Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-34349

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-11 Aug, 2023 | 02:37
Updated At-01 Oct, 2024 | 20:47
Rejected At-
Credits

Race condition in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:11 Aug, 2023 | 02:37
Updated At:01 Oct, 2024 | 20:47
Rejected At:
▼CVE Numbering Authority (CNA)

Race condition in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) NUC BIOS firmware
Default Status
unaffected
Versions
Affected
  • See references
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-421Race condition
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-421
Description: Race condition
Metrics
VersionBase scoreBase severityVector
3.14.6MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Version: 3.1
Base score: 4.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
N/A
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
x_transferred
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:11 Aug, 2023 | 03:15
Updated At:07 Nov, 2023 | 04:15

Race condition in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.14.6MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 4.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
CPE Matches

Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnh_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnh_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnh>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhf_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhf_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhf>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhf:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhfa_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhfa_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhfa>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhja_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhja_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhja>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhn_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnhn>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnhn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnk_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnk_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnk>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnkn_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnkn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i3fnkn>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i3fnkn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnh_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnh_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnh>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhca_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhca_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhca>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhf_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhf_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhf>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhf:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhja_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhja_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhja>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhj_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhj_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhj>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhj:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhn_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnhn>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnhn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnk_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnk_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnk>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnkn_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnkn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnkn>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnkn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnkpa_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnkpa_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnkpa>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnkp_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnkp_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i5fnkp>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i5fnkp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnh_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnh_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnh>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnh:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhaa_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhaa_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhaa>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhc_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhc_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhc>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhc:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhja_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhja_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhja>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhn_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnhn>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnhn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnk_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnk_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnk>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnk:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnkn_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnkn_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnkn>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnkn:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnkp_firmware>>-
cpe:2.3:o:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnkp_firmware:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_performance_kit_and_mini_pc_nuc10i7fnkp>>-
cpe:2.3:h:intel:nuc_performance_kit_and_mini_pc_nuc10i7fnkp:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-362Primarynvd@nist.gov
CWE-421Secondarysecure@intel.com
CWE ID: CWE-362
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-421
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.htmlsecure@intel.com
Patch
Vendor Advisory
Hyperlink: http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
Source: secure@intel.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

84Records found

CVE-2020-8704
