Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-31189

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-14 Feb, 2024 | 13:37
Updated At-14 Aug, 2024 | 19:22
Rejected At-
Credits

Improper authentication in some Intel(R) Server Product OpenBMC firmware before version egs-1.09 may allow an authenticated user to enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:14 Feb, 2024 | 13:37
Updated At:14 Aug, 2024 | 19:22
Rejected At:
â–¼CVE Numbering Authority (CNA)

Improper authentication in some Intel(R) Server Product OpenBMC firmware before version egs-1.09 may allow an authenticated user to enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) Server Product OpenBMC firmware
Default Status
unaffected
Versions
Affected
  • before version egs-1.09
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-287Improper authentication
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-287
Description: Improper authentication
Metrics
VersionBase scoreBase severityVector
3.15.2MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 5.2
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:14 Feb, 2024 | 14:15
Updated At:14 Jan, 2026 | 18:29

Improper authentication in some Intel(R) Server Product OpenBMC firmware before version egs-1.09 may allow an authenticated user to enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.2MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Primary3.18.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 5.2
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Intel Corporation
intel
>>openbmc>>Versions before egs-1.09(exclusive)
cpe:2.3:o:intel:openbmc:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_bronze_3408u>>-
cpe:2.3:h:intel:xeon_bronze_3408u:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5403n>>-
cpe:2.3:h:intel:xeon_gold_5403n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5411n>>-
cpe:2.3:h:intel:xeon_gold_5411n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5412u>>-
cpe:2.3:h:intel:xeon_gold_5412u:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5415\+>>-
cpe:2.3:h:intel:xeon_gold_5415\+:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5416s>>-
cpe:2.3:h:intel:xeon_gold_5416s:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5418n>>-
cpe:2.3:h:intel:xeon_gold_5418n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5418y>>-
cpe:2.3:h:intel:xeon_gold_5418y:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5420\+>>-
cpe:2.3:h:intel:xeon_gold_5420\+:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5423n>>-
cpe:2.3:h:intel:xeon_gold_5423n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_5433n>>-
cpe:2.3:h:intel:xeon_gold_5433n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6403n>>-
cpe:2.3:h:intel:xeon_gold_6403n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6414u>>-
cpe:2.3:h:intel:xeon_gold_6414u:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6416h>>-
cpe:2.3:h:intel:xeon_gold_6416h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6418h>>-
cpe:2.3:h:intel:xeon_gold_6418h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6421n>>-
cpe:2.3:h:intel:xeon_gold_6421n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6423n>>-
cpe:2.3:h:intel:xeon_gold_6423n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6426y>>-
cpe:2.3:h:intel:xeon_gold_6426y:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6428n>>-
cpe:2.3:h:intel:xeon_gold_6428n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6430>>-
cpe:2.3:h:intel:xeon_gold_6430:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6433n>>-
cpe:2.3:h:intel:xeon_gold_6433n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6433ne>>-
cpe:2.3:h:intel:xeon_gold_6433ne:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6434>>-
cpe:2.3:h:intel:xeon_gold_6434:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6434h>>-
cpe:2.3:h:intel:xeon_gold_6434h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6438m>>-
cpe:2.3:h:intel:xeon_gold_6438m:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6438n>>-
cpe:2.3:h:intel:xeon_gold_6438n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6438y\+>>-
cpe:2.3:h:intel:xeon_gold_6438y\+:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6442y>>-
cpe:2.3:h:intel:xeon_gold_6442y:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6443n>>-
cpe:2.3:h:intel:xeon_gold_6443n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6444y>>-
cpe:2.3:h:intel:xeon_gold_6444y:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6448h>>-
cpe:2.3:h:intel:xeon_gold_6448h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6448y>>-
cpe:2.3:h:intel:xeon_gold_6448y:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6454s>>-
cpe:2.3:h:intel:xeon_gold_6454s:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_gold_6458q>>-
cpe:2.3:h:intel:xeon_gold_6458q:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8444h>>-
cpe:2.3:h:intel:xeon_platinum_8444h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8450h>>-
cpe:2.3:h:intel:xeon_platinum_8450h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8452y>>-
cpe:2.3:h:intel:xeon_platinum_8452y:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8454h>>-
cpe:2.3:h:intel:xeon_platinum_8454h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8458p>>-
cpe:2.3:h:intel:xeon_platinum_8458p:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8460h>>-
cpe:2.3:h:intel:xeon_platinum_8460h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8460y\+>>-
cpe:2.3:h:intel:xeon_platinum_8460y\+:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8461v>>-
cpe:2.3:h:intel:xeon_platinum_8461v:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8462y\+>>-
cpe:2.3:h:intel:xeon_platinum_8462y\+:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8468>>-
cpe:2.3:h:intel:xeon_platinum_8468:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8468h>>-
cpe:2.3:h:intel:xeon_platinum_8468h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8468v>>-
cpe:2.3:h:intel:xeon_platinum_8468v:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8470>>-
cpe:2.3:h:intel:xeon_platinum_8470:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8470n>>-
cpe:2.3:h:intel:xeon_platinum_8470n:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>xeon_platinum_8471n>>-
cpe:2.3:h:intel:xeon_platinum_8471n:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Secondarysecure@intel.com
CWE ID: CWE-287
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.htmlsecure@intel.com
Vendor Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html
Source: secure@intel.com
Resource:
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

