwarexeon_e5-2650l_v4_firmwareatom_c2358proliant_dl580_gen10_serverxeon_platinum_8160_firmwarexeon_d-1623nproliant_xl170r_gen10_serveratom_c2508_firmwarexeon_e7-8894_v4_firmwareproliant_dl360_gen9_server_firmwareproliant_xl450_gen9_server_firmwarexeon_gold_6148_firmwarexeon_gold_5220t_firmwarexeon_e5-4610_v4_firmwarexeon_platinum_8253_firmwarexeon_gold_5220_firmwarexeon_d-1622_firmwareatom_c2538xeon_e5-2680_v4_firmwareproliant_e910_server_bladexeon_gold_6240m_firmwareatom_c2530_firmwarexeon_e5-1630_v4_firmwarexeon_silver_4214proliant_ml150_gen9_serverxeon_d-2161iatom_c3858xeon_platinum_8164_firmwaresynergy_680_gen9_compute_modulexeon_d-2141i_firmwareproliant_dl80_gen9_server_firmwareatom_c3558_firmwarexeon_gold_5218bproliant_dl160_gen10_server_firmwarexeon_e5-4640_v4_firmwarexeon_e5-1680_v4_firmwareproliant_xl270d_gen10_server_firmwarexeon_silver_4216_firmwarexeon_gold_6254_firmwarexeon_platinum_8284_firmwarexeon_e5-1650_v4_firmwarexeon_e5-2648l_v4xeon_e5-4620_v4proliant_dl380_gen10_serverxeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_e7-8880_v4_firmwarexeon_gold_6209uxeon_d-1539_firmwarexeon_silver_4112xeon_d-1559xeon_gold_6130_firmwarexeon_gold_5120txeon_gold_6134proliant_bl460c_gen10_server_blade_firmwarexeon_gold_6222v_firmwarexeon_platinum_8160f_firmwareatom_c3558xeon_platinum_8260_firmwarexeon_e5-2648l_v4_firmwarexeon_d-2183it_firmwareatom_c3308proliant_xl170r_gen9_server_firmwarexeon_d-1557xeon_gold_6148xeon_e7-4850_v4xeon_gold_6144xeon_gold_6140mxeon_platinum_9282_firmwareatom_c3758xeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_gold_5220tatom_c3830atom_c2750_firmwarexeon_platinum_8276latom_c3750xeon_platinum_8170_firmwareproliant_dl560_gen10_serveratom_c2730xeon_d-1627_firmwareproliant_bl660c_gen9_server_firmwarexeon_gold_6126txeon_gold_6140_firmwarexeon_gold_6238_firmwareatom_c3950_firmwareproliant_xl250a_gen9_serverxeon_e5-2640_v4_firmwareatom_c2758_firmwarexeon_gold_6246xeon_e5-1630_v4atom_c3955_firmwareatom_c2758xeon_d-1527_firmwarexeon_e5-2683_v4_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-4628l_v4_firmwarexeon_e7-4850_v4_firmwarexeon_gold_5215mxeon_gold_5215proliant_xl450_gen10_server_firmwarexeon_d-2143itxeon_e5-2620_v4_firmwareproliant_xl190r_gen10_server_firmwarexeon_d-2163itsynergy_660_gen10_compute_modulexeon_e5-2699_v4xeon_gold_6244_firmwarexeon_d-2161i_firmwareatom_c3538xeon_platinum_8284xeon_silver_4109txeon_e5-2643_v4_firmwareatom_c2308_firmwarexeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_5122_firmwarexeon_e5-4655_v4xeon_gold_6138fxeon_e5-2658_v4xeon_gold_6132_firmwarexeon_gold_6136_firmwareproliant_xl730f_gen9_serversynergy_480_gen9_compute_module_firmwareproliant_ml350_gen9_serverxeon_gold_6212u_firmwareatom_c2316_firmwarexeon_gold_6212uxeon_d-1531_firmwarexeon_e5-2697_v4_firmwarexeon_platinum_8280mxeon_gold_6240l_firmwarexeon_silver_4114atom_c3750_firmwarexeon_d-2123it_firmwaresynergy_480_gen9_compute_moduleatom_c3508xeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2699_v4_firmwarexeon_d-2173itxeon_d-2123itatom_c2338_firmwareatom_c2730_firmwarexeon_d-1627xeon_gold_5218n_firmwareproliant_ml350_gen10_server_firmwarexeon_e5-2637_v4proliant_dl120_gen10_server_firmwareproliant_dl180_gen9_serverxeon_platinum_8260y_firmwarexeon_gold_6144_firmwarexeon_e5-2695_v4_firmwarexeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4proliant_dl360_gen9_serverxeon_gold_5218txeon_gold_6240y_firmwarexeon_gold_6150xeon_e5-2697a_v4xeon_gold_6242_firmwarexeon_gold_6140xeon_e5-2690_v4xeon_d-1649n_firmwarexeon_e5-2609_v4proliant_dl360_gen10_serverxeon_e5-2658_v4_firmwarexeon_gold_6148f_firmwarexeon_d-2145nt_firmwareproliant_xl450_gen10_serverproliant_xl230k_gen10_serverxeon_d-1537_firmwarexeon_gold_6126xeon_d-1541_firmwarexeon_d-2166nt_firmwarexeon_d-1623n_firmwarexeon_e5-2699a_v4xeon_e5-2643_v4proliant_dl160_gen9_serverxeon_d-1548_firmwareatom_c3850_firmwarexeon_gold_6130f_firmwarexeon_d-1559_firmwareproliant_xl190r_gen10_serverxeon_e5-2698_v4_firmwareproliant_dl580_gen9_server_firmwarexeon_gold_6142fxeon_e7-4809_v4_firmwarexeon_platinum_8153_firmwarexeon_e5-2697a_v4_firmwarexeon_gold_6130xeon_e5-2650l_v4xeon_d-1529_firmwarexeon_d-1540_firmwarexeon_platinum_8260mxeon_silver_4214y_firmwarexeon_d-1637_firmwareproliant_xl170r_gen10_server_firmwareproliant_dl360_gen10_server_firmwarexeon_platinum_8260xeon_platinum_8160t_firmwareproliant_ws460c_gen9_graphics_server_bladeproliant_bl460c_gen10_server_bladexeon_bronze_3204_firmwaresynergy_480_gen10_compute_modulexeon_silver_4214_firmwareatom_c2738_firmwarexeon_d-2142it_firmwareproliant_dl120_gen10_serverproliant_ml110_gen9_serverxeon_d-2143it_firmwarexeon_platinum_9242proliant_dl160_gen10_serversynergy_660_gen10_compute_module_firmwarexeon_platinum_8280lxeon_silver_4110xeon_bronze_3204xeon_d-1523n_firmwarexeon_platinum_8280_firmwareproliant_dl580_gen10_server_firmwarexeon_gold_5217xeon_e5-2687w_v4_firmwareatom_c3758_firmwareatom_c2558_firmwarexeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_gold_6138txeon_e5-2620_v4xeon_e7-4820_v4_firmwareproliant_dl80_gen9_serverxeon_gold_5120proliant_dl180_gen10_server_firmwarexeon_d-1523nxeon_gold_5220xeon_gold_6154_firmwarexeon_d-1653nproliant_dl120_gen9_server_firmwarexeon_e7-8860_v4_firmwarexeon_d-1637xeon_gold_6254xeon_silver_4209t_firmwarexeon_d-1577xeon_gold_6240yxeon_platinum_8176_firmwarexeon_e5-4669_v4xeon_gold_6154proliant_ml110_gen10_serverxeon_gold_5215l_firmwarexeon_d-1543n_firmwarexeon_e5-2640_v4xeon_e7-8893_v4xeon_gold_6252n_firmwarexeon_gold_5120t_firmwareproliant_dl560_gen9_server_firmwarexeon_d-1653n_firmwareproliant_xl230k_gen10_server_firmwarexeon_platinum_8270_firmwarexeon_d-1553natom_c3808_firmwarexeon_d-1571_firmwareatom_c3955xeon_silver_4209txeon_silver_4116xeon_d-1633nxeon_gold_6210u_firmwareproliant_xl170r_gen9_serveratom_c3850xeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_gold_5218t_firmwarexeon_gold_6248xeon_platinum_8260l_firmwarexeon_gold_6226_firmwarexeon_d-1518_firmwarexeon_platinum_8274_firmwarexeon_platinum_8280atom_c2558xeon_gold_6152_firmwarexeon_platinum_8176f_firmwarexeon_d-1520proliant_dl180_gen10_serverproliant_dl380_gen9_server_firmwarexeon_platinum_8256xeon_gold_6152xeon_d-2146nt_firmwarexeon_platinum_8158xeon_gold_6238l_firmwarexeon_e7-4830_v4_firmwareatom_c3508_firmwarexeon_gold_5218b_firmwarexeon_gold_6222vproliant_bl460c_gen9_server_blade_firmwarexeon_d-1520_firmwarexeon_platinum_8176xeon_gold_6242xeon_silver_4112_firmwarexeon_d-1531atom_c2518xeon_gold_6262v_firmwarexeon_e5-2660_v4_firmwarexeon_platinum_8260yxeon_platinum_8270xeon_e5-2650_v4xeon_platinum_8260m_firmwareproliant_dl560_gen9_serverxeon_d-1533nproliant_xl190r_gen9_serverxeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_gold_5118xeon_gold_6130fxeon_e5-2695_v4atom_c2530atom_c2508proliant_xl730f_gen9_server_firmwarexeon_gold_5215m_firmwarexeon_platinum_8276xeon_gold_6142f_firmwarexeon_gold_6238txeon_silver_4214yxeon_e5-2603_v4proliant_xl190r_gen9_server_firmwarexeon_e5-1660_v4_firmwarexeon_e5-4628l_v4xeon_e7-8860_v4atom_c2350atom_c2516_firmwareatom_c3338_firmwarexeon_platinum_8276m_firmwarexeon_platinum_8176fxeon_e7-8867_v4_firmwareatom_c2308xeon_e5-2623_v4_firmwareapollo_4200_gen10_server_firmwareatom_c3808xeon_d-1543nxeon_d-1528_firmwareproliant_dl120_gen9_serverxeon_gold_6226xeon_d-1521xeon_d-2191_firmwarexeon_gold_6252atom_c3950xeon_e5-4650_v4_firmwareproliant_dl560_gen10_server_firmwareatom_c2718_firmwarexeon_gold_6252_firmwarexeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lproliant_dl60_gen9_server_firmwarexeon_d-1602_firmwarexeon_platinum_8180proliant_dl180_gen9_server_firmwarexeon_d-2177ntatom_c3958_firmwarexeon_platinum_8276l_firmware2019.2 IPU – UEFI
CVE-2019-11105
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 36.19%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:07
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic issue in subsystem for Intel(R) CSME before versions 12.0.45, 13.0.10 and 14.0.10 may allow a privileged user to potentially enable escalation of privilege and information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CVE-2019-11110
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 22.55%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:10
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass in the subsystem for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Intel(R) TXE
CVE-2019-0181
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-13 Jun, 2019 | 15:36
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-open_cloud_integrity_tehnologyopenattestationOpen Cloud Integrity Technology and OpenAttestation
CVE-2019-0152
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.63%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:06
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8276lxeon_platinum_8153xeon_platinum_8170_firmwarexeon_bronze_3104_firmwarexeon_gold_6146xeon_gold_6126txeon_gold_6126f_firmwarexeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_w-2125xeon_w-2155_firmwarexeon_gold_5217_firmwarexeon_gold_6138xeon_gold_6246xeon_d-2163it_firmwarexeon_platinum_8164xeon_gold_6240_firmwarexeon_gold_5215mxeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_d-2143itxeon_d-2163itxeon_platinum_8168xeon_gold_6244_firmwarexeon_d-2161i_firmwarexeon_gold_5218xeon_gold_6238m_firmwarexeon_platinum_8284xeon_silver_4109txeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_5122_firmwarexeon_gold_6138t_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6212u_firmwarexeon_gold_6212uxeon_gold_6126_firmwarexeon_platinum_8280mxeon_gold_6240l_firmwarexeon_silver_4114xeon_d-2123it_firmwarexeon_platinum_8276_firmwarexeon_bronze_3104xeon_gold_6240xeon_gold_6238lxeon_gold_6240lxeon_gold_6150_firmwarexeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5220s_firmwarexeon_gold_5215_firmwarexeon_platinum_8260y_firmwarexeon_gold_6144_firmwarexeon_platinum_8274xeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_5218txeon_gold_6240y_firmwarexeon_gold_6150xeon_gold_6242_firmwarexeon_gold_6140xeon_silver_4114_firmwarexeon_gold_6230_firmwarexeon_d-2146ntxeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_gold_6210uxeon_d-2187ntxeon_gold_6126xeon_platinum_8158_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_gold_6140m_firmwarexeon_silver_4216xeon_platinum_8253xeon_gold_6230xeon_w-2195xeon_gold_6134_firmwarexeon_gold_6130t_firmwarexeon_gold_6130f_firmwarexeon_d-2183itxeon_gold_6142fxeon_w-2145_firmwarexeon_d-2145ntxeon_platinum_8153_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_gold_6130xeon_platinum_8260mxeon_silver_4214y_firmwarexeon_silver_4208xeon_platinum_8260xeon_platinum_8160t_firmwarexeon_bronze_3204_firmwarexeon_silver_4214_firmwarexeon_d-2142it_firmwarexeon_w-2123xeon_gold_5220sxeon_platinum_8280m_firmwarexeon_d-2143it_firmwarexeon_platinum_9242xeon_platinum_9282xeon_platinum_8280lxeon_silver_4110xeon_platinum_9242_firmwarexeon_bronze_3204xeon_platinum_8280_firmwarexeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_5217xeon_platinum_8276mxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_gold_6138txeon_bronze_3106xeon_gold_6238mxeon_gold_5120xeon_gold_5220xeon_gold_6154_firmwarexeon_platinum_8160txeon_gold_6254xeon_silver_4209t_firmwarexeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_d-2141ixeon_gold_5215l_firmwarexeon_silver_4208_firmwarexeon_w-2195_firmwarexeon_platinum_8268xeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_silver_4209txeon_w-2133_firmwarexeon_silver_4116xeon_gold_6240mxeon_gold_6210u_firmwarexeon_gold_6252nxeon_gold_6244xeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_platinum_8274_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_w-2135_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_5218_firmwarexeon_gold_6132xeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_d-2146nt_firmwarexeon_platinum_8158xeon_gold_6238l_firmwarexeon_w-2155xeon_gold_5218b_firmwarexeon_w-2135xeon_gold_6222vxeon_w-2125_firmwarexeon_platinum_8176xeon_platinum_8160_firmwarexeon_gold_6242xeon_w-2175_firmwarexeon_silver_4112_firmwarexeon_w-2145xeon_gold_6262v_firmwarexeon_platinum_8260yxeon_platinum_8270xeon_platinum_8260m_firmwarexeon_gold_6148_firmwarexeon_gold_6128xeon_w-3175x_firmwarexeon_silver_4215xeon_gold_5220t_firmwarexeon_d-2142itxeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_gold_5220_firmwarexeon_gold_6240m_firmwarexeon_gold_5215m_firmwarexeon_silver_4214xeon_platinum_8276xeon_gold_6142f_firmwarexeon_gold_6238txeon_d-2161ixeon_platinum_8164_firmwarexeon_silver_4214yxeon_d-2141i_firmwarexeon_gold_5218bxeon_silver_4216_firmwarexeon_gold_6254_firmwarexeon_platinum_8276m_firmwarexeon_platinum_8176fxeon_platinum_8284_firmwarexeon_d-2187nt_firmwarexeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_5120txeon_w-3175xxeon_gold_6252xeon_gold_6134xeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_platinum_8260_firmwarexeon_w-2133xeon_gold_6252_firmwarexeon_d-2183it_firmwarexeon_gold_6148xeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6140mxeon_platinum_9282_firmwarexeon_platinum_8180xeon_d-2177ntxeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_w-2175xeon_gold_5220t2019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2019-0151