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.12% / 31.06%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:47
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationSiemens AG
Product-simatic_ipc477e_firmwaresimatic_ipc427e_firmwaresimatic_ipc847esimatic_ipc547g_firmwaresimatic_ipc427esimatic_field_pg_m6simatic_ipc527gsimatic_ipc677esimatic_ipc477e_prosimatic_ipc547gsimatic_field_pg_m5_firmwaresimatic_ipc677e_firmwaresimatic_ipc477e_pro_firmwaresimatic_itp1000_firmwaresimatic_ipc647e_firmwarelocal_manageability_servicesimatic_ipc627e_firmwaresimatic_ipc477esimatic_field_pg_m6_firmwaresimatic_ipc627esimatic_ipc527g_firmwaresimatic_ipc847e_firmwaresimatic_field_pg_m5simatic_itp1000simatic_ipc647eIntel(R) LMS versions
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-41090
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-1.8||LOW
EPSS-0.03% / 5.33%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:38
Updated-23 Oct, 2024 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in some Intel(R) MAS software before version 2.3 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-memory_and_storage_toolIntel(R) MAS software
CWE ID-CWE-421
Race Condition During Access to Alternate Channel
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-8670
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 16.23%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:50
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel CorporationSiemens AG
Product-xeon_platinum_8153xeon_e3-1230_v5xeon_e3-1558l_v5xeon_w-3245mxeon_e5-4610_v4xeon_e7-8894_v4xeon_gold_6146xeon_e5-2660_v3core_i7-1068ng7core_i7-1160g7xeon_e5-1680_v3xeon_d-1527xeon_e5-2697_v4xeon_gold_5115xeon_platinum_8170xeon_gold_6136xeon_w-2125core_i9-10940xxeon_e5-4610_v3xeon_e5-4650_v4xeon_e7-8880_v4xeon_gold_6138xeon_e5-1660_v4simatic_ipc547g_firmwarexeon_e7-8891_v4xeon_platinum_8164xeon_e-2226gxeon_e3-1280_v5xeon_gold_6234xeon_e5-2699r_v4xeon_w-2255xeon_d-1518core_i7-11700core_i7-6822eqcore_i7-6700texeon_e3-1501l_v6xeon_gold_6262vcore_i7-11370hxeon_e5-2683_v4xeon_platinum_8168core_i7-7600uxeon_e5-2608l_v4xeon_e5-2640_v3xeon_e-2224xeon_gold_5218xeon_e5-1620_v4core_i7-11850hxeon_d-1567xeon_e5-2630l_v3xeon_e3-1505l_v6xeon_e-2278gexeon_e5-1607_v3xeon_e5-4640_v4xeon_gold_5117xeon_gold_5122xeon_w-2245simatic_field_pg_m6_firmwarexeon_d-1587xeon_e5-2699_v3xeon_d-2191simatic_ipc427e_firmwarexeon_gold_6248rcore_i7-7820hkxeon_e5-2689_v4xeon_e7-8870_v4xeon_w-1290tcore_i5-l16g7xeon_gold_6240core_i7-6970hqxeon_gold_6262xeon_platinum_8156xeon_e-2136core_i7-10510ucore_i7-1060g7xeon_w-2265simatic_ipc527gxeon_e5-2667_v4xeon_platinum_8274xeon_w-10855mxeon_gold_6126fxeon_d-1539xeon_e3-1535m_v5simatic_ipc527g_firmwarexeon_e5-1680_v4core_i7-7700xeon_gold_5220rxeon_d-2146ntxeon_e3-1268l_v5xeon_platinum_8160fsimatic_ipc477e_firmwarexeon_e5-2658_v3simatic_field_pg_m6xeon_e5-4660_v4core_i7-8750hxeon_e3-1501m_v6xeon_gold_6250lxeon_gold_6210uxeon_d-2187ntxeon_platinum_8160mcore_i7-10700fxeon_d-2166ntxeon_e3-1270_v6xeon_e-2286mxeon_e3-1505m_v5core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_e5-2630l_v4xeon_w-2195xeon_e5-4667_v4xeon_e5-2628l_v4xeon_e-2276gxeon_e5-2685_v3xeon_w-1390xeon_e-2186gxeon_d-2183itxeon_silver_4116txeon_e-2174gxeon_e5-2630_v4xeon_d-1622core_i7-8809gxeon_e5-4667_v3xeon_platinum_8160hcore_i7-8700bxeon_e5-2643_v3xeon_d-2145ntxeon_d-1581xeon_e5-1650_v4xeon_gold_6238xeon_e5-2