66Records found

CVE-2021-33159
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.4||HIGH
EPSS-0.07% / 21.95%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-287
Improper Authentication
CVE-2021-33083
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.16%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-15 Oct, 2024 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in firmware for some Intel(R) SSD, Intel(R) Optane(TM) SSD, Intel(R) Optane(TM) SSD DC and Intel(R) SSD DC Products may allow an privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4800x_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_905poptane_memory_h10_with_solid_state_storage_firmwareoptane_ssd_900poptane_ssd_dc_p4801xoptane_ssd_p5800x_firmwareoptane_memory_h10_with_solid_state_storageoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4800xoptane_ssd_905p_firmwareoptane_ssd_900p_firmwareoptane_ssd_p5800xIntel(R) SSD, Intel(R) Optane(TM) SSD, Intel(R) Optane(TM) SSD DC and Intel(R) SSD DC Products
CWE ID-CWE-287
Improper Authentication
CVE-2021-33076
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.72%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 14:24
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in firmware for some Intel(R) SSD DC Products may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ssd_dc_s4500ssd_d5-p5316_firmwaressd_e_6100pssd_dc_p4511_edsff_firmwaressd_dc_p4510_sff_firmwaressd_pro_6000pssd_dc_p4500ssd_d7_p5600_firmwaressd_dc_p4500_firmwaressd_670pssd_e_6000pssd_dc_p4600_firmwaressd_e_6000p_firmwaressd_d3-s4610_m.2_firmwaressd_760p_firmwaressd_dc_p4610_sff_firmwaressd_dc_p4101_firmwaressd_dc_p4511_edsffssd_dc_p3100_firmwaressd_660p_firmwaressd_dc_p4600ssd_dc_p4511_m.2_firmwaressd_d5-p4326_firmwaressd_760pssd_dc_p4510_edsff_firmwaressd_660pssd_600pssd_dc_p4608ssd_dc_d4512_firmwaressd_dc_s4500_firmwaressd_665p_firmwaressd_dc_p4610_sffssd_dc_p3100ssd_dc_s4600ssd_pro_7600p_firmwaressd_pro_6000p_firmwaressd_dc_p4101ssd_d3-s4510_m.2ssd_700p_firmwaressd_dc_p4511_m.2ssd_pro_7600pssd_665pssd_dc_p4501_firmwaressd_e_6100p_firmwaressd_d3-s4610_m.2ssd_670p_firmwaressd_d5-p4326ssd_d7_p5600ssd_dc_p4501ssd_dc_s4600_firmwaressd_d3-s4510_m.2_firmwaressd_d7_p5510_firmwaressd_dc_p4510_sffssd_d7_p5510ssd_d5-p5316ssd_700pssd_dc_d4512ssd_dc_p4510_edsffssd_dc_p4608_firmwaressd_600p_firmwareIntel(R) SSD DC
CWE ID-CWE-287
Improper Authentication
CVE-2020-26558
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.2||MEDIUM
EPSS-0.02% / 6.28%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 17:22
Updated-04 Nov, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