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.34% / 55.63%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 19:07
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2687w_v2_firmwarexeon_platinum_8153xeon_e3-1230_v5xeon_e5-1620_v2_firmwarexeon_e7-8893_v3xeon_e5-1630_v3_firmwarexeon_e3-1558l_v5xeon_bronze_3104_firmwarexeon_e5-4610_v4xeon_e7-8894_v4xeon_e5-2608l_v4_firmwarexeon_e3-1226_v3_firmwarexeon_gold_6146xeon_e5-2660_v3xeon_gold_6126f_firmwarexeon_e3-1240_v3_firmwarexeon_e5-2450_v2xeon_e7-8880l_v2xeon_platinum_8168_firmwarexeon_e3-1501l_v6_firmwarexeon_silver_4108_firmwarexeon_e5-2670_v2xeon_e5-1680_v3xeon_e-2124g_firmwarexeon_e5-2697_v4xeon_d-1527xeon_e5-2608l_v3_firmwarexeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_e-2254me_firmwarexeon_w-2125core_i5-8400hcore_m-5y71_firmwarexeon_e5-2690_v2xeon_e3-1220_v2_firmwarexeon_e5-2648l_v2xeon_e5-4610_v3xeon_e7-8890_v3_firmwarexeon_e3-1220_v5_firmwarexeon_e7-8870_v3xeon_e-2276me_firmwarexeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-2448l_v2_firmwarexeon_e5-2620_v2_firmwarexeon_e3-1275l_v3_firmwarexeon_d-2163it_firmwarexeon_e5-1660_v4xeon_e5-2699r_v4_firmwarexeon_e7-8891_v4xeon_platinum_8164core_i7-9700xeon_d-1521_firmwarexeon_e5-1620_v2core_i7-6650u_firmwarexeon_e3-1280_v5xeon_e-2226gxeon_e3-1226_v3xeon_e5-2699r_v4xeon_e3-1265l_v2xeon_e5-2658a_v3_firmwarexeon_silver_4116t_firmwarexeon_d-1557_firmwarexeon_e7-4820_v2_firmwarexeon_e5-1680_v3_firmwarexeon_d-1518xeon_e3-1285l_v4_firmwarexeon_e5-1620_v3_firmwarexeon_e-2276m_firmwarecore_i5-9600_firmwarecore_i5-9600t_firmwarecore_i7-6700texeon_e7-4830_v2xeon_e7-4830_v3_firmwarexeon_e3-1501l_v6xeon_e5-2609_v4_firmwarexeon_platinum_8168xeon_e5-2683_v4core_i7-7600uxeon_e5-1660_v3_firmwarexeon_e5-2640_v3xeon_e5-2608l_v4xeon_e-2224xeon_e-2186m_firmwarecore_i5-7y57_firmwarexeon_e5-2418l_v3_firmwarexeon_e3-1280_v3_firmwarexeon_e5-1620_v4xeon_e7-8880l_v3xeon_d-1567_firmwarexeon_e3-1230_v2_firmwarexeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-4640_v4xeon_e5-4655_v4_firmwarexeon_gold_6138t_firmwarexeon_e-2134_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_5122xeon_platinum_8180_firmwarexeon_e5-2699_v3core_i7-7600u_firmwarexeon_gold_6126_firmwarexeon_e5-4624l_v2_firmwarexeon_e3-1240_v5_firmwarexeon_e5-4640_v2xeon_e3-1285_v3_firmwarexeon_e5-2618l_v2_firmwarexeon_e5-4657l_v2core_i5-9500_firmwarexeon_e7-8870_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e3-1558l_v5_firmwarexeon_e7-8870_v4xeon_e5-2609_v2_firmwarecore_i5-8400h_firmwarexeon_gold_6150_firmwarexeon_e3-1265l_v4xeon_platinum_8156core_i5-8600xeon_e5-2450l_v2_firmwarexeon_e-2136core_i7-9700kxeon_bronze_3106_firmwarexeon_e7-8893_v4_firmwarexeon_gold_6138_firmwarexeon_d-2177nt_firmwarexeon_d-1533n_firmwarexeon_e7-4860_v2_firmwarexeon_e5-2667_v4_firmwarexeon_e7-8893_v2xeon_e5-2667_v4core_m7-6y75xeon_e3-1285l_v4xeon_gold_6126fxeon_e5-2628l_v2xeon_e7-8870_v2xeon_d-1539xeon_silver_4109t_firmwarexeon_e3-1275_v5_firmwarexeon_e3-1535m_v5xeon_e5-1680_v4xeon_silver_4114_firmwarexeon_e7-4809_v3xeon_d-2146ntxeon_e3-1575m_v5_firmwarexeon_e5-2609_v2xeon_e3-1268l_v5core_i5-8600kxeon_platinum_8160fxeon_e7-4820_v3_firmwarexeon_d-1577_firmwarecore_i7-8700k_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1290_v2_firmwarexeon_e3-1260l_v5_firmwarexeon_e3-1240_v6_firmwarexeon_e5-2658_v3xeon_e5-4660_v4xeon_e3-1501m_v6core_i5-8365uxeon_e3-1105c_v2_firmwarexeon_e3-1505m_v5_firmwarexeon_e-2226ge_firmwarexeon_d-2187ntxeon_e5-2643_v3_firmwarexeon_e5-4669_v4_firmwarexeon_platinum_8158_firmwarexeon_e5-2680_v2xeon_e5-2698_v3_firmwarexeon_e3-1270_v6xeon_gold_5120_firmwarexeon_e-2286mxeon_d-2166ntxeon_e3-1505m_v5xeon_e3-1280_v2_firmwarexeon_silver_4114t_firmwarexeon_w-2195xeon_e5-2403_v2_firmwarexeon_e5-2630l_v4xeon_gold_6134_firmwarexeon_e5-4667_v4core_i7-5650uxeon_e5-2628l_v4xeon_gold_6130t_firmwarexeon_e-2276gxeon_e5-2658_v2xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e5-2690_v4_firmwarexeon_e-2174gxeon_e5-2630_v4xeon_e5-2687w_v2xeon_e5-4610_v3_firmwarexeon_e5-4667_v3xeon_e5-2609_v3_firmwarexeon_e7-4809_v2_firmwarecore_m-5y70xeon_e3-1280_v2xeon_w-2145_firmwarexeon_e3-1230_v6_firmwarexeon_e5-2643_v3xeon_e3-1220_v2xeon_e5-1650_v4xeon_d-2145ntxeon_e5-2630_v3xeon_gold_6126t_firmwarexeon_e5-4627_v2_firmwarexeon_e3-1275_v6_firmwarecore_i5-5300uxeon_e3-1585_v5xeon_e3-1225_v6_firmwarexeon_e5-2667_v2_firmwarexeon_e5-2623_v4xeon_e5-4620_v4_firmwarexeon_w-2123xeon_e7-8890_v4_firmwarecore_i5-8600t_firmwarexeon_gold_5119t_firmwarexeon_e3-1220_v6_firmwarexeon_d-1513n_firmwarexeon_e5-2683_v3xeon_e5-2637_v2_firmwarexeon_gold_6142_firmwarexeon_e3-1535m_v6_firmwarexeon_e3-1265l_v4_firmwarecore_i7-5600uxeon_e5-2428l_v3_firmwarexeon_e5-1620_v4_firmwarexeon_gold_6130txeon_silver_4108xeon_e3-1280_v3core_i5-9600xeon_e3-1285_v3xeon_e5-2618l_v4_firmwarexeon_e5-2650_v3_firmwarexeon_e5-2637_v4_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1240l_v5_firmwarexeon_e5-2428l_v2xeon_e7-8867_v4xeon_e3-1225_v2_firmwarexeon_e5-2660_v3_firmwarecore_i5-7300u_firmwarecore_i5-8600_firmwarexeon_e3-1281_v3xeon_bronze_3106xeon_e-2224_firmwarexeon_e3-1240l_v3xeon_e-2274gxeon_e7-8880_v3core_i5-9500xeon_e-2278gelxeon_e3-1270_v2xeon_d-1540xeon_e3-1280_v6xeon_e3-1225_v3xeon_e7-8891_v3_firmwarecore_i7-6700t_firmwarexeon_e5-1650_v2xeon_e3-1245_v5_firmwarexeon_e5-2650l_v3_firmwarexeon_e5-2698_v4xeon_e7-4890_v2_firmwarexeon_platinum_8160txeon_d-1528xeon_e5-2697_v3xeon_e5-4603_v2xeon_e5-4627_v4xeon_e5-4620_v2_firmwarexeon_e3-1280_v6_firmwarexeon_e-2124core_i9-9880hxeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_d-2141icore_i5-8500t_firmwarexeon_e3-1275_v3xeon_e7-4809_v2xeon_e7-4830_v4xeon_d-1541xeon_e5-2650_v4_firmwarexeon_e-2136_firmwarexeon_e-2276g_firmwarexeon_e3-1235l_v5_firmwarecore_i5-6300uxeon_e5-1660_v2xeon_e5-2690_v2_firmwarexeon_e-2276mexeon_e5-4620_v3_firmwarexeon_e5-2687w_v4xeon_e5-2630_v4_firmwarexeon_e-2274g_firmwarexeon_e5-4607_v2xeon_e3-1271_v3xeon_e5-2695_v2_firmwarexeon_w-2133_firmwarexeon_e5-4667_v3_firmwarexeon_e3-1220l_v3_firmwarexeon_e3-1275_v2_firmwarexeon_e3-1535m_v6xeon_e5-4667_v4_firmwarexeon_e3-1278l_v4_firmwarexeon_e5-2699a_v4_firmwarexeon_d-1548xeon_e3-1265l_v3xeon_d-1529core_i9-9900xeon_e5-2603_v4_firmwarexeon_e3-1220_v5xeon_platinum_8160xeon_gold_5115_firmwarexeon_platinum_8156_firmwarexeon_e5-4660_v4_firmwarexeon_e-2146g_firmwarexeon_e5-2403_v2xeon_e5-2428l_v3core_i7-8850h_firmwarecore_m7-6y75_firmwarexeon_gold_5118_firmwarexeon_e5-2667_v3_firmwarexeon_e5-4648_v3xeon_e7-4809_v4core_i7-9850h_firmwarexeon_gold_6146_firmwarexeon_gold_6148fxeon_e5-2630l_v4_firmwarexeon_e5-2640_v2xeon_e5-2407_v2_firmwarexeon_gold_6132xeon_e5-2618l_v3_firmwarecore_i7-6660u_firmwarexeon_e5-2618l_v4xeon_e7-8891_v4_firmwarexeon_e3-1258l_v4xeon_w-2155xeon_e-2278g_firmwarexeon_e-2276ml_firmwarexeon_e5-2623_v3_firmwarexeon_e5-2650l_v4_firmwarexeon_e-2224gxeon_w-2135xeon_platinum_8160_firmwarexeon_w-2145xeon_e7-8894_v4_firmwarexeon_e3-1231_v3_firmwarexeon_e5-2648l_v2_firmwarexeon_e-2226gecore_i7-6650uxeon_gold_6142xeon_e5-4650_v3_firmwarecore_m-5y71xeon_gold_6148_firmwarexeon_e5-4610_v4_firmwarecore_i7-8665u_firmwarexeon_e3-1585_v5_firmwarexeon_e-2176g_firmwarecore_i5-9400hxeon_e5-2620_v2xeon_e5-4640_v3_firmwarecore_i9-9900txeon_e5-2680_v4_firmwarexeon_e5-1428l_v2_firmwarexeon_e3-1286l_v3_firmwarexeon_e5-1630_v4_firmwarexeon_e3-1286_v3xeon_e7-8890_v2xeon_e3-1230_v3xeon_d-2161ixeon_e5-4603_v2_firmwarexeon_e3-1225_v3_firmwarexeon_e5-2640_v2_firmwarexeon_platinum_8164_firmwarexeon_d-2141i_firmwarexeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_e7-2880_v2_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2648l_v3xeon_e5-1680_v4_firmwarexeon_e3-1271_v3_firmwarexeon_e5-2609_v3xeon_e3-1275_v5core_i7-9700k_firmwarexeon_e3-1270_v2_firmwarexeon_e5-2438l_v3xeon_e3-1240_v5xeon_e-2288g_firmwarexeon_e5-2430_v2_firmwarexeon_e5-2450_v2_firmwarexeon_e5-2440_v2_firmwarexeon_e3-1230l_v3xeon_e3-1286_v3_firmwarexeon_e5-2660_v2_firmwarexeon_e5-2650_v3xeon_e-2246g_firmwarexeon_e5-2648l_v4xeon_e5-1650_v4_firmwarexeon_e-2176m_firmwarexeon_e-2174g_firmwarexeon_e5-4620_v4xeon_d-1513nxeon_d-1537xeon_e5-2683_v3_firmwarexeon_e3-1515m_v5xeon_d-2187nt_firmwarexeon_e3-1225_v5xeon_e7-8880_v4_firmwarexeon_e5-2630l_v2core_i5-8500xeon_d-1539_firmwarexeon_silver_4112xeon_d-1559xeon_gold_6130_firmwarexeon_e5-2667_v2xeon_e3-1515m_v5_firmwarexeon_e5-2618l_v2xeon_e7-4890_v2xeon_gold_5120txeon_e5-2630_v3_firmwarexeon_e7-4830_v2_firmwarexeon_w-3175xxeon_e3-1230l_v3_firmwarexeon_gold_6134xeon_e5-2628l_v3xeon_e-2254mexeon_platinum_8160f_firmwarexeon_e5-2448l_v2core_i5-6440hqxeon_e3-1258l_v4_firmwarecore_i7-7y75xeon_e5-2648l_v4_firmwarexeon_e5-4669_v3xeon_e7-8893_v2_firmwarexeon_e5-1660_v2_firmwarexeon_e-2286g_firmwarecore_i7-6700xeon_e3-1220_v3xeon_d-2183it_firmwarexeon_w-2133core_i5-7y57xeon_e5-4627_v3xeon_e7-2890_v2_firmwarexeon_e7-4850_v4xeon_gold_6148xeon_d-1557xeon_e3-1505m_v6xeon_gold_6144core_i5-9600k_firmwarecore_i9-9900t_firmwarexeon_e7-2870_v2_firmwarexeon_e7-4880_v2_firmwarexeon_e-2224g_firmwarexeon_e5-2670_v2_firmwarexeon_e7-8860_v3_firmwarexeon_d-1553n_firmwarexeon_gold_6128_firmwarexeon_e3-1578l_v5_firmwarexeon_e5-2687w_v3_firmwarexeon_e5-4627_v2xeon_platinum_8170_firmwarexeon_e-2276mxeon_e7-4860_v2core_i7-8665uxeon_e5-4620_v2xeon_e5-2470_v2_firmwarecore_i7-6600uxeon_e3-1220l_v2xeon_gold_6126txeon_gold_6140_firmwarexeon_e3-1565l_v5_firmwarexeon_e5-2630_v2_firmwarexeon_e3-1565l_v5xeon_e-2236core_i9-9880h_firmwarexeon_e5-4610_v2_firmwarecore_i7-8700t_firmwarexeon_e-2236_firmwarexeon_e5-2408l_v3xeon_e5-2643_v2_firmwarexeon_e-2126g_firmwarexeon_e3-1240_v6core_i7-8700xeon_w-2155_firmwarexeon_e7-4850_v3_firmwarexeon_e3-1285l_v3_firmwarexeon_e5-2640_v4_firmwarexeon_e5-1630_v4xeon_e5-4660_v3xeon_e7-2850_v2_firmwarexeon_e5-1428l_v2xeon_e5-2603_v2core_i7-6600u_firmwarexeon_e5-2603_v3_firmwarexeon_d-1527_firmwarexeon_e5-2697_v3_firmwarecore_i7-8700kxeon_e5-2407_v2xeon_e5-2683_v4_firmwarexeon_e3-1268l_v3xeon_e5-4628l_v4_firmwarexeon_e5-2628l_v4_firmwarexeon_e5-2603_v3xeon_e7-4850_v4_firmwarexeon_e3-1270_v6_firmwarexeon_e5-2658_v3_firmwarecore_i5-8600k_firmwarexeon_e7-8870_v3_firmwarexeon_e3-1285_v6_firmwarexeon_e-2134xeon_e5-2667_v3xeon_e5-4655_v3xeon_e5-2650_v2xeon_e7-4820_v3xeon_e5-2