630_v3xeon_w-1250pxeon_silver_4208xeon_e3-1585_v5xeon_w-2104xeon_e5-2623_v4core_i7-6560uxeon_w-2123xeon_gold_5220sxeon_w-3275msimatic_ipc477e_pro_firmwarexeon_platinum_9282xeon_e5-2683_v3core_i7-10700exeon_silver_4108xeon_gold_6130txeon_silver_4210core_i7-11700kfcloud_backupcore_i7-10870hxeon_e7-8867_v4xeon_bronze_3106xeon_w-2102simatic_ipc647e_firmwarexeon_e-2274gcore_i7-10700kxeon_e-2278gelxeon_d-1540xeon_e3-1280_v6hci_compute_node_biosxeon_e5-2698_v4xeon_platinum_8160tcore_i7-11700kxeon_d-1528xeon_silver_4214rcore_i7-6500uxeon_e5-2697_v3xeon_e5-4627_v4xeon_e-2124core_i7-10710uxeon_d-2141icore_i7-10700kfxeon_d-1541xeon_e5-2660_v4xeon_e7-4830_v4xeon_w-1250texeon_platinum_8268xeon_platinum_8176mxeon_e-2276mecore_i7-8565uxeon_gold_5222xeon_e5-2687w_v4xeon_e5-1603_v3core_i7-7560uxeon_gold_5117fxeon_e3-1535m_v6xeon_d-1548xeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_e3-1220_v5xeon_platinum_8160xeon_e5-2428l_v3simatic_ipc847esimatic_ipc427ecore_i7-6700hqxeon_e7-4809_v4xeon_e5-4648_v3xeon_gold_6122xeon_silver_4123xeon_gold_6148fxeon_gold_6132biosxeon_e5-2618l_v4xeon_w-2155xeon_gold_6137core_i7-7500ucore_i7-8550uxeon_e-2224gxeon_w-2135xeon_d-1623nxeon_w-2145xeon_e-2226gecore_i7-6650uxeon_gold_6142core_i7-10610ucore_i7-8500ycore_i7-7567uxeon_silver_4214xeon_w-1390pxeon_d-2161ixeon_silver_4210rxeon_d-1632core_i7-7820hqxeon_e3-1585l_v5xeon_e5-2620_v3xeon_e5-2670_v3xeon_gold_5218bxeon_e5-2648l_v3xeon_gold_6142mxeon_e5-2609_v3xeon_e3-1275_v5xeon_e5-2438l_v3xeon_e3-1240_v5xeon_e5-2650_v3xeon_gold_6222core_i7-6567uxeon_e5-2648l_v4simatic_ipc677exeon_e5-4620_v4xeon_e7-8855_v4xeon_d-1513nxeon_d-1537xeon_e3-1515m_v5xeon_w-1290texeon_e3-1225_v5xeon_gold_6209uxeon_silver_4112xeon_d-1559xeon_w-3223xeon_gold_5120txeon_w-3175xxeon_gold_6134xeon_gold_6162xeon_e5-2628l_v3xeon_e-2254mexeon_w-3235core_i7-7y75xeon_e5-4669_v3xeon_w-2225xeon_gold_6130hxeon_w-2133core_i7-6700xeon_d-1557xeon_e5-4627_v3xeon_e7-4850_v4xeon_gold_6148xeon_e3-1505m_v6xeon_gold_6144xeon_gold_6140mxeon_gold_5220txeon_platinum_8276lxeon_w-2223xeon_e5-2679_v4core_i7-7700kcore_i7-8705gxeon_e-2276mcore_i7-8665uxeon_gold_6129xeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-6600ucore_i7-8706gxeon_gold_6126tcore_i7-11700fxeon_platinum_8165xeon_w-3225xeon_gold_6135xeon_e3-1565l_v5xeon_e-2236xeon_w-1370core_i7-10850hxeon_e5-1603_v4core_i7-1185grexeon_e5-2408l_v3core_i7-11375hxeon_e3-1240_v6xeon_d-1573ncore_i7-8700core_i7-7700tcore_i7-10700txeon_e5-1630_v4xeon_e5-4660_v3xeon_gold_6246core_i7-8086kxeon_w-2295core_i7-6770hqcore_i7-8700kxeon_e5-2603_v3fas_biosxeon_e-2134xeon_e5-2667_v3xeon_gold_5215xeon_e5-4655_v3xeon_d-2143itxeon_d-2163itxeon_e5-2699_v4xeon_e3-1285_v6xeon_w-1390txeon_w-1270xeon_e3-1225_v6xeon_platinum_8284xeon_silver_4109tcore_i7-10510yxeon_e3-1240l_v5xeon_e5-2690_v3xeon_e5-4655_v4xeon_gold_5215lxeon_silver_4215rxeon_e5-2658_v4xeon_gold_6138fcore_i7-11800hxeon_e5-1630_v3simatic_ipc477exeon_silver_4210txeon_e5-2680_v3xeon_gold_6212uxeon_e3-1205_v6core_i7-7700hqxeon_w-1270texeon_silver_4114xeon_e5-2698_v3core_i7-6498duxeon_e3-1245_v5core_i7-6870hqxeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240lxeon_gold_6238lxeon_e5-2637_v3xeon_e5-1620_v3xeon_gold_6250xeon_d-2173itcore_i7-11700txeon_w-11855mxeon_d-2123itxeon_gold_5219yxeon_e-2246gxeon_w-3265mxeon_d-1627xeon_e5-2637_v4xeon_e5-2687w_v3xeon_d-1602xeon_e7-8890_v