Action-Not Available
Vendor-bluetoothn/aFedora ProjectDebian GNU/LinuxLinux Kernel Organization, IncIntel Corporation
Product-ac_9560ax1675ac_9560_firmwareac_3168ac_3165ax201_firmwareac_1550_firmwareac_9260ac_7265ac_8260_firmwareac_3165_firmwareax1650debian_linuxac_9461linux_kernelac_8260ac_8265_firmwareac_9461_firmwareax210_firmwareac_3168_firmwareax1675_firmwareac_7265_firmwareac_1550ax200_firmwareax200ax1650_firmwareac_9260_firmwareac_8265ac_9462ax201ac_9462_firmwarefedoraax210bluetooth_core_specificationn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-26139
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-2.25% / 84.62%
||
7 Day CHG+1.13%
Published-11 May, 2021 | 19:37
Updated-14 Apr, 2026 | 09:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.

Action-Not Available
Vendor-n/aDebian GNU/LinuxArista Networks, Inc.Cisco Systems, Inc.NetBSDIntel CorporationSiemens AG
Product-meraki_gr10ir829gw-lte-ga-ck9meraki_mr26_firmwarecatalyst_9120aximeraki_mr55_firmwarecatalyst_9105axw1100_firmwaredebian_linuxaironet_2702c-120aironet_3800i_firmwareip_phone_8865webex_board_85scatalyst_9130axiip_phone_8821_firmwareaironet_ap803_firmwareaironet_3800ecatalyst_9115axiir829-2lte-ea-ak9_firmwarecatalyst_9117aironet_2800_firmwareir829gw-lte-ga-zk9_firmwareaironet_1542dproset_ac_8260meraki_mx67cwac_9260webex_room_kitmeraki_gr60_firmwareaironet_ap803catalyst_9105axw_firmwaremeraki_mr84ac_9560_firmwarecatalyst_9130_apmeraki_mr45_firmwarec-260_firmwareproset_ac_9560_firmwareaironet_3800pcatalyst_91241100-8p_firmwareip_phone_8832meraki_mx67wkiller_ac_1550_firmwareaironet_2800imeraki_z3meraki_mr33aironet_3702meraki_mr20_firmwarewebex_room_55meraki_mr74c-230_firmwareesw6300_firmwareaironet_2800catalyst_iw6300_dcwir829-2lte-ea-ak9webex_board_85s_firmwaremeraki_mr20catalyst_9120_ap_firmwareproset_wi-fi_6_ax200_firmwareo-90esw6300meraki_mr62meraki_mr32killer_wi-fi_6_ax1650proset_ac_3168_firmwarec-200_firmwareaironet_3702_firmwarekiller_ac_1550meraki_mr36aironet_1542i_firmwareir829gw-lte-ga-sk9_firmwarewi-fi_6_ax200meraki_mr44_firmwaremeraki_mx68cwmeraki_mr32_firmwareaironet_1532_firmwarekiller_wi-fi_6_ax1650_firmwarec-230proset_ac_9462aironet_1532meraki_mr56_firmware1100-4p_firmwareaironet_1815i_firmwareaironet_1572_firmwaremeraki_mr72_firmwareproset_wi-fi_6_ax201webex_room_70_single_g2meraki_mr30hmeraki_mr72catalyst_9117axi_firmwaremeraki_mr34_firmwaremeraki_mr42_firmwarewebex_board_70proset_ac_8265_firmwaremeraki_mr52proset_ac_9461_firmwarecatalyst_9120_firmwaremeraki_mr74_firmwareproset_ac_31651109-2pcatalyst_iw6300_ac_firmwarewebex_board_55s_firmwaremeraki_mr62_firmwaremeraki_mx64wwi-fi_6_ax201c-75_firmware1109-4paironet_1815_firmwarecatalyst_9115c-75aironet_2702_firmwaremeraki_mr52_firmwarecatalyst_9124axd_firmwarecatalyst_9124_firmwaremeraki_mr44meraki_mr12_firmwareir829-2lte-ea-ek9ac_9560webex_room_55_dualmeraki_mr42e_firmwarec-65_firmwarenetbsdcatalyst_iw6300_acaironet_1542d_firmwareaironet_2800i_firmwarec-2001100-8paironet_1552_firmwarewebex_dx70_firmware1109-2p_firmwareaironet_1800iaironet_1842_firmwareir829-2lte-ea-ek9_firmwaremeraki_mr86_firmwarewebex_board_70_firmwareproset_ac_9462_firmwareaironet_1852meraki_mr66catalyst_9115_ap_firmwareir829gw-lte-na-ak9aironet_iw3702c-100o-105ip_phone_6861_firmwarewebex_room_kit_firmwaremeraki_mr33_firmwarec-130_firmwaremeraki_mr30h_firmwareo-90_firmwareproset_wi-fi_6e_ax210webex_board_70s_firmwaremeraki_mr42meraki_mx65w_firmwareac_8260_firmwareproset_ac_9560aironet_1832proset_ac_9260_firmwarecatalyst_9124axdmeraki_mr42emeraki_mr84_firmwarecatalyst_9120axemeraki_mr76_firmwaremeraki_mr53_firmwarecatalyst_9130axeaironet_1815proset_wireless_7265_\(rev_d\)_firmwareproset_ac_3165_firmwarecatalyst_9130axe_firmwaremeraki_gr10_firmwaremeraki_mr46e_firmwarew-118aironet_1832_firmwareproset_ac_8265proset_ac_8260_firmwarecatalyst_9115_firmwareproset_wireless_7265_\(rev_d\)catalyst_iw6300_dcwi-fi_6_ax200_firmwarecatalyst_9117_ap_firmwaremeraki_z3_firmwaremeraki_mr70_firmware1101-4p_firmwareir829gw-lte-ga-zk9webex_room_70_dual_g2aironet_1702_firmwarewi-fi_6_ax201_firmwarec-110_firmwareproset_wi-fi_6_ax200aironet_1702aironet_3800webex_dx80catalyst_9124axi_firmwareip_phone_8865_firmwaremeraki_mx65wcatalyst_9130webex_room_70_dualaironet_1852_firmwarewebex_board_55scatalyst_9105axicatalyst_9120axi_firmwareip_phone_8861_firmwareir829-2lte-ea-bk9meraki_mx64w_firmwareo-105_firmwareaironet_4800_firmwarecatalyst_9115axe_firmwaremeraki_mr70meraki_mr46_firmwareac_8265_firmwarekiller_wi-fi_6e_ax1675webex_dx70meraki_mr46ecatalyst_9130axi_firmwarecatalyst_9117axicatalyst_9120_apcatalyst_9105axi_firmwareaironet_1800aironet_1842catalyst_9120axe_firmware1109-4p_firmwarecatalyst_iw6300_dcw_firmwareaironet_2800ecatalyst_9130_firmwarekiller_wi-fi_6e_ax1675_firmwaremeraki_mx67w_firmwareac_9260_firmwaremeraki_mr55webex_board_55_firmwarewebex_room_kit_minic-100_firmwareaironet_1810_firmwarewebex_room_70meraki_mr26webex_board_70sw-68_firmwarec-260catalyst_iw6300_dc_firmwareac_8260meraki_mr86webex_room_70_dual_firmwareproset_wi-fi_6_ax201_firmwarew-118_firmwarec-120_firmwareaironet_3800imeraki_mr56aironet_1552haironet_1552meraki_mr53c-130webex_room_70_firmwareaironet_3800_firmwareir829-2lte-ea-bk9_firmwareaironet_1815icatalyst_9120axpmeraki_mr45c-250_firmwarecatalyst_iw6300aironet_1572meraki_mr12meraki_z3c_firmwareaironet_1800_firmware1101-4paironet_1552h_firmwareip_phone_68611100proset_ac_9260meraki_mx68wir829gw-lte-vz-ak9meraki_mr34catalyst_9115_apip_phone_8832_firmwarewebex_room_70_dual_g2_firmwareac_8265proset_ac_3168catalyst_9105_firmwareir829gw-lte-ga-sk9proset_wi-fi_6e_ax210_firmwarecatalyst_9115axeip_phone_8861catalyst_9117_firmwarewebex_room_kit_mini_firmwarewebex_room_70_single_firmwareip_phone_8821c-110webex_room_70_singlecatalyst_9130_ap_firmwareaironet_2800e_firmwarecatalyst_9117_apir829gw-lte-ga-ek9proset_ac_9461meraki_mr53e_firmwaremeraki_mx68cw_firmwareir829gw-lte-ga-ek9_firmwareaironet_3800e_firmwaremeraki_mr76webex_room_55_dual_firmwaremeraki_mr66_firmwarecatalyst_iw6300_firmwarecatalyst_9120axp_firmwarec-235_firmwarewebex_board_55catalyst_9124axic-235meraki_mr46c-65aironet_1810w_firmwareaironet_1800i_firmwarewebex_room_70_single_g2_firmwarecatalyst_9105c-250aironet_1810wcatalyst_9120meraki_z3caironet_4800w-68aironet_iw3702_firmwareaironet_3800p_firmwarewebex_room_55_firmwaremeraki_mx67cw_firmwareir829gw-lte-vz-ak9_firmwaremeraki_mx68w_firmware1100-4paironet_1810meraki_gr60meraki_mr36_firmwaremeraki_mr53eir829gw-lte-na-ak9_firmwarecatalyst_9115axi_firmwareaironet_1542iwebex_dx80_firmwareir829gw-lte-ga-ck9_firmwaren/aSCALANCE W786-2 SFPSCALANCE WAM763-1SCALANCE W1748-1 M12SCALANCE W788-1 RJ45SCALANCE W734-1 RJ45 (USA)SCALANCE W738-1 M12SCALANCE W1788-2 EEC M12SCALANCE W1788-1 M12SCALANCE W1788-2IA M12SCALANCE W774-1 RJ45SCALANCE W786-2 RJ45SCALANCE WUM766-1SCALANCE W788-2 M12SCALANCE WAM766-1 (US)SCALANCE WAM766-1 EEC (US)SCALANCE W778-1 M12 EEC (USA)SCALANCE W788-1 M12SCALANCE W721-1 RJ45SCALANCE W786-2IA RJ45SCALANCE W748-1 RJ45SCALANCE W788-2 RJ45SCALANCE W788-2 M12 EECSCALANCE WUM763-1SCALANCE W734-1 RJ45SCALANCE W1788-2 M12SCALANCE W748-1 M12SCALANCE W786-1 RJ45SCALANCE W774-1 M12 EECSCALANCE W722-1 RJ45SCALANCE W774-1 RJ45 (USA)SCALANCE W778-1 M12SCALANCE WAM766-1 EECSCALANCE WUM766-1 (USA)SCALANCE W778-1 M12 EECSCALANCE WAM766-1SCALANCE W761-1 RJ45
CWE ID-CWE-287
Improper Authentication
CVE-2020-24514
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 30.11%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:48
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in some Intel(R) RealSense(TM) IDs may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_id_f450realsense_id_f455_firmwarerealsense_id_f450_firmwarerealsense_id_f455Intel(R) RealSense(TM) IDs
CWE ID-CWE-287
Improper Authentication
CVE-2023-52161
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.61% / 69.79%
||
7 Day CHG~0.00%
Published-22 Feb, 2024 | 00:00
Updated-04 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