620_v4_firmwarexeon_d-2143itxeon_e-2226g_firmwarexeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_d-2161i_firmwarexeon_e3-1278l_v4xeon_e3-1225_v6xeon_e3-1220l_v3xeon_e5-2699_v3_firmwarexeon_e-2144g_firmwarexeon_silver_4109txeon_e5-2650l_v2_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1240l_v5xeon_e3-1225_v5_firmwarexeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5122_firmwarexeon_e5-2658_v4xeon_gold_6138fxeon_e5-2440_v2xeon_e5-1630_v3xeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_e5-4650_v2_firmwarecore_i5-9600kxeon_e7-8893_v3_firmwarexeon_e3-1290_v2xeon_e3-1286l_v3xeon_e5-2418l_v2_firmwarexeon_e5-2680_v3xeon_e3-1125c_v2xeon_d-1531_firmwarexeon_e5-2697_v4_firmwarexeon_e7-4830_v3xeon_e5-2420_v2_firmwarexeon_silver_4114xeon_e5-4655_v3_firmwarexeon_d-2123it_firmwarexeon_e3-1245_v3xeon_e5-2698_v3xeon_e3-1245_v5xeon_e7-8880_v3_firmwarexeon_e3-1230_v2xeon_e5-2648l_v3_firmwarexeon_e7-8857_v2_firmwarexeon_bronze_3104xeon_d-1571xeon_e3-1265l_v2_firmwarexeon_e5-2699_v4_firmwarexeon_e5-2637_v3xeon_e7-8890_v2_firmwarexeon_e5-1620_v3core_i5-8350uxeon_e7-8880l_v3_firmwarecore_i5-7300ucore_i5-6440hq_firmwarexeon_e3-1505l_v6_firmwarexeon_e3-1240_v2xeon_e7-8850_v2_firmwarexeon_d-2173itxeon_d-2123itcore_i7-5600u_firmwarecore_i5-8500txeon_e-2246gxeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_e3-1241_v3xeon_gold_6144_firmwarexeon_e5-2687w_v3xeon_e5-2695_v4_firmwarexeon_e5-1428l_v3_firmwarexeon_e3-1270_v5_firmwarexeon_e7-8890_v4xeon_e5-2680_v4core_i5-8350u_firmwarexeon_e5-4607_v2_firmwarexeon_e5-2630l_v3_firmwarexeon_e5-2697a_v4xeon_gold_6150xeon_e3-1535m_v5_firmwarexeon_e7-4809_v3_firmwarexeon_gold_6140xeon_e5-2690_v4core_i7-6820hq_firmwarexeon_e5-2609_v4xeon_e7-8891_v2xeon_e3-1220_v3_firmwarexeon_e5-2658_v4_firmwarexeon_e7-4850_v2xeon_e-2254mlxeon_e5-2660_v2xeon_e3-1545m_v5xeon_e5-1650_v2_firmwarexeon_gold_6148f_firmwarexeon_w-2123_firmwarexeon_d-2145nt_firmwarexeon_e3-1501m_v6_firmwarexeon_e-2254ml_firmwarexeon_e7-4870_v2xeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_d-1537_firmwarexeon_gold_6126xeon_d-1541_firmwarexeon_e3-1245_v3_firmwarexeon_d-2166nt_firmwarexeon_e3-1260l_v5xeon_e3-1246_v3core_i5-6500_firmwarexeon_e5-2699a_v4xeon_e5-2643_v4xeon_d-1548_firmwarexeon_e-2276mlxeon_gold_6130f_firmwarexeon_e5-2690_v3_firmwarexeon_e7-2870_v2xeon_e7-8860_v3xeon_e-2244gcore_i9-9900kxeon_d-1559_firmwarexeon_e-2176gxeon_e3-1125c_v2_firmwarexeon_e3-1275l_v3xeon_e5-4648_v3_firmwarexeon_e5-2698_v4_firmwarexeon_gold_6142fxeon_e5-2637_v2xeon_e7-4809_v4_firmwarecore_i7-7y75_firmwarexeon_e7-4870_v2_firmwarexeon_platinum_8153_firmwarexeon_e5-2697a_v4_firmwarexeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_d-1529_firmwarexeon_d-1540_firmwarexeon_e5-1650_v3_firmwarexeon_e7-8850_v2xeon_e5-2695_v2xeon_platinum_8160t_firmwarexeon_e5-4640_v2_firmwarecore_i7-5650u_firmwarexeon_e3-1245_v2xeon_d-2142it_firmwarexeon_e-2278ge_firmwarecore_i5-9500txeon_e5-2470_v2core_i7-8700txeon_d-2143it_firmwarexeon_e3-1280_v5_firmwarexeon_e5-2420_v2core_i7-6820hqxeon_e3-1270_v3_firmwarexeon_e7-4850_v3xeon_silver_4110core_i7-8650uxeon_d-1523n_firmwarexeon_e5-2697_v2xeon_e5-2430_v2xeon_e5-4627_v3_firmwarexeon_gold_5119txeon_e-2286m_firmwarecore_i7-6700txeon_e7-8880l_v2_firmwarecore_i7-6920hqxeon_e5-4669_v3_firmwarexeon_e5-2408l_v3_firmwarexeon_e7-8870_v2_firmwarexeon_e3-1230_v6xeon_e5-2687w_v4_firmwarexeon_e7-8867_v3_firmwarecore_i7-6700_firmwarexeon_e-2234_firmwarexeon_e5-2430l_v2xeon_e5-2628l_v2_firmwarexeon_e3-1245_v2_firmwarexeon_e7-2850_v2xeon_e5-2620_v4xeon_e7-4820_v4_firmwarexeon_gold_6138txeon_e-2186g_firmwarexeon_e3-1276_v3xeon_gold_5120xeon_e-2124gxeon_e5-2618l_v3xeon_e3-1230_v3_firmwarexeon_e3-1270_v3xeon_d-1523nxeon_e5-2608l_v3xeon_e3-1231_v3xeon_e5-4660_v3_firmwarexeon_e-2288gxeon_e7-8880_v2xeon_e7-8891_v2_firmwarexeon_gold_6154_firmwarexeon_e-2234xeon_e7-8860_v4_firmwarexeon_e5-4650_v2xeon_d-1577xeon_silver_4114tcore_i7-9850hcore_i7-9700t_firmwarexeon_e5-4669_v4xeon_platinum_8176_firmwarexeon_gold_6154xeon_d-1543n_firmwarexeon_e5-2640_v4xeon_w-2195_firmwarexeon_e7-8893_v4xeon_gold_5120t_firmwarexeon_e3-1240_v2_firmwarexeon_e5-1650_v3xeon_e5-2630_v2xeon_e3-1276_v3_firmwarexeon_e3-1105c_v2xeon_e7-8891_v3xeon_e5-2640_v3_firmwarecore_m5-6y57xeon_d-1553nxeon_e-2126gxeon_d-1571_firmwarecore_i7-6920hq_firmwarexeon_e5-4620_v3core_i7-9700txeon_silver_4116xeon_e7-4820_v4xeon_e3-1268l_v3_firmwarexeon_e3-1240_v3xeon_e3-1220l_v2_firmwarexeon_e5-2650_v2_firmwarexeon_e5-2695_v3core_i5-6500core_i7-8650u_firmwarexeon_e5-2658_v2_firmwarexeon_d-1518_firmwarexeon_e3-1220_v6core_i9-9900k_firmwarecore_m-5y70_firmwarexeon_w-2135_firmwarexeon_e3-1246_v3_firmwarexeon_e3-1225_v2xeon_e-2186mxeon_e5-2438l_v3_firmwarexeon_gold_6152_firmwarexeon_e5-2603_v2_firmwarexeon_e5-1660_v3xeon_platinum_8176f_firmwarexeon_d-1520xeon_e-2176mxeon_e3-1285_v4xeon_e5-4657l_v2_firmwarexeon_e3-1265l_v3_firmwarexeon_d-2146nt_firmwarexeon_gold_6152xeon_e3-1230_v5_firmwarexeon_e5-2623_v3xeon_e7-4830_v4_firmwarexeon_platinum_8158xeon_e3-1275_v3_firmwarexeon_e5-2418l_v3xeon_e5-2658a_v3xeon_e7-8857_v2xeon_e-2286gxeon_e5-2680_v2_firmwarexeon_e7-2890_v2xeon_w-2125_firmwarexeon_d-1520_firmwarexeon_e3-1268l_v5_firmwarecore_i5-8365u_firmwarexeon_platinum_8176xeon_w-2175_firmwarecore_i7-6700te_firmwarexeon_silver_4112_firmwarexeon_e3-1241_v3_firmwarexeon_e3-1275_v6xeon_e5-4610_v2xeon_e7-4820_v2xeon_d-1531xeon_e-2244g_firmwarexeon_e3-1575m_v5core_i5-6360u_firmwarexeon_e5-2660_v4_firmwarexeon_e-2278gxeon_e5-2650_v4xeon_e3-1505l_v5xeon_d-1533nxeon_e7-8867_v3xeon_e7-8880_v2_firmwarexeon_e5-2450l_v2xeon_e3-1245_v6xeon_gold_6128xeon_w-3175x_firmwarexeon_d-2142itcore_i7-8850hxeon_gold_5118xeon_e5-2695_v4xeon_gold_6130fcore_i5-5350uxeon_e3-1281_v3_firmwarexeon_e5-4624l_v2core_i9-9900_firmwarexeon_e3-1505m_v6_firmwarexeon_e3-1545m_v5_firmwarexeon_gold_6142f_firmwarexeon_e3-1235l_v5xeon_e5-2603_v4xeon_e5-2643_v2xeon_e5-2695_v3_firmwarexeon_e5-1660_v4_firmwarexeon_e5-4628l_v4xeon_e5-2630l_v2_firmwarexeon_e5-2418l_v2xeon_e7-8860_v4core_i5-8500_firmwarexeon_e3-1285l_v3xeon_e5-2650l_v2xeon_e5-2680_v3_firmwarexeon_gold_6138pcore_i5-5300u_firmwarexeon_e5-2430l_v2_firmwarexeon_gold_6138p_firmwarecore_i5-6300u_firmwarexeon_platinum_8176fxeon_e7-4880_v2xeon_e7-8867_v4_firmwarexeon_e3-1240l_v3_firmwarexeon_e7-4850_v2_firmwarecore_i5-9400h_firmwarexeon_e7-8890_v3xeon_e3-1275_v2xeon_e5-2623_v4_firmwarexeon_e3-1285_v4_firmwarexeon_e3-1505l_v5_firmwarexeon_e5-2697_v2_firmwarexeon_d-1543nxeon_d-1528_firmwarexeon_e-2278gel_firmwarecore_i5-5350u_firmwarecore_i5-6360uxeon_e3-1245_v6_firmwarexeon_d-1521xeon_e-2144gcore_i5-9500t_firmwarecore_m5-6y57_firmwarexeon_e5-2637_v3_firmwarexeon_e5-2428l_v2_firmwarexeon_e5-4640_v3xeon_e5-4650_v4_firmwarecore_i5-9600txeon_silver_4110_firmwarecore_i5-8600txeon_e5-1428l_v3core_i7-9700_firmwarexeon_platinum_8180xeon_d-2177ntxeon_e-2146gxeon_e5-2628l_v3_firmwarexeon_e5-2650l_v3xeon_w-2175xeon_e7-2880_v22019.2 IPU – Intel(R) Processor Security
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-0161
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwareamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8734
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-02 Feb, 2021 | 20:20
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-m10jnp2sb_firmwarem10jnp2sbIntel® Server Board M10JNP2SB Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2022-27635
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.15%
||
7 Day CHG+0.01%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-wireless-ac_9560killer_wireless-ac_1550i\/skillerwi-fi_6e_ax211wi-fi_6e_ax210wireless-ac_9462killer_wi-fi_6e_ax1675x\/wuefi_firmwarewireless-ac_9461killer_wi-fi_6e_ax1675i\/sdebian_linuxkiller_wi-fi_6_ax1650i\/sfedorawi-fi_6_ax201killer_wi-fi_6e_ax1690i\/swi-fi_6e_ax411proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-284
Improper Access Control
CVE-2022-26006
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 12.14%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:49
Updated-05 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e5-2699r_v4_firmwarecore_i7-3920xmxeon_e5-4667_v3_firmwarexeon_e5-4620_v4_firmwarexeon_e5-2623_v4xeon_e5-1630_v4xeon_e5-2603_v3xeon_e5-4660_v4xeon_e5-2640_v3_firmwarexeon_e5-2640_v4xeon_e5-2690_v3xeon_e5-2670_v3_firmwarexeon_e5-2687w_v4_firmwarecore_i7-6900k_firmwarexeon_e5-4640_v3xeon_e5-2699_v3core_i7-3940xm_firmwarecore_i7-6950x_firmwarexeon_e5-2630l_v4xeon_e5-2699_v3_firmwarexeon_e5-2698_v3_firmwarexeon_e5-2650_v3xeon_e5-4610_v3_firmwarecore_i7-6850k_firmwarexeon_e5-2620_v4_firmwarexeon_e5-2687w_v3xeon_e5-2618l_v3core_i9-10980xe_firmwarexeon_e5-2699a_v4core_i7-9800xxeon_e5-2695_v3_firmwarexeon_e5-2658_v3_firmwarexeon_e5-4620_v4core_i9-7920x_firmwarexeon_e5-2618l_v3_firmwarexeon_e5-1650_v3xeon_e5-2699_v4_firmwarexeon_e5-2630l_v4_firmwarecore_i5-7640x_firmwarexeon_e5-2650l_v4core_i7-7800x_firmwarexeon_e5-1630_v3_firmwarexeon_e5-2683_v4xeon_e5-2683_v3_firmwarecore_i7-5930k_firmwarexeon_e5-4660_v4_firmwarexeon_e5-2650_v3_firmwarexeon_e5-2623_v4_firmwarexeon_e5-2695_v3xeon_e5-1428l_v3_firmwarecore_i9-9940xxeon_e5-2658a_v3_firmwarexeon_e5-2680_v3xeon_e5-4628l_v4_firmwarexeon_e5-2650_v4_firmwarexeon_e5-4655_v3_firmwarecore_i7-6800kxeon_e5-2428l_v3xeon_e5-1620_v4_firmwarexeon_e5-2630l_v3_firmwarexeon_e5-2438l_v3xeon_e5-2667_v3_firmwarexeon_e5-2680_v4xeon_e5-1620_v4core_i7-4930kxeon_e5-1660_v3_firmwarexeon_e5-2667_v4core_i7-3960xxeon_e5-2648l_v4xeon_e5-2698_v4_firmwarecore_i7-3960x_firmwarexeon_e5-2628l_v3core_i9-7980xe_firmwarexeon_e5-2609_v4xeon_e5-4655_v4_firmwarexeon_e5-1680_v3_firmwarecore_i7-4820k_firmwarexeon_e5-1660_v4_firmwarecore_i9-7980xexeon_e5-2637_v3core_i7-9800x_firmwarexeon_e5-1620_v3xeon_e5-2680_v3_firmwarecore_i9-10980xexeon_e5-1660_v3xeon_e5-4640_v4xeon_e5-2667_v3core_i9-7940x_firmwarecore_i9-9980xe_firmwarexeon_e5-2630_v3_firmwarexeon_e5-2650l_v3xeon_e5-2628l_v3_firmwarecore_i7-3940xmcore_i9-9980xexeon_e5-2608l_v4_firmwarexeon_e5-2697_v3xeon_e5-4640_v4_firmwarecore_i7-4940mx_firmwarexeon_e5-2643_v4_firmwarexeon_e5-2667_v4_firmwarexeon_e5-2697_v4_firmwarexeon_e5-2428l_v3_firmwarexeon_e5-2643_v3_firmwarexeon_e5-2697_v3_firmwarexeon_e5-2640_v3xeon_e5-2418l_v3_firmwarexeon_e5-2648l_v4_firmwarexeon_e5-2695_v4xeon_e5-2683_v3xeon_e5-2609_v3core_i7-5820k_firmwarexeon_e5-2690_v3_firmwarecore_i7-5930kxeon_e5-2603_v3_firmwarexeon_e5-2630_v4core_i9-10900xcore_i7-7740x_firmwarecore_i7-6900kcore_i7-7820x_firmwarexeon_e5-4667_v4_firmwarecore_i9-9960x_firmwarecore_i9-7900x_firmwarexeon_e5-2408l_v3xeon_e5-4660_v3xeon_e5-2699r_v4core_i7-5820kxeon_e5-2628l_v4core_i7-5960x_firmwarexeon_e5-4610_v4_firmwarecore_i7-3970xcore_i7-6950xxeon_e5-2630_v3xeon_e5-4650_v3xeon_e5-2620_v4xeon_e5-1630_v3xeon_e5-2690_v4xeon_e5-2608l_v4xeon_e5-2609_v4_firmwarecore_i9-10940xxeon_e5-2695_v4_firmwarexeon_e5-1680_v4xeon_e5-2658a_v3xeon_e5-2620_v3_firmwarexeon_e5-2630_v4_firmwarexeon_e5-4669_v3xeon_e5-2438l_v3_firmwarexeon_e5-4627_v4_firmwarexeon_e5-2643_v3core_i9-7900xxeon_e5-2658_v4xeon_e5-2628l_v4_firmwarexeon_e5-4655_v4xeon_e5-2660_v4xeon_e5-4648_v3_firmwarecore_i7-6850kcore_i7-4930mxcore_i7-4940mxxeon_e5-4627_v3_firmwarexeon_e5-4669_v3_firmwarecore_i9-7960x_firmwarecore_i9-7920xxeon_e5-2670_v3xeon_e5-2697a_v4xeon_e5-2658_v4_firmwarexeon_e5-2623_v3core_i9-9960xxeon_e5-4610_v4xeon_e5-2697a_v4_firmwarexeon_e5-2623_v3_firmwarecore_i9-10920xcore_i9-9920xxeon_e5-2648l_v3xeon_e5-2637_v3_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2690_v4_firmwarecore_i5-7640xcore_i7-3930k_firmwarexeon_e5-4640_v3_firmwarexeon_e5-4660_v3_firmwarexeon_e5-2687w_v3_firmwarecore_i9-7940xxeon_e5-2660_v4_firmwarexeon_e5-2618l_v4_firmwarecore_i7-3970x_firmwarecore_i7-4930k_firmwarecore_i9-7960xcore_i9-9820xxeon_e5-2699a_v4_firmwarecore_i7-3820_firmwarexeon_e5-2608l_v3_firmwarexeon_e5-1650_v3_firmwarexeon_e5-2640_v4_firmwarecore_i7-4960x_firmwarexeon_e5-1650_v4xeon_e5-2609_v3_firmwarexeon_e5-2648l_v3_firmwarecore_i7-7820xcore_i7-3930kcore_i9-9900xxeon_e5-2603_v4_firmwarexeon_e5-4627_v4xeon_e5-1680_v3core_i9-10900x_firmwarecore_i7-4930mx_firmwarexeon_e5-4648_v3xeon_e5-2418l_v3core_i7-3820xeon_e5-4669_v4_firmwarecore_i7-3920xm_firmwarexeon_e5-2683_v4_firmwarexeon_e5-1680_v4_firmwarexeon_e5-1620_v3_firmwarexeon_e5-2698_v3xeon_e5-2630l_v3xeon_e5-4620_v3_firmwarexeon_e5-4655_v3core_i9-9920x_firmwarexeon_e5-2608l_v3xeon_e5-4669_v4xeon_e5-1630_v4_firmwarecore_i7-5960xxeon_e5-2699_v4core_i7-7800xxeon_e5-4627_v3xeon_e5-4610_v3xeon_e5-2650_v4xeon_e5-2660_v3xeon_e5-2698_v4core_i9-9820x_firmwarexeon_e5-4628l_v4core_i7-4960xxeon_e5-4667_v3xeon_e5-4620_v3xeon_e5-2408l_v3_firmwarecore_i9-9900x_firmwarexeon_e5-1428l_v3xeon_e5-2658_v3xeon_e5-2687w_v4xeon_e5-2643_v4xeon_e5-4650_v4core_i9-9940x_firmwarecore_i9-10920x_firmwarexeon_e5-2637_v4core_i7-6800k_firmwarecore_i7-4820kcore_i9-10940x_firmwarexeon_e5-2620_v3xeon_e5-2697_v4xeon_e5-2618l_v4xeon_e5-2660_v3_firmwarexeon_e5-4650_v4_firmwarexeon_e5-2680_v4_firmwarexeon_e5-1660_v4xeon_e5-2650l_v4_firmwarexeon_e5-2603_v4xeon_e5-1650_v4_firmwarexeon_e5-2650l_v3_firmwarecore_i7-7740xxeon_e5-4650_v3_firmwarexeon_e5-4667_v4Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2018-3657