4xeon_e5-2680_v4xeon_gold_5218tsimatic_ipc847e_firmwarexeon_e5-2697a_v4xeon_gold_6150xeon_gold_6140xeon_e5-2690_v4xeon_e5-2609_v4core_i7-7920hqxeon_platinum_8174xeon_d-1612xeon_e-2254mlxeon_e3-1545m_v5core_i7-10700simatic_ipc477e_procore_i9-10920xxeon_e3-1578l_v5core_i7-6660uxeon_e3-1270_v5xeon_gold_6126simatic_ipc647exeon_e3-1260l_v5xeon_w-1250exeon_e5-2643_v4xeon_d-1563nxeon_e5-2699a_v4core_i7-10875hxeon_e-2276mlxeon_e-2244gxeon_e-2176gxeon_gold_6142fcore_i3-l13g4core_i7-8709gsimatic_ipc627exeon_e5-4650_v3xeon_e5-2650l_v4xeon_gold_6130xeon_e-2104gxeon_platinum_8260core_i7-8557usimatic_ipc547gcore_i7-8700txeon_platinum_9242core_i7-6820hqxeon_platinum_8280lxeon_silver_4110core_i7-8650uxeon_bronze_3204xeon_gold_5119tcore_i7-1180g7core_i7-6700tcore_i7-6920hqxeon_gold_6246rxeon_e3-1230_v6xeon_gold_5217xeon_gold_6230nxeon_gold_6143xeon_w-3265xeon_gold_5218nxeon_e5-2620_v4xeon_gold_6138txeon_w-3245xeon_gold_5120simatic_ipc627e_firmwarecore_i7-1185g7core_i7-1195g7xeon_e-2124gcore_i7-1165g7xeon_e5-2618l_v3xeon_d-1523nxeon_e5-2608l_v3core_i7-10700texeon_e-2288gxeon_d-1653nxeon_gold_5220xeon_e-2234xeon_d-1577xeon_d-1637xeon_gold_6254xeon_gold_6269yxeon_silver_4114tcore_i7-6700kxeon_gold_6240yxeon_e5-4669_v4aff_biosxeon_gold_6154xeon_w-1250xeon_e5-2640_v4hci_storage_node_biosxeon_gold_6208uxeon_e7-8893_v4xeon_w-1290exeon_e5-1650_v3xeon_w-3275core_i7-11700bxeon_d-1553nxeon_e-2126gxeon_silver_4209txeon_e5-4620_v3xeon_silver_4116xeon_w-1270exeon_d-1633ncore_i7-7820eqxeon_gold_6252nxeon_e7-4820_v4xeon_gold_6244xeon_e5-2695_v3xeon_gold_6248xeon_e3-1220_v6xeon_w-1370pxeon_platinum_8280xeon_e-2186mxeon_e5-1660_v3xeon_d-1520simatic_itp1000_firmwarexeon_e-2176mcore_i7-6785rcore_i7-6820hkxeon_platinum_8256xeon_gold_6152core_i7-1060ng7xeon_e5-2623_v3xeon_platinum_8158xeon_e5-2658a_v3xeon_e5-2418l_v3xeon_w-1290pxeon_e-2286gxeon_gold_6222vxeon_platinum_8176xeon_gold_6242xeon_e3-1275_v6xeon_d-1531core_i7-10810uxeon_e3-1575m_v5xeon_e-2278gxeon_e5-2650_v4xeon_platinum_8260yxeon_e3-1505l_v5xeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_e3-1245_v6xeon_gold_6128xeon_silver_4215xeon_d-2142itxeon_platinum_8180mcore_i7-8850hxeon_gold_5118xeon_w-2235xeon_e5-2695_v4xeon_gold_6130fsimatic_itp1000xeon_w-11955mcore_i7-6820eqxeon_gold_6134mcore_i9-10900xxeon_platinum_8276xeon_gold_6238txeon_e3-1235l_v5xeon_silver_4214yxeon_e5-2603_v4core_i9-10980xexeon_e5-4628l_v4xeon_e7-8860_v4xeon_w-1350xeon_silver_4106hxeon_gold_6138pcore_i7-8665uexeon_w-1290xeon_platinum_8176fxeon_d-1524nsolidfire_biosxeon_gold_6240rxeon_w-10885mxeon_w-2275xeon_d-1543nxeon_gold_6226xeon_e-2144gxeon_gold_6256xeon_d-1521xeon_w-1350pxeon_gold_6230rcore_i7-8569uxeon_gold_6252xeon_e5-4640_v3core_i7-1185g7exeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rsimatic_ipc677e_firmwarexeon_e5-1607_v4core_i7-1065g7xeon_platinum_8260lxeon_e5-1428l_v3core_i7-8559uxeon_platinum_8170mxeon_e-2146gxeon_platinum_8180xeon_d-2177ntxeon_e5-2650l_v3xeon_w-2175Intel(R) Processors
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2024-40885
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.03% / 7.43%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:10
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in the UEFI firmware of some Intel(R) Server M20NTP BIOS may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Server M20NTP BIOSm20ntp_firmware