Action-Not Available
Vendor-n/aIntel Corporation
Product-inet_wireless_daemonn/ainet_wireless_daemon
CWE ID-CWE-287
Improper Authentication
CVE-2023-28377
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 21.93%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in some Intel(R) NUC Kit NUC11PH USB firmware installation software before version 1.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-usb_firmwarenuc_11_enthusiast_kit_nuc11phki7cnuc_11_enthusiast_mini_pc_nuc11phki7caaIntel(R) NUC Kit NUC11PH USB firmware installation softwareintel_nuc_kit_nuc11ph_usb_firmware_installation_software
CWE ID-CWE-287
Improper Authentication
CVE-2023-22663
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.24% / 46.43%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-287
Improper Authentication
CVE-2023-32661
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 29.88%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in some Intel(R) NUC Kits NUC7PJYH and NUC7CJYH Realtek* SD Card Reader Driver installation software before version 10.0.19041.29098 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7cjyhnuc_kit_nuc7pjyhrealtek_sd_card_reader_driverIntel(R) NUC Kits NUC7PJYH and NUC7CJYH Realtek* SD Card Reader Driver installation softwareintel_nuc_kits_nuc7pjyh_and_nuc7cjyh_realtek_sd_card_reader_driver_installation_software
CWE ID-CWE-287
Improper Authentication
CVE-2019-11170
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.30%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-287
Improper Authentication
CVE-2018-12192
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic bug in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before version SPS_E5_04.00.04.393.0 may allow an unauthenticated user to potentially bypass MEBx authentication via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareconverged_security_management_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-287
Improper Authentication
CVE-2020-8108
Matching Score-4
Assigner-Bitdefender
ShareView Details
Matching Score-4
Assigner-Bitdefender
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.34%
||
7 Day CHG~0.00%
Published-03 Aug, 2020 | 11:55
Updated-16 Sep, 2024 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient client validation in Bitdefender Endpoint Security for Mac (VA-8759)