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.26% / 49.54%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.

Action-Not Available
Vendor-Intel CorporationSiemens AG
Product-manageability_engine_firmwaresimatic_ipc677d_firmwaresimatic_ipc477e_firmwaresimatic_ipc427e_firmwaresimatic_ipc647d_firmwaresimatic_ipc427esimatic_ipc647dsimatic_ipc547e_firmwaresimatic_ipc627dsimatic_pc547esimatic_ipc847dsimatic_ipc827dsimatic_ipc547gsimatic_field_pg_m5_firmwaresimatic_ipc847d_firmwaresimatic_pc547g_firmwaresimatic_ipc677dsimatic_ipc627d_firmwaresimatic_itp1000_firmwaresimatic_ipc827d_firmwareconverged_security_management_engine_firmwaresimatic_ipc477esimatic_field_pg_m5simatic_itp1000active_management_technology_firmwareIntel(R) Active Management Technology
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-32569
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.48%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in BIOS firmware for some Intel(R) NUC M15 Laptop Kits before version BCTGL357.0074 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_lapbc710_firmwarenuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510_firmwareIntel(R) NUC M15 Laptop Kits
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-38102
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.01% / 1.63%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_n3010atom_x6212receleron_j1750atom_x6211eceleron_n2840atom_x6214repentium_j6426celeron_n2808pentium_j2850celeron_j4025celeron_n2910pentium_j4205celeron_n2930h570pentium_n3510celeron_j6413c256celeron_n3350hm570celeron_n3050celeron_j1850celeron_n6210pentium_n3700w680celeron_n2920atom_x6413eceleron_n3000celeron_n2807pentium_n3520atom_x6425eceleron_n2815pentium_j3710pentium_j2900q570qm580celeron_j3060h510c252q670eceleron_n3160celeron_n6211converged_security_management_engine_firmwareceleron_n2940h670rm590eceleron_n5105pentium_n3530celeron_j3455pentium_n3540z690celeron_n4000celeron_j3455eceleron_n2830pentium_n4200eceleron_n4500atom_x6425receleron_n2820wm690pentium_n6415atom_x6427feceleron_n3450qm580eceleron_n5100h610celeron_n4020celeron_j4105pentium_n3710celeron_j3160celeron_j6412celeron_n3150b560celeron_n2810celeron_n4100celeron_j1800atom_x6200feceleron_n2805atom_x6416receleron_n2806celeron_j1900celeron_n3060z590r680eq670celeron_n4505h610ewm590celeron_j4005b660hm670celeron_j3355pentium_n4200celeron_n4120celeron_n3350ew580celeron_j3355eatom_x6414receleron_j4125hm570eIntel(R) Converged Security and Management Engine
CWE ID-CWE-20
Improper Input Validation
CVE-2022-37343
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 8.56%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-atom_c3750xeon_d-2796teatom_c3858_firmwareatom_c3338ratom_c3758_firmwarexeon_d-1627_firmwarexeon_d-2738atom_p5322_firmwareatom_c3830_firmwareatom_c3558r_firmwareatom_c3758rxeon_d-2777nxxeon_d-1718txeon_d-1527xeon_d-2766ntatom_c3950_firmwareatom_c3708xeon_d-1523nxeon_d-2786nte_firmwareatom_p5752_firmwarexeon_d-2786ntexeon_d-1540xeon_d-1746ter_firmwareatom_c3336_firmwareatom_c3955_firmwareatom_p5322xeon_d-1653nxeon_d-2163it_firmwarexeon_d-1528atom_p5742xeon_d-2776ntxeon_d-1637xeon_d-2798ntatom_p5362xeon_d-1715ter_firmwarexeon_d-1733ntxeon_d-1577xeon_d-1521_firmwareatom_c3758r_firmwarexeon_d-1527_firmwareatom_p5742_firmwarexeon_d-2775te_firmwarexeon_d-2141ixeon_d-2766nt_firmwarexeon_d-1557_firmwarexeon_d-1541atom_c3708_firmwarexeon_d-1543n_firmwarexeon_d-1518xeon_d-1633n_firmwarexeon_d-1714xeon_d-1722ne_firmwarexeon_d-2799_firmwarexeon_d-2745nx_firmwarexeon_d-1747ntexeon_d-2143itxeon_d-2757nx_firmwarexeon_d-2163itxeon_d-1653n_firmwarexeon_d-1734ntxeon_d-1734nt_firmwarexeon_d-1735tr_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_d-1747nte_firmwarexeon_d-1553natom_c3538xeon_d-1567_firmwareatom_c3808_firmwarexeon_d-1571_firmwareatom_c3955xeon_d-1567xeon_d-2777nx_firmwarexeon_d-1633natom_c3850xeon_d-1548xeon_d-2173it_firmwareatom_p5332xeon_d-1649nxeon_d-1529atom_c3308_firmwarexeon_d-1746teratom_p5731atom_c3436l_firmwarexeon_d-1531_firmwarexeon_d-1518_firmwareatom_c3338r_firmwareatom_c3750_firmwareatom_p5752xeon_d-2123it_firmwareatom_p5332_firmwarexeon_d-2738_firmwareatom_p5721xeon_d-2757nxxeon_d-1713ntxeon_d-1715teratom_c3508xeon_d-1520xeon_d-1571xeon_d-2752terxeon_d-1736_firmwarexeon_d-2799atom_c3338xeon_d-2146nt_firmwareatom_p5352xeon_d-2795ntxeon_d-2173itatom_c3508_firmwarexeon_d-1739_firmwarexeon_d-2123itxeon_d-1736ntxeon_d-2177nt_firmwarexeon_d-1713nt_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwarexeon_d-2796ntxeon_d-2798nt_firmwarexeon_d-1623nxeon_d-2779xeon_d-1531xeon_d-1602xeon_d-1712tratom_p5731_firmwarexeon_d-1533nxeon_d-2796te_firmwarexeon_d-1539xeon_d-1722nexeon_d-1713ntexeon_d-2142itxeon_d-1718t_firmwarexeon_d-2752ter_firmwarexeon_d-1622_firmwarexeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_d-2146ntatom_p5342_firmwareatom_c3436lxeon_d-1577_firmwarexeon_d-2796nt_firmwareatom_p5931bxeon_d-2145nt_firmwarexeon_d-1702_firmwarexeon_d-1749nt_firmwareatom_c3538_firmwareatom_p5342atom_c3858xeon_d-2161ixeon_d-2141i_firmwarexeon_d-1726_firmwareatom_c3558_firmwarexeon_d-2187ntatom_p5352_firmwarexeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2798nxatom_c3338_firmwarexeon_d-1732te_firmwarexeon_d-2776nt_firmwarexeon_d-2712t_firmwarexeon_d-2745nxxeon_d-1623n_firmwareatom_p5931b_firmwarexeon_d-1748teatom_c3336atom_c3958xeon_d-1548_firmwareatom_c3850_firmwarexeon_d-1713nte_firmwareatom_c3808xeon_d-2183itxeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1622xeon_d-1739atom_p5962b_firmwarexeon_d-1543nxeon_d-1559_firmwarexeon_d-1528_firmwarexeon_d-1539_firmwarexeon_d-1559xeon_d-1702xeon_d-1521xeon_d-2145ntatom_c3950xeon_d-1748te_firmwarexeon_d-1749ntxeon_d-1637_firmwarexeon_d-1529_firmwarexeon_d-1712tr_firmwarexeon_d-1540_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_d-2798nx_firmwareatom_c3558atom_p5362_firmwareatom_p5721_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwareatom_c3308xeon_d-2143it_firmwarexeon_d-2753ntxeon_d-1736xeon_d-2775texeon_d-1557atom_p5962bxeon_d-1735trxeon_d-1513n_firmwarexeon_d-1714_firmwarexeon_d-2795nt_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_d-2752ntexeon_d-1523n_firmwarexeon_d-1726xeon_d-2753nt_firmwarexeon_d-2177ntatom_c3758atom_c3958_firmwarexeon_d-1553n_firmwareatom_c3558ratom_c3830Intel(R) Processors
CWE ID-CWE-284
Improper Access Control
CVE-2022-32231
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.59%
||
7 Day CHG+0.01%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276lxeon_silver_4210r_firmwarexeon_platinum_8170_firmwarexeon_platinum_9222xeon_bronze_3104_firmwarexeon_gold_6230txeon_gold_6146xeon_gold_6126f_firmwarexeon_gold_6126txeon_platinum_8362xeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_6338xeon_gold_6338t_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_silver_4309yxeon_platinum_8352yxeon_gold_5217_firmwarexeon_platinum_8380h_firmwarexeon_gold_6138xeon_platinum_8360hl_firmwarexeon_gold_6354_firmwarexeon_gold_6246xeon_gold_6326xeon_platinum_8164xeon_gold_5317_firmwarexeon_gold_6240_firmwarexeon_gold_6234xeon_silver_4116t_firmwarexeon_gold_6238rxeon_silver_4316xeon_gold_5318y_firmwarexeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_gold_6348_firmwarexeon_platinum_8168xeon_gold_5318s_firmwarexeon_gold_6244_firmwarexeon_gold_5218xeon_silver_4109txeon_bronze_3206r_firmwarexeon_platinum_8380hxeon_gold_5215lxeon_silver_4215rxeon_gold_6138t_firmwarexeon_gold_5220r_firmwarexeon_silver_4116_firmwarexeon_gold_5122_firmwarexeon_silver_4215_firmwarexeon_platinum_8368q_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_platinum_8376hxeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_silver_4210txeon_platinum_8362_firmwarexeon_gold_6212u_firmwarexeon_gold_6126_firmwarexeon_silver_4310t_firmwarexeon_gold_6212uxeon_silver_4114xeon_gold_6240l_firmwarexeon_gold_6314uxeon_gold_6248rxeon_gold_6250l_firmwarexeon_silver_4214r_firmwarexeon_platinum_8276_firmwarexeon_gold_6258rxeon_bronze_3104xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6150_firmwarexeon_gold_6250xeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwarexeon_platinum_8156xeon_bronze_3106_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8260y_firmwarexeon_platinum_8358p_firmwarexeon_gold_5320xeon_gold_6144_firmwarexeon_platinum_8360yxeon_gold_6330h_firmwarexeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_6338txeon_gold_5218txeon_gold_6150xeon_gold_6240y_firmwarexeon_gold_6242_firmwarexeon_gold_5220rxeon_silver_4114_firmwarexeon_gold_5318sxeon_gold_6140xeon_gold_6230_firmwarexeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_platinum_8356h_firmwarexeon_gold_6250lxeon_gold_6210uxeon_gold_6126xeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8158_firmwarexeon_platinum_8358pxeon_gold_5120_firmwarexeon_gold_6328h_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6134_firmwarexeon_gold_6328hl_firmwarexeon_gold_6130t_firmwarexeon_gold_6242r_firmwarexeon_gold_6342_firmwarexeon_gold_5218r_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4116txeon_gold_6130f_firmwarexeon_gold_6348h_firmwarexeon_platinum_8356hxeon_gold_6246r_firmwarexeon_gold_6142fxeon_platinum_8360y_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_platinum_8153_firmwarexeon_gold_6130xeon_gold_5318h_firmwarexeon_silver_4214y_firmwarexeon_gold_5320txeon_silver_4208xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_gold_6312uxeon_silver_4214_firmwarexeon_gold_5320h_firmwarexeon_gold_5220sxeon_platinum_9242xeon_platinum_9282xeon_gold_5119t_firmwarexeon_platinum_8280lxeon_silver_4110xeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_bronze_3204xeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarexeon_platinum_8280_firmwarexeon_gold_6240r_firmwarexeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_6246rxeon_platinum_8358xeon_gold_5315yxeon_gold_5217xeon_platinum_8352s_firmwarexeon_gold_6230nxeon_silver_4215r_firmwarexeon_platinum_8354hxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_bronze_3106xeon_gold_6138txeon_silver_4310_firmwarexeon_gold_6338n_firmwarexeon_gold_6248r_firmwarexeon_gold_6256_firmwarexeon_platinum_9221_firmwarexeon_gold_5120xeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_platinum_8368xeon_gold_6154_firmwarexeon_gold_5220xeon_platinum_8160txeon_silver_4214rxeon_gold_6254xeon_silver_4209t_firmwarexeon_silver_4310txeon_silver_4114txeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_gold_6230t_firmwarexeon_platinum_8380xeon_gold_6314u_firmwarexeon_gold_5215l_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_silver_4208_firmwarexeon_gold_6208uxeon_gold_6330n_firmwarexeon_platinum_8268xeon_platinum_8352vxeon_gold_6336yxeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_6230n_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_gold_6230r_firmwarexeon_silver_4209txeon_silver_4116xeon_gold_6234_firmwarexeon_gold_6210u_firmwarexeon_platinum_8360hlxeon_gold_6252nxeon_platinum_8380_firmwarexeon_platinum_9221xeon_gold_6244xeon_gold_6330_firmwarexeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_gold_5320_firmwarexeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_gold_6354xeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_6336y_firmwarexeon_gold_5218_firmwarexeon_gold_6132xeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_platinum_8158xeon_gold_6238l_firmwarexeon_gold_6330hxeon_gold_5218b_firmwarexeon_gold_6222vxeon_gold_5318hxeon_platinum_8176xeon_platinum_8160_firmwarexeon_silver_4316_firmwarexeon_platinum_8376hlxeon_gold_6242xeon_silver_4112_firmwarexeon_gold_6262v_firmwarexeon_gold_6142xeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_6148_firmwarexeon_gold_6128xeon_gold_6346xeon_silver_4215xeon_gold_5220t_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_silver_4210t_firmwarexeon_gold_5220_firmwarexeon_gold_6338nxeon_gold_6208u_firmwarexeon_silver_4214xeon_gold_6142f_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarexeon_platinum_8276xeon_gold_6250_firmwarexeon_gold_6238txeon_silver_4210rxeon_platinum_8164_firmwarexeon_silver_4214yxeon_gold_6348xeon_gold_5218bxeon_gold_6330nxeon_platinum_8368_firmwarexeon_silver_4216_firmwarexeon_gold_6138pxeon_gold_6254_firmwarexeon_gold_6138p_firmwarexeon_platinum_8176fxeon_platinum_8352v_firmwarexeon_platinum_8368qxeon_gold_5320t_firmwarexeon_gold_6240rxeon_silver_4310xeon_gold_6258r_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_6256xeon_gold_6238r_firmwarexeon_gold_6342xeon_gold_5120txeon_gold_6230rxeon_gold_6252xeon_gold_6134xeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_5218rxeon_bronze_3206rxeon_gold_6226rxeon_gold_6328hxeon_gold_6252_firmwarexeon_gold_6334_firmwarexeon_gold_6148xeon_silver_4110_firmwarexeon_gold_6209u_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6328hlxeon_platinum_9282_firmwarexeon_platinum_8180xeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_gold_5220tIntel(R) Processors
CWE ID-CWE-665
Improper Initialization
CVE-2022-30539
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.65%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6330hxeon_platinum_8358xeon_gold_5318hxeon_gold_5315yxeon_platinum_8376hlxeon_silver_4316_firmwarexeon_platinum_8352s_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8362xeon_platinum_8358p_firmwarexeon_gold_5320xeon_platinum_8360yxeon_gold_6330h_firmwarexeon_platinum_8354hxeon_gold_6338xeon_silver_4310_firmwarexeon_gold_6338t_firmwarexeon_gold_6338n_firmwarexeon_gold_6338txeon_gold_6346xeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_gold_5318sxeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_gold_6338nxeon_platinum_8360hl_firmwarexeon_platinum_8368xeon_gold_6354_firmwarexeon_platinum_8356h_firmwarexeon_gold_6326xeon_platinum_8360hxeon_gold_5315y_firmwarexeon_silver_4310txeon_gold_5317_firmwarexeon_platinum_8380xeon_gold_6348xeon_gold_6314u_firmwarexeon_gold_6330nxeon_silver_4316xeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_platinum_8368_firmwarexeon_gold_5318y_firmwarexeon_platinum_8380hlxeon_gold_6330n_firmwarexeon_gold_5318nxeon_platinum_8358pxeon_platinum_8352vxeon_gold_6336yxeon_platinum_8352v_firmwarexeon_gold_6348_firmwarexeon_gold_6328h_firmwarexeon_platinum_8368qxeon_gold_5318s_firmwarexeon_gold_5320t_firmwarexeon_silver_4310xeon_gold_6328hl_firmwarexeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_platinum_8356hxeon_gold_6348h_firmwarexeon_platinum_8380hxeon_platinum_8360hlxeon_platinum_8368q_firmwarexeon_platinum_8380_firmwarexeon_gold_6342xeon_platinum_8376hxeon_gold_6330_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8360y_firmwarexeon_platinum_8362_firmwarexeon_gold_5318h_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_silver_4310t_firmwarexeon_gold_5320txeon_gold_6314uxeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_5320_firmwarexeon_gold_6312uxeon_gold_5320h_firmwarexeon_gold_6328hxeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_gold_6334_firmwarexeon_gold_6354xeon_gold_6336y_firmwarexeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_gold_6328hlxeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8353hxeon_platinum_8352y_firmwarexeon_gold_6348hxeon_gold_6338_firmwareIntel(R) Processors
CWE ID-CWE-416
Use After Free
CVE-2021-33164
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 12.46%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in BIOS firmware for some Intel(R) NUCs before version INWHL357.0046 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/abios_firmwareIntel Corporation
Product-nuc_8_mainstream-g_kit_nuc8i7inhnuc_8_mainstream-g_kit_nuc8i5inh_firmwarenuc_8_mainstream-g_kit_nuc8i5inhnuc_8_mainstream-g_mini_pc_nuc8i7inhnuc_8_mainstream-g_mini_pc_nuc8i5inh_firmwarenuc_8_mainstream-g_mini_pc_nuc8i7inh_firmwarenuc_8_mainstream-g_mini_pc_nuc8i5inhnuc_8_mainstream-g_kit_nuc8i7inh_firmwareIntel(R) NUCsintel_r_nucs
CVE-2021-0166
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwareamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-0168
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwareamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0169
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 22.87%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-proset_ac_3165amt_wi-fi_6_ax201proset_ac_9462amt_ac_9560_firmwareproset_ac_8265killer_wi-fi_6_ax1650amt_wi-fi_6_ax201_firmwareproset_ac_3165_firmwareamt_ac_8265_firmwareproset_ac_8260proset_ac_9461_firmwareproset_wi-fi_6_ax201_firmwareproset_wi-fi_6e_ax210proset_wireless_7265_\(rev_d\)_firmwareamt_wi-fi_6_ax210_firmwareproset_wi-fi_6_ax200_firmwarekiller_wi-fi_6_ax1650_firmwareproset_wi-fi_6_ax200proset_ac_9461proset_ac_8260_firmwareamt_wi-fi_6_ax200amt_wi-fi_6_ax210amt_ac_8260_firmwareamt_ac_8260killer_ac_1550_firmwareamt_ac_9260_firmwareproset_ac_8265_firmwareproset_wireless_7265_\(rev_d\)proset_ac_9462_firmwareproset_wi-fi_6_ax201killer_wi-fi_6e_ax1675_firmwareproset_wi-fi_6e_ax210_firmwareproset_ac_9260killer_wi-fi_6e_ax1675proset_ac_9560amt_wi-fi_6_ax200_firmwareamt_ac_9260proset_ac_9260_firmwareamt_ac_8265amt_ac_9560proset_ac_9560_firmwarekiller_ac_1550proset_ac_3168proset_ac_3168_firmwareIntel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-0107
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 36.92%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-core_i7-6870hqxeon_e-2286gatom_c3950core_i3-9100ecore_i3-10100xeon_silver_4109tcore_i3-7300core_i5-1038ng7core_i5-11400core_i9-7900xcore_i7-10510yxeon_d-1548xeon_bronze_3106xeon_platinum_8260yxeon_d-1633nxeon_d-1653nxeon_platinum_8153xeon_e-2246gcore_i5-6350hqcore_i9-9960xcore_i3-6300txeon_e-2374gxeon_gold_5218txeon_w-2123core_i5-11260hxeon_e-2236xeon_gold_5218nxeon_w-1270exeon_d-1531core_i5-6500tcore_i5-7500core_i5-6260uxeon_e-2278gecore_i5-7440hqxeon_platinum_8156core_i7-8709gatom_c3758xeon_d-2177ntxeon_gold_6142fxeon_silver_4214ycore_i9-11900kfxeon_w-10855mxeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_w-3235core_i9-10900txeon_e-2126gcore_i5-8200ycore_i7-10700tecore_i9-10900kxeon_gold_5220rcore_i5-8260ucore_i5-11400fxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-1185g7core_i7-9700kfcore_i9-10900xxeon_platinum_9221xeon_d-2142itcore_m7-6y75xeon_w-3335core_i9-11900kcore_i5-10500hxeon_w-11555mrecore_i5-10600kfxeon_e-2146gcore_i3-1005g1core_i7-1068ng7xeon_silver_4112xeon_gold_6140xeon_d-1637core_i5-9400fcore_i3-10100ecore_i7-6800kcore_i7-7560uatom_c3538core_i7-9700txeon_gold_5120xeon_gold_6238core_i5-11600kfcore_i5-7600tcore_i7-4820kxeon_d-1602core_i5-8365uatom_c3508xeon_w-2245core_i5-9600kfxeon_d-2145ntxeon_platinum_8256xeon_gold_6130fxeon_e-2276mxeon_e-2224gcore_i5-8269uxeon_d-2163itcore_i3-1120g4core_i7-3930kcore_i5-11400hcore_i9-11900hxeon_d-1623ncore_i7-1185g7ecore_i7-10810ucore_i3-10300txeon_d-1521core_i3-8100core_i3-8145uecore_i5-1130g7core_i9-11900core_i5-6585rcore_i5-9600kxeon_gold_6144core_i5-8265ucore_i7-10700tcore_i9-9900kfcore_i3-7100core_m5-6y54core_i5-6300hqxeon_gold_5118core_i5-1145g7core_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kxeon_silver_4114tcore_i5-8500bxeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_gold_6212ucore_i5-6600core_i3-8100hcore_i7-8706gcore_i3-6300core_i9-11900fxeon_silver_4215xeon_gold_6230ncore_i9-10920xcore_i9-11950hatom_c3750xeon_gold_6138pcore_i7-1195g7core_i5-10310ucore_i9-10885hcore_i7-8557ucore_i5-7440eqcore_i3-6320xeon_e-2386gcore_i7-1165g7core_m3-7y32core_i7-11850hexeon_e-2134xeon_w-1290tecore_i5-1145g7ecore_i5-6440eqcore_i5-1030g7core_i9-10980hkxeon_e-2176mxeon_w-11155mlexeon_gold_6130xeon_silver_4210txeon_e-2274gxeon_gold_6136core_i5-6287ucore_i7-8500yxeon_w-3323core_i5-9600tatom_c3558rcore_i9-7960xxeon_w-1370atom_c3808core_i5-9600xeon_d-1559xeon_gold_6134xeon_w-3375xeon_e-2174gcore_i5-8600txeon_d-1537xeon_gold_5218bxeon_gold_6128core_i7-1180g7xeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_gold_6146xeon_w-1370pxeon_gold_6254core_i3-10320xeon_gold_5218rcore_i3-10105fxeon_w-2235core_i3-6098pcore_i5-6400xeon_d-1649nxeon_w-3175xcore_i7-10875hxeon_w-3225core_i3-7101tecore_i7-7700xeon_d-1540core_i3-11100hecore_i5-10400hxeon_gold_6246rcore_i5-7300hqxeon_d-1513nxeon_w-10885mxeon_gold_6126xeon_d-1527core_i9-9940xcore_i9-9900xcore_i5-6600kcore_i9-7940xcore_i7-9700exeon_e-2254mecore_i7-9700tecore_i7-6700txeon_gold_6248rxeon_silver_4214xeon_w-2125xeon_platinum_9222core_i3-10105tcore_i5-11300hcore_i5-6500texeon_gold_5220sxeon_platinum_8260core_i5-6500core_i3-1000g4core_i3-9100hlcore_i9-10900kfcore_i3-10100tatom_c3858xeon_d-2146ntxeon_e-2144gcore_i9-9980hkxeon_w-11555mlecore_i5-11500hexeon_e-2244gcore_i3-7100tcore_i3-6102exeon_w-1390txeon_silver_4216core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqxeon_platinum_8180xeon_platinum_8276lxeon_gold_6138tcore_i7-7740xcore_i7-11375hcore_i7-7y75core_i7-8559ucore_i5-9500eatom_c3850core_i5-11500txeon_e-2124gcore_i7-4930kcore_i5-9400core_i7-4960xcore_i7-5960xcore_i7-6600uxeon_gold_6138core_i7-1185grecore_i3-10325xeon_gold_6138fxeon_e-2356gcore_i7-8700xeon_d-1557core_i3-7130ucore_i5-8400atom_c3436lxeon_w-3245mxeon_e-2334core_i7\+8700core_i7-9850hatom_c3708xeon_w-1350core_i5-7600core_i9-10980xecore_i7-6500ucore_i5-1035g1xeon_w-11865mlecore_i7-11850hxeon_w-1290xeon_e-2186gxeon_silver_4210core_i3-10110uxeon_gold_6234atom_c3336core_i7-4930mxxeon_w-1350pcore_i9-10900xeon_w-1250core_i5-9400tcore_i5-7360ucore_i5-7300ucore_i7-11800hcore_i3-10300core_i5-6600tcore_i7-8565uxeon_gold_6154xeon_silver_4110core_i7-7700katom_c3830xeon_platinum_8176core_i7-10870hcore_i3-10100fcore_i7-10510uxeon_bronze_3104xeon_w-1290pcore_i5-8310yxeon_gold_5217core_i5-6440hqcore_i7-6850kxeon_gold_5120txeon_e-2324gxeon_w-3245core_i7-6660ucore_i9-7980xecore_i3-6100exeon_gold_6210ucore_i5-7200uxeon_gold_5115core_i7-9700fxeon_w-3345core_i5-10210ucore_i7-6820hqxeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500core_i5-8400bcore_i3-7100hcore_i7-8850hxeon_gold_5215core_i3-6100ucore_i9-9900kscore_i9-7920xxeon_w-11865mrecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i5-6360ucore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