Improper Authentication vulnerability in Bitdefender Endpoint Security for Mac allows an unprivileged process to restart the main service and potentially inject third-party code into a trusted process. This issue affects: Bitdefender Endpoint Security for Mac versions prior to 4.12.80.

Action-Not Available
Vendor-Bitdefender
Product-endpoint_securityEndpoint Security for Mac
CWE ID-CWE-287
Improper Authentication
CVE-2024-49039
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-63.67% / 98.42%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 17:54
Updated-28 Oct, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-12-03||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Windows Task Scheduler Elevation of Privilege Vulnerability

Windows Task Scheduler Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1507windows_11_22h2windows_10_21h2windows_11_23h2windows_11_24h2windows_server_2022windows_10_1607windows_10_22h2windows_server_2022_23h2windows_10_1809windows_server_2025windows_server_2019windows_server_2016Windows Server 2025 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 24H2Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows Server 2019 (Server Core installation)Windows 10 Version 22H2Windows Server 2025Windows Server 2022Windows Server 2019Windows 10 Version 1507Windows 10 Version 1607Windows 10 Version 21H2Windows 10 Version 1809Windows 11 version 22H2Windows 11 version 22H3Windows Server 2016Windows
CWE ID-CWE-287
Improper Authentication
CVE-2024-42038
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-8.8||HIGH
EPSS-0.05% / 15.45%
||
7 Day CHG~0.00%
Published-08 Aug, 2024 | 09:31
Updated-18 Sep, 2025 | 07:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability of PIN enhancement failures in the screen lock module Impact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiHarmonyOSEMUI
CWE ID-CWE-287
Improper Authentication
CVE-2024-24279
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.05% / 16.41%
||
7 Day CHG~0.00%
Published-08 Apr, 2024 | 00:00
Updated-17 Jun, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in secdiskapp 1.5.1 (management program for NewQ Fingerprint Encryption Super Speed Flash Disk) allows attackers to gain escalated privileges via vsVerifyPassword and vsSetFingerPrintPower functions.

Action-Not Available
Vendor-secdiskappn/asecdiskapp
Product-secdiskappn/asecdiskapp
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • Next
Details not found