_e-2378core_i7-7820xcore_i3-1115g4ecore_i5-10600tcore_i5-7640xcore_i7-7800xxeon_w-3275mxeon_gold_6250lcore_i5-9400hxeon_gold_6209ucore_i9-9920xxeon_platinum_8253xeon_gold_6252ncore_i7-7660ucore_i3-9320xeon_platinum_8158core_i7-7700hqatom_c3308xeon_platinum_8280core_i5-6402pcore_m3-7y30xeon_w-11155mrexeon_gold_6252xeon_w-2135core_i3-10105core_i5-11400tcore_i7-11700kcore_i7-4940mxcore_i7-8550uxeon_e-2276mlxeon_gold_6246xeon_silver_4214rcore_i9-10940xcore_i7-9700core_i7-6700hqcore_i3-8300core_i7-9850hexeon_gold_6230rcore_i7-10700kfcore_i5-8400tcore_i5-7500txeon_d-2187ntxeon_silver_4116tcore_i7-1065g7xeon_d-1518core_i7-9800xxeon_silver_4208core_i5-6267ucore_i3-1000g1xeon_gold_6126txeon_w-2225xeon_silver_4116xeon_e-2276mecore_i5-7y54xeon_w-1250ecore_i5-7400core_i7-6950xfas\/aff_biosxeon_platinum_8160fxeon_platinum_8164core_i7-6567uxeon_platinum_8176fxeon_gold_5215lcore_i5-7287uxeon_platinum_8168core_i7-3970xcore_i7-3960xcore_i7-11600hcore_i7-7920hqcore_i7-10700core_i5-1145grecore_i3-7020uxeon_d-1533nxeon_gold_6240lxeon_w-3265mxeon_gold_6248core_i5-1135g7xeon_w-2195xeon_e-2136core_i5-9300hfxeon_w-1270pcore_i3-1115g4xeon_gold_6258rxeon_platinum_9282core_i3-8145ucore_i3-9300core_i5-10400xeon_d-2173itxeon_d-2161icore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_d-2123itxeon_platinum_8160tcore_i3-8109ucore_i5-8365uexeon_gold_6142core_i3-1110g4xeon_bronze_3206rxeon_gold_6148core_i7-3820xeon_w-3275xeon_gold_6240core_i3-7320core_i7-10700ecore_i5-8350ucore_i7-3940xmxeon_gold_5220xeon_gold_6126fcore_i3-10100tecore_m5-6y57xeon_e-2388gcore_i7-11390hxeon_platinum_8268xeon_e-2226gcore_i5-7y57core_i7-6700texeon_gold_6240rcore_i7-3920xmcore_i5-7260uxeon_e-2278gxeon_silver_4215rcore_i9-10900ecore_i3-9100core_i7-9750hxeon_e-2124core_i5-8250ucore_i5-8600core_i9-11980hkxeon_w-3265core_i5-10500tecore_i5-11500core_i3-6100tecore_i7-11700xeon_platinum_8160xeon_gold_5119tcore_i7-8700bcore_i5-10500txeon_gold_6148fcore_i5-10600core_i5-10310yxeon_w-1250texeon_gold_6208ucore_i3-9100teatom_c3338core_i5-8259uxeon_gold_6242core_i7-10700kxeon_e-2336xeon_d-1627xeon_e-2186mxeon_e-2286mcore_i9-9880hcore_i7-6650ucore_i7-11370hcore_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i5-1035g4core_i5-11600tcore_i7-8650ucore_i5-10200hcore_i9-9900kcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220tcore_i7-5930kcore_i5-10400fcore_i7-1160g7core_i7-7600uxeon_gold_6244xeon_gold_6242rcore_i3-7100exeon_w-2275xeon_w-2265core_i5-9500xeon_gold_6226rcore_i3-7101ecore_i9-9900xeon_bronze_3204core_i9-9820xxeon_d-1567xeon_w-3365core_i7-9850hlcore_i5-8400hcore_i5-6300ucore_m3-6y30core_i7-9750hfxeon_d-2141ixeon_w-2175xeon_silver_4108core_i3-10110ycore_i5-1035g7core_i7-7820hkxeon_e-2254mlxeon_w-11855mcore_i5-8305gcore_i3-6100xeon_gold_6240ycore_i3-9350kxeon_gold_6238lxeon_w-1390cloud_backupcore_i3-1115grecore_i5-11600core_i5-7400tcore_i7-11700fcore_i3-6100tcore_i7-8750hcore_i7-8665ucore_i3-10305txeon_d-2183itcore_i5-8300hcore_i3-8140ucore_i3-8350kcore_i5-10600kcore_i7-8086kxeon_gold_5222core_i7-10850hxeon_d-1523nxeon_gold_6256core_i5-9500teatom_c3958xeon_gold_6130tatom_c3338rxeon_d-1520core_i3-8100bcore_i3-6167ucore_i5-8279uxeon_platinum_8280lcore_m3-8100ycore_i5-7267ucore_i5-8600kcore_i3-7100uxeon_d-1543ncore_i5-6442eqcore_i7-8700txeon_silver_4114xeon_d-1541core_i7-11700txeon_d-1622xeon_platinum_9242core_i7-6700kcore_i7-6970hqxeon_w-2223core_i7-6822eqcore_i3-7300txeon_gold_6238tatom_c3955core_i5-8500core_i9-11900tcore_i5-8210ycore_i7-6785rcore_i7-6560ucore_i7-1060g7core_i5-8257ucore_i7-8569ucore_i7-5820kcore_i9-9900tcore_i7-6900kcore_i7-7700tcore_i9-9980xeatom_c3558core_i5-6685rxeon_w-2133xeon_gold_6250core_i3-9350kfxeon_platinum_8260lxeon_platinum_8270xeon_w-1290tcore_i5-8500tcore_i7-8809gxeon_gold_6226core_i5-11320hxeon_d-1577xeon_gold_6132xeon_e-2314core_i5-6400tcore_i3-10305xeon_d-2166ntcore_i3-7350kxeon_w-1390pcore_i5-10505xeon_d-1539core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i5-7600kcore_i7-6820hkxeon_w-2255xeon_gold_6262vcore_i3-6006ucore_i7-10710ucore_i5-10210ycore_i5-10300hxeon_w-1270texeon_e-2224xeon_gold_5218xeon_w-2145xeon_gold_6238rcore_i3-9100fxeon_platinum_8170core_i9-10900fcore_i3-1125g4xeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_e-2378gcore_i3-8100tcore_i5-9500txeon_w-3223xeon_w-2155xeon_gold_6152core_i3-7102exeon_gold_6150xeon_e-2276gcore_i5-6200uxeon_gold_6222vcore_i7-10700fxeon_d-1571xeon_gold_5122atom_c3758rxeon_gold_6230Intel(R) Processors
CWE ID-CWE-252
Unchecked Return Value
CVE-2021-0111
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 36.92%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NULL pointer dereference in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-core_i7-6870hqxeon_e-2286gatom_c3950core_i3-9100ecore_i3-10100xeon_silver_4109tcore_i3-7300core_i5-1038ng7core_i5-11400core_i9-7900xcore_i7-10510yxeon_d-1548xeon_bronze_3106xeon_platinum_8260yxeon_d-1633nxeon_d-1653nxeon_platinum_8153xeon_e-2246gcore_i5-6350hqcore_i9-9960xcore_i3-6300txeon_e-2374gxeon_gold_5218txeon_w-2123core_i5-11260hxeon_e-2236xeon_gold_5218nxeon_w-1270exeon_d-1531core_i5-6500tcore_i5-7500core_i5-6260uxeon_e-2278gecore_i5-7440hqxeon_platinum_8156core_i7-8709gatom_c3758xeon_d-2177ntxeon_gold_6142fxeon_silver_4214ycore_i9-11900kfxeon_w-10855mxeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_w-3235core_i9-10900txeon_e-2126gcore_i5-8200ycore_i7-10700tecore_i9-10900kxeon_gold_5220rcore_i5-8260ucore_i5-11400fxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-1185g7core_i7-9700kfcore_i9-10900xxeon_platinum_9221xeon_d-2142itcore_m7-6y75xeon_w-3335core_i9-11900kcore_i5-10500hxeon_w-11555mrecore_i5-10600kfxeon_e-2146gcore_i3-1005g1core_i7-1068ng7xeon_silver_4112xeon_gold_6140xeon_d-1637core_i5-9400fcore_i3-10100ecore_i7-6800kcore_i7-7560uatom_c3538core_i7-9700txeon_gold_5120xeon_gold_6238core_i5-11600kfcore_i5-7600tcore_i7-4820kxeon_d-1602core_i5-8365uatom_c3508xeon_w-2245core_i5-9600kfxeon_d-2145ntxeon_platinum_8256xeon_gold_6130fxeon_e-2276mxeon_e-2224gcore_i5-8269uxeon_d-2163itcore_i3-1120g4core_i7-3930kcore_i5-11400hcore_i9-11900hxeon_d-1623ncore_i7-1185g7ecore_i7-10810ucore_i3-10300txeon_d-1521core_i3-8100core_i3-8145uecore_i5-1130g7core_i9-11900core_i5-6585rcore_i5-9600kxeon_gold_6144core_i5-8265ucore_i7-10700tcore_i9-9900kfcore_i3-7100core_m5-6y54core_i5-6300hqxeon_gold_5118core_i5-1145g7core_i5-9300hcore_i5-10500ecore_i7-10750hcore_i9-10850kxeon_silver_4114tcore_i5-8500bxeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_gold_6212ucore_i5-6600core_i3-8100hcore_i7-8706gcore_i3-6300core_i9-11900fxeon_silver_4215xeon_gold_6230ncore_i9-10920xcore_i9-11950hatom_c3750xeon_gold_6138pcore_i7-1195g7core_i5-10310ucore_i9-10885hcore_i7-8557ucore_i5-7440eqcore_i3-6320xeon_e-2386gcore_i7-1165g7core_m3-7y32core_i7-11850hexeon_e-2134xeon_w-1290tecore_i5-1145g7ecore_i5-6440eqcore_i5-1030g7core_i9-10980hkxeon_e-2176mxeon_w-11155mlexeon_gold_6130xeon_silver_4210txeon_e-2274gxeon_gold_6136core_i5-6287ucore_i7-8500yxeon_w-3323core_i5-9600tatom_c3558rcore_i9-7960xxeon_w-1370atom_c3808core_i5-9600xeon_d-1559xeon_gold_6134xeon_w-3375xeon_e-2174gcore_i5-8600txeon_d-1537xeon_gold_5218bxeon_gold_6128core_i7-1180g7xeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_gold_6146xeon_w-1370pxeon_gold_6254core_i3-10320xeon_gold_5218rcore_i3-10105fxeon_w-2235core_i3-6098pcore_i5-6400xeon_d-1649nxeon_w-3175xcore_i7-10875hxeon_w-3225core_i3-7101tecore_i7-7700xeon_d-1540core_i3-11100hecore_i5-10400hxeon_gold_6246rcore_i5-7300hqxeon_d-1513nxeon_w-10885mxeon_gold_6126xeon_d-1527core_i9-9940xcore_i9-9900xcore_i5-6600kcore_i9-7940xcore_i7-9700exeon_e-2254mecore_i7-9700tecore_i7-6700txeon_gold_6248rxeon_silver_4214xeon_w-2125xeon_platinum_9222core_i3-10105tcore_i5-11300hcore_i5-6500texeon_gold_5220sxeon_platinum_8260core_i5-6500core_i3-1000g4core_i3-9100hlcore_i9-10900kfcore_i3-10100tatom_c3858xeon_d-2146ntxeon_e-2144gcore_i9-9980hkxeon_w-11555mlecore_i5-11500hexeon_e-2244gcore_i3-7100tcore_i3-6102exeon_w-1390txeon_silver_4216core_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqxeon_platinum_8180xeon_platinum_8276lxeon_gold_6138tcore_i7-7740xcore_i7-11375hcore_i7-7y75core_i7-8559ucore_i5-9500eatom_c3850core_i5-11500txeon_e-2124gcore_i7-4930kcore_i5-9400core_i7-4960xcore_i7-5960xcore_i7-6600uxeon_gold_6138core_i7-1185grecore_i3-10325xeon_gold_6138fxeon_e-2356gcore_i7-8700xeon_d-1557core_i3-7130ucore_i5-8400atom_c3436lxeon_w-3245mxeon_e-2334core_i7\+8700core_i7-9850hatom_c3708xeon_w-1350core_i5-7600core_i9-10980xecore_i7-6500ucore_i5-1035g1xeon_w-11865mlecore_i7-11850hxeon_w-1290xeon_e-2186gxeon_silver_4210core_i3-10110uxeon_gold_6234atom_c3336core_i7-4930mxxeon_w-1350pcore_i9-10900xeon_w-1250core_i5-9400tcore_i5-7360ucore_i5-7300ucore_i7-11800hcore_i3-10300core_i5-6600tcore_i7-8565uxeon_gold_6154xeon_silver_4110core_i7-7700katom_c3830xeon_platinum_8176core_i7-10870hcore_i3-10100fcore_i7-10510uxeon_bronze_3104xeon_w-1290pcore_i5-8310yxeon_gold_5217core_i5-6440hqcore_i7-6850kxeon_gold_5120txeon_e-2324gxeon_w-3245core_i7-6660ucore_i9-7980xecore_i3-6100exeon_gold_6210ucore_i5-7200uxeon_gold_5115core_i7-9700fxeon_w-3345core_i5-10210ucore_i7-6820hqxeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500core_i5-8400bcore_i3-7100hcore_i7-8850hxeon_gold_5215core_i3-6100ucore_i9-9900kscore_i9-7920xxeon_w-11865mrecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i5-6360ucore_i3-6157ucore_i5-9500fcore_i3-10100yxeon_e-2378core_i7-7820xcore_i3-1115g4ecore_i5-10600tcore_i5-7640xcore_i7-7800xxeon_w-3275mxeon_gold_6250lcore_i5-9400hxeon_gold_6209ucore_i9-9920xxeon_platinum_8253xeon_gold_6252ncore_i7-7660ucore_i3-9320xeon_platinum_8158core_i7-7700hqatom_c3308xeon_platinum_8280core_i5-6402pcore_m3-7y30xeon_w-11155mrexeon_gold_6252xeon_w-2135core_i3-10105core_i5-11400tcore_i7-11700kcore_i7-4940mxcore_i7-8550uxeon_e-2276mlxeon_gold_6246xeon_silver_4214rcore_i9-10940xcore_i7-9700core_i7-6700hqcore_i3-8300core_i7-9850hexeon_gold_6230rcore_i7-10700kfcore_i5-8400tcore_i5-7500txeon_d-2187ntxeon_silver_4116tcore_i7-1065g7xeon_d-1518core_i7-9800xxeon_silver_4208core_i5-6267ucore_i3-1000g1xeon_gold_6126txeon_w-2225xeon_silver_4116xeon_e-2276mecore_i5-7y54xeon_w-1250ecore_i5-7400core_i7-6950xfas\/aff_biosxeon_platinum_8160fxeon_platinum_8164core_i7-6567uxeon_platinum_8176fxeon_gold_5215lcore_i5-7287uxeon_platinum_8168core_i7-3970xcore_i7-3960xcore_i7-11600hcore_i7-7920hqcore_i7-10700core_i5-1145grecore_i3-7020uxeon_d-1533nxeon_gold_6240lxeon_w-3265mxeon_gold_6248core_i5-1135g7xeon_w-2195xeon_e-2136core_i5-9300hfxeon_w-1270pcore_i3-1115g4xeon_gold_6258rxeon_platinum_9282core_i3-8145ucore_i3-9300core_i5-10400xeon_d-2173itxeon_d-2161icore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_d-2123itxeon_platinum_8160tcore_i3-8109ucore_i5-8365uexeon_gold_6142core_i3-1110g4xeon_bronze_3206rxeon_gold_6148core_i7-3820xeon_w-3275xeon_gold_6240core_i3-7320core_i7-10700ecore_i5-8350ucore_i7-3940xmxeon_gold_5220xeon_gold_6126fcore_i3-10100tecore_m5-6y57xeon_e-2388gcore_i7-11390hxeon_platinum_8268xeon_e-2226gcore_i5-7y57core_i7-6700texeon_gold_6240rcore_i7-3920xmcore_i5-7260uxeon_e-2278gxeon_silver_4215rcore_i9-10900ecore_i3-9100core_i7-9750hxeon_e-2124core_i5-8250ucore_i5-8600core_i9-11980hkxeon_w-3265core_i5-10500tecore_i5-11500core_i3-6100tecore_i7-11700xeon_platinum_8160xeon_gold_5119tcore_i7-8700bcore_i5-10500txeon_gold_6148fcore_i5-10600core_i5-10310yxeon_w-1250texeon_gold_6208ucore_i3-9100teatom_c3338core_i5-8259uxeon_gold_6242core_i7-10700kxeon_e-2336xeon_d-1627xeon_e-2186mxeon_e-2286mcore_i9-9880hcore_i7-6650ucore_i7-11370hcore_i5-7442eqcore_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i5-1035g4core_i5-11600tcore_i7-8650ucore_i5-10200hcore_i9-9900kcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220tcore_i7-5930kcore_i5-10400fcore_i7-1160g7core_i7-7600uxeon_gold_6244xeon_gold_6242rcore_i3-7100exeon_w-2275xeon_w-2265core_i5-9500xeon_gold_6226rcore_i3-7101ecore_i9-9900xeon_bronze_3204core_i9-9820xxeon_d-1567xeon_w-3365core_i7-9850hlcore_i5-8400hcore_i5-6300ucore_m3-6y30core_i7-9750hfxeon_d-2141ixeon_w-2175xeon_silver_4108core_i3-10110ycore_i5-1035g7core_i7-7820hkxeon_e-2254mlxeon_w-11855mcore_i5-8305gcore_i3-6100xeon_gold_6240ycore_i3-9350kxeon_gold_6238lxeon_w-1390cloud_backupcore_i3-1115grecore_i5-11600core_i5-7400tcore_i7-11700fcore_i3-6100tcore_i7-8750hcore_i7-8665ucore_i3-10305txeon_d-2183itcore_i5-8300hcore_i3-8140ucore_i3-8350kcore_i5-10600kcore_i7-8086kxeon_gold_5222core_i7-10850hxeon_d-1523nxeon_gold_6256core_i5-9500teatom_c3958xeon_gold_6130tatom_c3338rxeon_d-1520core_i3-8100bcore_i3-6167ucore_i5-8279uxeon_platinum_8280lcore_m3-8100ycore_i5-7267ucore_i5-8600kcore_i3-7100uxeon_d-1543ncore_i5-6442eqcore_i7-8700txeon_silver_4114xeon_d-1541core_i7-11700txeon_d-1622xeon_platinum_9242core_i7-6700kcore_i7-6970hqxeon_w-2223core_i7-6822eqcore_i3-7300txeon_gold_6238tatom_c3955core_i5-8500core_i9-11900tcore_i5-8210ycore_i7-6785rcore_i7-6560ucore_i7-1060g7core_i5-8257ucore_i7-8569ucore_i7-5820kcore_i9-9900tcore_i7-6900kcore_i7-7700tcore_i9-9980xeatom_c3558core_i5-6685rxeon_w-2133xeon_gold_6250core_i3-9350kfxeon_platinum_8260lxeon_platinum_8270xeon_w-1290tcore_i5-8500tcore_i7-8809gxeon_gold_6226core_i5-11320hxeon_d-1577xeon_gold_6132xeon_e-2314core_i5-6400tcore_i3-10305xeon_d-2166ntcore_i3-7350kxeon_w-1390pcore_i5-10505xeon_d-1539core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i5-7600kcore_i7-6820hkxeon_w-2255xeon_gold_6262vcore_i3-6006ucore_i7-10710ucore_i5-10210ycore_i5-10300hxeon_w-1270texeon_e-2224xeon_gold_5218xeon_w-2145xeon_gold_6238rcore_i3-9100fxeon_platinum_8170core_i9-10900fcore_i3-1125g4xeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_e-2378gcore_i3-8100tcore_i5-9500txeon_w-3223xeon_w-2155xeon_gold_6152core_i3-7102exeon_gold_6150xeon_e-2276gcore_i5-6200uxeon_gold_6222vcore_i7-10700fxeon_d-1571xeon_gold_5122atom_c3758rxeon_gold_6230Intel(R) Processors
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2020-8742
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:15
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc5i3ryhsnnuc7i7dnbenuc7i5bnhx1nuc7i5bnhxfcd1c32gk_firmwarecd1c64gknuc7i5dnkpcnuc5i3mybe_firmwarenuc8i7hvknuc7i5dnbe_firmwarede3815tykhe_firmwarenuc7i3dnktc_firmwarenuc8i7hnk_firmwarenuc7i5dnbenuc6i7kyknuc5i5ryhsnuc5i3ryk_firmwarenuc8i5behfa_firmwarenuc7i3bnb_firmwarenuc7pjyhnuc7i5dnhe_firmwarenuc7i3bnhx1_firmwarenuc5ppyh_firmwarenuc8i5behs_firmwarenuc8i5behfanuc5i7ryh_firmwarenuc8i7hvkvaw_firmwarenuc5i3ryhnuc8i7hvkvanuc6caysnuc5i5mybe_firmwarenuc5i5myhenuc7i3bnbnuc7i3bnk_firmwarenuc5i3myhe_firmwarenuc5i5ryk_firmwarenuc8i7hnkqcnuc7i3dnke_firmwarenuc8i3behfa_firmwarenuc7i3bnhnuc7i3bnknuc5i5mybenuc7pjyh_firmwarestk2mv64cc_firmwarenuc7i3bnhxf_firmwarenuc7i7bnhnuc5i5ryh_firmwarenuc8i3behnuc8i7hnknuc8i5bek_firmwarenuc5i3ryhs_firmwarenuc7i3bnh_firmwarenuc8i7beh_firmwarenuc5pgyh_firmwarenuc5i5rykcd1p64gknuc7i3dnhncnuc7i5bnkpnuc8i5bekpa_firmwarenuc7i3dnhe_firmwarenuc5i7ryhnuc6cayhde3815tybe_firmwarenuc7cjysalnuc7i5dnkenuc7i7bnkqnuc5i3ryhsn_firmwarenuc8i7hnkqc_firmwarenuc7i7bnhxgcd1c64gk_firmwarestk2mv64ccnuc6i7kyk_firmwarenuc7i3dnhnc_firmwarenuc6cays_firmwarenuc8i7hvk_firmwarenuc7i5dnke_firmwarenuc5i5ryhs_firmwarenuc8i7behga_firmwarenuc8i3behs_firmwarenuc8i7bekqa_firmwarenuc7i5bnknuc7i3dnbenuc7cjyhnuc7i5bnhxf_firmwarenuc7i5bnhnuc5i3mybenuc8i7bek_firmwarede3815tykhenuc7i3dnhenuc5i3ryhsnuc8i7behganuc7i3dnktcnuc7i7dnbe_firmwarenuc7i3dnbe_firmwarenuc8i5beh_firmwarenuc5i3ryknuc7i7dnhe_firmwarenuc7i5bnkp_firmwarenuc7i7bnbnuc5cpyhnuc5pgyhnuc5i5ryhnuc8i5bekpanuc7i5bnh_firmwarenuc7i5dnhenuc8i3beknuc7i7bnkq_firmwarecd1p64gk_firmwarenuc5ppyhnuc8i7beknuc7i5bnb_firmwarenuc8i7behnuc7i7dnke_firmwarenuc7i5dnkpc_firmwarenuc7i7bnhxg_firmwarenuc6cayh_firmwarenuc8i7bekqanuc7i3bnhxfnuc5i3ryh_firmwarenuc8i3behfanuc7i5bnk_firmwarenuc7i5bnhx1_firmwarenuc8i5behsnuc7i5bnbnuc7cjyh_firmwarenuc7i7bnhx1nuc7i7bnb_firmwarenuc7i7bnhx1_firmwarenuc7i3dnkenuc8i5beknuc5cpyh_firmwarenuc8i5behcd1c32gknuc8i7hvkva_firmwarenuc5i5myhe_firmwarenuc5i3myhenuc7i7bnh_firmwarenuc7i3bnhx1de3815tybenuc7i7dnkenuc7cjysal_firmwarenuc7i7dnhenuc8i7hvkvawnuc8i3beh_firmwarenuc8i3behsnuc8i3bek_firmwareIntel(R) NUCs Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8700
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.24% / 46.30%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:50
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-xeon_platinum_8153xeon_e3-1230_v5xeon_e3-1558l_v5xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7e-series_bioscore_i7-1160g7xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-1660_v4xeon_e7-8891_v4xeon_platinum_8164xeon_e-2226gxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_w-2255xeon_d-1518core_i7-11700core_i7-6822eqcore_i7-6700texeon_e3-1501l_v6xeon_gold_6262vcore_i7-11370hxeon_e5-2683_v4xeon_platinum_8168core_i7-7600uxeon_e5-2608l_v4xeon_e5-2640_v3xeon_e-2224xeon_gold_5218xeon_e5-1620_v4core_i7-11850hxeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122xeon_w-2245xeon_d-1587xeon_e5-2699_v3xeon_d-2191xeon_gold_6248rcore_i7-7820hkxeon_e5-2689_v4xeon_e7-8870_v4xeon_w-1290tcore_i5-l16g7xeon_gold_6240core_i7-6970hqxeon_gold_6262xeon_platinum_8156xeon_e-2136core_i7-10510ucore_i7-1060g7xeon_w-2265xeon_e5-2667_v4xeon_platinum_8274xeon_w-10855mxeon_gold_6126fxeon_d-1539xeon_e3-1535m_v5xeon_e5-1680_v4core_i7-7700xeon_gold_5220rxeon_d-2146ntxeon_e3-1268l_v5xeon_platinum_8160fxeon_e5-2658_v3xeon_e5-4660_v4core_i7-8750hxeon_e3-1501m_v6xeon_gold_6250lxeon_gold_6210uxeon_d-2187ntxeon_platinum_8160mcore_i7-10700fxeon_d-2166ntxeon_e3-1270_v6xeon_e-2286mxeon_e3-1505m_v5core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_e5-2630l_v4xeon_w-2195xeon_e5-4667_v4xeon_e5-2628l_v4xeon_e-2276gxeon_e5-2685_v3xeon_w-1390xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622core_i7-8809gxeon_e5-4667_v3xeon_platinum_8160hcore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pxeon_silver_4208xeon_e3-1585_v5xeon_w-2104xeon_e5-2623_v4core_i7-6560uxeon_w-2123xeon_gold_5220sxeon_w-3275mxeon_platinum_9282xeon_e5-2683_v3core_i7-10700exeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-11700kfcloud_backupcore_i7-10870hxeon_e7-8867_v4xeon_bronze_3106xeon_w-2102xeon_e-2274gcore_i7-10700kxeon_e-2278gelxeon_d-1540xeon_e3-1280_v6hci_compute_node_biosxeon_e5-2698_v4xeon_platinum_8160tcore_i7-11700kxeon_d-1528xeon_silver_4214rcore_i7-6500uxeon_e5-2697_v3xeon_e5-4627_v4xeon_e-2124core_i7-10710uxeon_d-2141icore_i7-10700kfxeon_d-1541xeon_e5-2660_v4xeon_e7-4830_v4xeon_w-1250texeon_platinum_8268xeon_platinum_8176mxeon_e-2276mecore_i7-8565uxeon_gold_5222xeon_e5-2687w_v4xeon_e5-1603_v3core_i7-7560uxeon_gold_5117fxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e5-2428l_v3core_i7-6700hqxeon_e7-4809_v4xeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fxeon_gold_6132biosxeon_e5-2618l_v4xeon_w-2155xeon_gold_6137core_i7-7500ucore_i7-8550uxeon_e-2224gxeon_w-2135xeon_d-1623nxeon_w-2145xeon_e-2226gecore_i7-6650uxeon_gold_6142core_i7-10610ucore_i7-8500ycore_i7-7567uxeon_silver_4214xeon_w-1390pxeon_d-2161ixeon_silver_4210rxeon_d-1632core_i7-7820hqxeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_gold_5218bxeon_e5-2648l_v3xeon_gold_6142mxeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1240_v5xeon_e5-2650_v3xeon_gold_6222core_i7-6567uxeon_e5-2648l_v4xeon_e5-4620_v4xeon_e7-8855_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5xeon_w-1290texeon_e3-1225_v5xeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223xeon_gold_5120txeon_w-3175xxeon_gold_6134xeon_gold_6162xeon_e5-2628l_v3xeon_e-2254mexeon_w-3235core_i7-7y75xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133core_i7-6700xeon_d-1557xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6148xeon_e3-1505m_v6xeon_gold_6144xeon_gold_6140mxeon_gold_5220txeon_platinum_8276lxeon_w-2223xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_gold_6129xeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-6600ucore_i7-8706gxeon_gold_6126tcore_i7-11700fxeon_platinum_8165xeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_e-2236xeon_w-1370core_i7-10850hxeon_e5-1603_v4core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i7-8700core_i7-7700tcore_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_gold_6246core_i7-8086kxeon_w-2295core_i7-6770hqcore_i7-8700kxeon_e5-2603_v3fas_biosxeon_e-2134xeon_e5-2667_v3xeon_gold_5215xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_w-1390txeon_w-1270xeon_e3-1225_v6xeon_platinum_8284xeon_silver_4109tcore_i7-10510yxeon_e3-1240l_v5xeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5215lxeon_silver_4215rxeon_e5-2658_v4xeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3xeon_silver_4210txeon_e5-2680_v3xeon_gold_6212uxeon_e3-1205_v6core_i7-7700hqxeon_w-1270texeon_silver_4114xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5core_i7-6870hqxeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_gold_6250xeon_d-2173itcore_i7-11700txeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_w-3265mxeon_d-1627xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_5218txeon_e5-2697a_v4xeon_gold_6150xeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i7-10700core_i9-10920xxeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_gold_6126xeon_e3-1260l_v5xeon_w-1250exeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4core_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2176gxeon_gold_6142fcore_i3-l13g4core_i7-8709gxeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_e-2104gxeon_platinum_8260core_i7-8557ucore_i7-8700txeon_platinum_9242core_i7-6820hqxeon_platinum_8280lxeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_gold_5119tcore_i7-1180g7core_i7-6700tcore_i7-6920hqxeon_gold_6246rxeon_e3-1230_v6xeon_gold_5217xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_w-3245xeon_gold_5120core_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3core_i7-10700texeon_e-2288gxeon_d-1653nxeon_gold_5220xeon_e-2234xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269yxeon_silver_4114tcore_i7-6700kxeon_gold_6240yxeon_e5-4669_v4aff_biosxeon_gold_6154xeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208uxeon_e7-8893_v4xeon_w-1290exeon_e5-1650_v3xeon_w-3275core_i7-11700bxeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633ncore_i7-7820eqxeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_e5-2695_v3xeon_gold_6248xeon_e3-1220_v6xeon_w-1370pxeon_platinum_8280xeon_e-2186mxeon_e5-1660_v3xeon_d-1520xeon_e-2176mcore_i7-6785rcore_i7-6820hkxeon_platinum_8256xeon_gold_6152core_i7-1060ng7xeon_e5-2623_v3xeon_platinum_8158xeon_e5-2658a_v3xeon_e5-2418l_v3xeon_w-1290pxeon_e-2286gxeon_gold_6222vxeon_platinum_8176xeon_gold_6242xeon_e3-1275_v6xeon_d-1531core_i7-10810uxeon_e3-1575m_v5xeon_e-2278gxeon_e5-2650_v4xeon_platinum_8260yxeon_e3-1505l_v5xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_platinum_8180mcore_i7-8850hxeon_gold_5118xeon_w-2235xeon_e5-2695_v4xeon_gold_6130fxeon_w-11955mcore_i7-6820eqxeon_gold_6134mcore_i9-10900xxeon_platinum_8276xeon_gold_6238txeon_e3-1235l_v5xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-4628l_v4xeon_e7-8860_v4xeon_w-1350xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_w-1290xeon_platinum_8176fxeon_d-1524nsolidfire_biosxeon_gold_6240rxeon_w-10885mxeon_w-2275xeon_d-1543nxeon_gold_6226xeon_e-2144gxeon_gold_6256xeon_d-1521xeon_w-1350pxeon_gold_6230rcore_i7-8569uxeon_gold_6252xeon_e5-4640_v3core_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_e5-1607_v4core_i7-1065g7xeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_platinum_8170mxeon_e-2146gxeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175Intel(R) Processors
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8757
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 34.03%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:07
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-cloud_backupactive_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-8701
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.81%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:39
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in installer for the Intel(R) SSD Toolbox versions before 2/9/2021 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-solid-state_drive_toolboxIntel(R) SSD Toolbox versions
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-8711
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 33.62%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:42
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CVE-2020-8691
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 35.74%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:01
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-x710-bm2_firmwarexl710-bm1xxv710-am2_firmwarev710-at2_firmwarexl710-bm1_firmwarexxv710-am1xl710-bm2x710-at2_firmwarexl710-bm2_firmwarexxv710-am2xxv710-am1_firmwarex710-tm4x710-at2x710-bm2v710-at2x710-tm4_firmwareIntel(R) Ethernet 700 Series Controllers
CVE-2020-8690
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 35.74%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:01
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-x710-bm2_firmwarexl710-bm1xxv710-am2_firmwarev710-at2_firmwarexl710-bm1_firmwarexxv710-am1xl710-bm2x710-at2_firmwarexl710-bm2_firmwarexxv710-am2xxv710-am1_firmwarex710-at2x710-tm4x710-bm2v710-at2x710-tm4_firmwareIntel(R) Ethernet 700 Series Controllers
CVE-2022-33176
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 12.28%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in BIOS firmware for some Intel(R) NUC 11 Performance kits and Intel(R) NUC 11 Performance Mini PCs before version PATGL357.0042 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_11_performance_kit_nuc11pahi70z_firmwarenuc_11_performance_kit_nuc11paki7nuc_11_performance_kit_nuc11pahi7_firmwarenuc_11_performance_kit_nuc11pahi30z_firmwarenuc_11_performance_mini_pc_nuc11paqi70qanuc_11_performance_kit_nuc11paki5nuc_11_performance_kit_nuc11paki3nuc_11_performance_kit_nuc11pahi5nuc_11_performance_kit_nuc11pahi30znuc_11_performance_kit_nuc11pahi5_firmwarenuc_11_performance_kit_nuc11pahi70znuc_11_performance_kit_nuc11pahi3_firmwarenuc_11_performance_kit_nuc11paki7_firmwarenuc_11_performance_mini_pc_nuc11paqi50wanuc_11_performance_kit_nuc11paki3_firmwarenuc_11_performance_kit_nuc11pahi50znuc_11_performance_kit_nuc11pahi7nuc_11_performance_kit_nuc11pahi3nuc_11_performance_kit_nuc11paki5_firmwarenuc_11_performance_mini_pc_nuc11paqi50wa_firmwarenuc_11_performance_mini_pc_nuc11paqi70qa_firmwarenuc_11_performance_kit_nuc11pahi50z_firmwareIntel(R) NUC 11 Performance kits and Intel(R) NUC 11 Performance Mini PCs
CWE ID-CWE-20
Improper Input Validation
CVE-2022-33196
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 6.60%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_d-2796texeon_d-1627_firmwarexeon_d-2738xeon_platinum_8362xeon_gold_6338xeon_gold_6338t_firmwarexeon_d-2777nxxeon_d-1527xeon_d-2766ntxeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_platinum_8360hl_firmwarexeon_d-1746ter_firmwarexeon_gold_6354_firmwarexeon_d-2163it_firmwarexeon_gold_6326xeon_d-2776ntxeon_d-1527_firmwarexeon_d-2798ntxeon_d-1733ntxeon_d-1521_firmwarexeon_gold_5317_firmwarexeon_d-1557_firmwarexeon_d-2775te_firmwarexeon_d-2766nt_firmwarexeon_silver_4316xeon_d-1518xeon_gold_5318y_firmwarexeon_d-1714xeon_d-2799_firmwarexeon_d-2745nx_firmwarexeon_d-2143itxeon_gold_6348_firmwarexeon_d-2163itxeon_gold_5318s_firmwarexeon_d-1734nt_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_d-1567_firmwarexeon_d-1567xeon_d-2777nx_firmwarexeon_platinum_8380hxeon_d-2173it_firmwarexeon_platinum_8368q_firmwarexeon_platinum_8376hxeon_d-1746terxeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8362_firmwarexeon_silver_4310t_firmwarexeon_d-1531_firmwarexeon_gold_6314uxeon_d-2123it_firmwarexeon_d-1715terxeon_d-1571xeon_d-1736_firmwarexeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwarexeon_d-2173itxeon_d-2123itxeon_d-2177nt_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_d-2796ntxeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8358p_firmwarexeon_gold_5320xeon_d-2779xeon_platinum_8360yxeon_gold_6330h_firmwarexeon_d-1602xeon_d-1712trxeon_d-1539xeon_d-2796te_firmwarexeon_gold_6338txeon_d-1713ntexeon_d-2752ter_firmwarexeon_gold_5318sxeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_d-2146ntxeon_d-1577_firmwarexeon_platinum_8356h_firmwarexeon_d-2145nt_firmwarexeon_d-1726_firmwarexeon_d-2187ntxeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8358pxeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2776nt_firmwarexeon_d-1732te_firmwarexeon_d-2712t_firmwarexeon_gold_6328h_firmwarexeon_d-1623n_firmwarexeon_d-1548_firmwarexeon_gold_6328hl_firmwarexeon_d-1713nte_firmwarexeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_d-2183itxeon_d-1622xeon_d-1559_firmwarexeon_platinum_8356hxeon_gold_6348h_firmwarexeon_d-2145ntxeon_platinum_8360y_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_gold_5318h_firmwarexeon_d-1637_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_gold_5320txeon_gold_6312uxeon_gold_5320h_firmwarexeon_d-2142it_firmwarexeon_d-2143it_firmwarexeon_d-1736xeon_d-1735trxeon_d-1513n_firmwarexeon_d-2795nt_firmwarexeon_d-2752ntexeon_d-1523n_firmwarexeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarexeon_d-2753nt_firmwarexeon_platinum_8358xeon_gold_5315yxeon_platinum_8352s_firmwarexeon_platinum_8354hxeon_silver_4310_firmwarexeon_gold_6338n_firmwarexeon_d-1718txeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_d-1523nxeon_d-2786nte_firmwarexeon_d-2786ntexeon_d-1540xeon_platinum_8368xeon_d-1653nxeon_d-1528xeon_d-1637xeon_d-1577xeon_silver_4310txeon_d-1715ter_firmwarexeon_platinum_8380xeon_d-2141ixeon_d-1541xeon_gold_6314u_firmwarexeon_d-1543n_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_gold_6330n_firmwarexeon_d-1633n_firmwarexeon_platinum_8352vxeon_gold_6336yxeon_d-1722ne_firmwarexeon_d-1747ntexeon_d-2757nx_firmwarexeon_d-1653n_firmwarexeon_d-1734ntxeon_d-1735tr_firmwarexeon_d-1747nte_firmwarexeon_d-1553nxeon_d-1571_firmwarexeon_d-1633nxeon_platinum_8360hlxeon_d-1548xeon_platinum_8380_firmwarexeon_d-1649nxeon_d-1529xeon_gold_6330_firmwarexeon_d-1518_firmwarexeon_gold_5320_firmwarexeon_d-2738_firmwarexeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_d-2757nxxeon_d-1713ntxeon_gold_6354xeon_gold_6336y_firmwarexeon_d-1520xeon_platinum_8354h_firmwarexeon_d-2752terxeon_platinum_8352mxeon_d-2799xeon_d-2146nt_firmwarexeon_d-2795ntxeon_gold_6330hxeon_d-1739_firmwarexeon_d-1736ntxeon_gold_5318hxeon_d-1713nt_firmwarexeon_d-1520_firmwarexeon_platinum_8376hlxeon_silver_4316_firmwarexeon_d-2798nt_firmwarexeon_d-1623nxeon_d-1531xeon_d-1533nxeon_d-1722nexeon_gold_6346xeon_d-2142itxeon_d-1718t_firmwarexeon_d-1622_firmwarexeon_gold_6338nxeon_d-2796nt_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarexeon_d-1702_firmwarexeon_d-1749nt_firmwarexeon_d-2161ixeon_d-2141i_firmwarexeon_gold_6348xeon_gold_6330nxeon_platinum_8368_firmwarexeon_d-2798nxxeon_platinum_8352v_firmwarexeon_d-2745nxxeon_platinum_8368qxeon_gold_5320t_firmwarexeon_d-1748texeon_silver_4310xeon_silver_4314_firmwarexeon_gold_6334xeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1739xeon_d-1543nxeon_d-1528_firmwarexeon_d-1539_firmwarexeon_d-1559xeon_d-1702xeon_d-1521xeon_gold_6342xeon_d-1748te_firmwarexeon_d-1749ntxeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_d-1712tr_firmwarexeon_d-2798nx_firmwarexeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_6328hxeon_d-2183it_firmwarexeon_d-2753ntxeon_gold_6334_firmwarexeon_d-2775texeon_d-1557xeon_d-1714_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_gold_6328hlxeon_d-1726xeon_d-2177ntxeon_d-1553n_firmwareIntel(R) Xeon(R) Processors with Intel® Software Guard Extensions (SGX)
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-24462
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.87%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:49
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write in the Intel(R) Graphics Driver before version 15.33.53.5161, 15.36.40.5162, 15.40.47.5166, 15.45.33.5164 and 27.20.100.8336 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Driver
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-24473
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.87%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:01
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_r2312wfqzsserver_system_r1304wftysserver_board_s2600bpsserver_board_s2600bpqrserver_system_r2208wf0zsserver_board_s2600wftcompute_module_hns2600bpb24rserver_system_r2312wftzsrserver_system_r1208wftysserver_board_s2600bpbserver_board_s2600stqrserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r2308wftzsrserver_board_s2600bpqcompute_module_hns2600bps24rserver_system_r1304wftysrserver_board_s2600stbserver_board_s2600wfqserver_system_r2208wfqzsrserver_board_s2600bpsrcompute_module_hns2600bpsrserver_system_r2312wf0npserver_system_r2312wf0nprserver_system_r2224wfqzsserver_board_s2600stbrserver_system_r1208wfqysrserver_system_r2312wftzsserver_board_s2600wfqrserver_board_s2600stqserver_system_r2224wftzscompute_module_hns2600bpqrserver_system_r2208wf0zsrcompute_module_hns2600bpbrserver_system_r2308wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_r2208wftzsrserver_system_r1208wftysrserver_system_r2208wftzsserver_board_s2600bpbrcompute_module_hns2600bpq24rserver_system_r2224wftzsrbaseboard_management_controller_firmwareserver_board_s2600wftrserver_board_s2600wf0Intel(R) Server Boards, Server Systems and Compute Modules
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28488
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.32%
||
7 Day CHG~0.00%
Published-12 Apr, 2023 | 00:00
Updated-08 Feb, 2025 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.

Action-Not Available
Vendor-n/aIntel Corporation
Product-connmann/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28401
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.2||MEDIUM
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-02 Aug, 2024 | 12:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsarc_a_graphicsiris_xe_graphicsIntel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28410
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 17.89%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-18 Mar, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i915_graphicsIntel(R) i915 Graphics drivers for linux
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-21804
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.4||HIGH
EPSS-0.15% / 36.39%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in software for the Intel QAT Driver for Windows before version 1.9.0-0008 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-quickassist_technologyIntel QAT Driver for Windows
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-25952
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 16.81%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-02 Aug, 2024 | 11:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsarc_a_graphicsiris_xe_graphicsIntel(R) Arc(TM) Control software
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 15
  • 16
  • Next
Details not found