CWE ID-CWE-416
Use After Free
CVE-2022-21198
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.03% / 7.59%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:49
Updated-04 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_g5920celeron_5205ucore_i7-11850hceleron_g5925_firmwarecore_i5-11500tpentium_gold_g7400tcore_i7-12650hceleron_n2808_firmwareceleron_g1830core_i5-10310ycore_i3-10100t_firmwarecore_i5-12600_firmwarecore_i5-1145g7ecore_i7-10510ucore_i5-11300hpentium_gold_4415y_firmwareceleron_g1630core_i5-1030g7_firmwarecore_i7-11800hxeon_w-2223core_i5-10600tpentium_gold_4417u_firmwareceleron_g1820tecore_i7-1165g7core_i3-1220pe_firmwarecore_i5-10300hceleron_j3455_firmwareceleron_b800core_i9-12900h_firmwarecore_i3-1120g4_firmwarecore_i7-11370hcore_i7-1255uceleron_j4025core_i3-1215uceleron_b710core_i3-10105tcore_i5-1155g7_firmwarecore_i5-12600hlcore_i7-10710uceleron_n6210_firmwarecore_i9-11900t_firmwarepentium_gold_g6500celeron_g550txeon_w-3235_firmwarepentium_silver_n6005core_i7-11800h_firmwareceleron_847core_i3-11100he_firmwareceleron_g4900t_firmwareceleron_g5205u_firmwareceleron_g3900_firmwareceleron_n2805_firmwarecore_i7-12800h_firmwareceleron_n3350e_firmwarecore_i5-11600kf_firmwarecore_i5-10400hceleron_g4900_firmwarecore_i9-10900tecore_i5-1230u_firmwareceleron_1017upentium_gold_g6405_firmwarecore_i5-1145g7core_i3-10300celeron_n3050_firmwareceleron_807ue_firmwarecore_i5-1130g7core_i5-12600k_firmwareceleron_g3900t_firmwarecore_i5-1030g4_firmwarexeon_w-3365_firmwarexeon_w-1390t_firmwarepentium_gold_g5400t_firmwarecore_i3-1115g4ecore_i9-11900kf_firmwarecore_i5-12500core_i5-1245uecore_i7-1280p_firmwarepentium_gold_g5420_firmwareceleron_g460_firmwareceleron_g4900celeron_n4000core_i7-11370h_firmwarepentium_gold_g5620_firmwarexeon_w-1350_firmwarecore_i7-1068ng7xeon_w-2275_firmwarecore_i7-11390hceleron_j6412core_i9-11900fceleron_g5905t_firmwarecore_i3-1215uecore_i5-10500txeon_w-1290t_firmwarecore_i5-12600kfcore_i9-10900kfceleron_g5925core_i5-11400hceleron_2981uceleron_3965ycore_i5-12500hlceleron_2980u_firmwarecore_i5-11400tcore_i7-10810uceleron_g4930_firmwarepentium_gold_g7400t_firmwareceleron_g3900e_firmwarecore_i3-12100eceleron_b830_firmwarecore_i7-11700kfceleron_g465core_i3-10300_firmwarecore_i3-10320_firmwareceleron_g3900te_firmwarepentium_gold_g5600tcore_i3-1115g4e_firmwarecore_i7-12800hcore_i5-1135g7_firmwarepentium_gold_8505_firmwarecore_i3-10105_firmwareceleron_6600he_firmwareceleron_1017u_firmwareceleron_5205u_firmwareceleron_g3920t_firmwareceleron_n2820core_i3-11100hecore_i5-1035g4core_i9-12900kfceleron_g1840tceleron_n3150core_i7-10700fceleron_j4105core_i7-11390h_firmwarecore_i5-1145g7e_firmwarecore_i5-12500hl_firmwarecore_i7-12650h_firmwarecore_i3-10110y_firmwarexeon_w-2235core_i5-1250pcore_i5-11300h_firmwareceleron_g465_firmwarecore_i3-1215u_firmwarecore_i5-1035g7_firmwareceleron_g3930exeon_w-1250pentium_gold_g6605_firmwareceleron_2970mceleron_n4000c_firmwarecore_i7-10700e_firmwarecore_i7-1265ulceleron_g3900ecore_i7-11375h_firmwarecore_i5-1035g4_firmwareceleron_g4930t_firmwareceleron_g3930tecore_i3-1115g4core_i3-10300tceleron_g3902ecore_i3-10110ycore_i5-12450h_firmwarecore_i5-12600heceleron_g1620tceleron_1019yceleron_1020mcore_i9-11900kfceleron_797core_i3-10100_firmwareceleron_j3455e_firmwarecore_i7-12800hecore_i9-10980hk_firmwarecore_i5-1245ul_firmwareceleron_g6900t_firmwarexeon_w-1270p_firmwareceleron_n2930_firmwarecore_i7-11850he_firmwarexeon_w-3275mpentium_gold_4425y_firmwarepentium_gold_4415u_firmwareceleron_2957ucore_i3-12100celeron_g3900core_i7-1195g7core_i3-12300_firmwarepentium_gold_g5600_firmwareceleron_g3930tceleron_g4920core_i7-1260upentium_gold_g6600_firmwarexeon_w-3375celeron_n3700celeron_3855uceleron_n6211core_i5-1240u_firmwarecore_i7-1185g7e_firmwareceleron_g5305ucore_i5-12500hcore_i7-12850hx_firmwarepentium_gold_g5620core_i3-1210ucore_i7-12800hx_firmwarexeon_w-1290p_firmwareceleron_g1610_firmwareceleron_n3000core_i7-10875hceleron_j3060_firmwareceleron_3765u_firmwarecore_i5-12500ecore_i7-12700hxeon_w-1390celeron_g1830_firmwareceleron_g4930e_firmwarecore_i5-11500he_firmwareceleron_n3520_firmwareceleron_877celeron_n2807core_i7-12700_firmwareceleron_n2830celeron_n4000_firmwarecore_i9-10850kceleron_827ecore_i5-1145g7_firmwarecore_i7-11700k_firmwarecore_i7-1265uceleron_j1800core_i5-1230uceleron_g550_firmwarecore_i7-1270p_firmwarepentium_gold_4410y_firmwareceleron_g3930te_firmwarexeon_w-1370pcore_i9-12900kf_firmwarepentium_gold_g5500tcore_i5-12400core_i7-12700fcore_i7-10700kf_firmwareceleron_n3000_firmwareceleron_g3930t_firmwareceleron_g5305u_firmwareceleron_7300celeron_j6413celeron_n4020c_firmwarecore_i7-1180g7_firmwareceleron_b800_firmwarecore_i9-12900k_firmwarexeon_w-3265celeron_n2940core_i3-12100tcore_i7-1160g7celeron_n2840_firmwarecore_i9-10900ecore_i9-11900_firmwareceleron_n4000cceleron_n3450_firmwarexeon_w-3375_firmwareceleron_b810e_firmwareceleron_g3940celeron_1007u_firmwarecore_i3-1115g4_firmwarecore_i9-10900te_firmwareceleron_n6210celeron_847_firmwareceleron_g555_firmwarecore_i5-1245u_firmwareceleron_g5205ucore_i5-1235ulcore_i3-10100xeon_w-1390_firmwarecore_i5-11320hcore_i7-10750hcore_i9-11900celeron_4205ucore_i3-10100tcore_i5-10500h_firmwareceleron_3865u_firmwarecore_i5-11500pentium_gold_g6500t_firmwarepentium_gold_7505_firmwareceleron_g3950celeron_g440_firmwarecore_i3-12100texeon_w-1290celeron_g530t_firmwareceleron_n2810_firmwarexeon_w-2295_firmwarepentium_gold_g5420t_firmwarecore_i5-10500te_firmwarecore_i9-12900ksceleron_g530tcore_i3-10320xeon_w-3345_firmwarecore_i5-10310u_firmwareceleron_g3920_firmwareceleron_n4504_firmwarecore_i5-12450hceleron_j6412_firmwarecore_i7-10710u_firmwarecore_i5-12600hl_firmwarecore_i5-10600kf_firmwareceleron_g5900_firmwareceleron_n3160_firmwareceleron_807core_i5-12500tceleron_b815celeron_4305uecore_i5-10400t_firmwarexeon_w-3275celeron_n5100celeron_857_firmwarecore_i5-12600hceleron_j4005core_i3-10105t_firmwarecore_i3-12100t_firmwarecore_i5-1250pe_firmwarecore_i7-10870h_firmwarexeon_w-1290pcore_i5-10500tecore_i7-10700kfceleron_j4125_firmwarecore_i7-1185g7ecore_i3-10100tecore_i5-12600celeron_g470core_i7-10700_firmwarecore_i7-12700tcore_i9-12900epentium_gold_g5600t_firmwarecore_i9-12900hkpentium_gold_6500y_firmwarexeon_w-2235_firmwareceleron_n3700_firmwarexeon_w-2245_firmwareceleron_n3450celeron_g540xeon_w-2223_firmwarecore_i3-1220p_firmwarecore_i7-1160g7_firmwareceleron_n2920core_i5-12400f_firmwarecore_i7-11700_firmwarecore_i5-10505_firmwarecore_i7-10700te_firmwarecore_i5-10300h_firmwarexeon_w-2225_firmwareceleron_3755u_firmwareceleron_j4115xeon_w-3335_firmwareceleron_4305uceleron_867_firmwareceleron_g1610t_firmwarecore_i3-1125g4_firmwarecore_i5-12400t_firmwarecore_i7-11600h_firmwarexeon_w-2255core_i3-10105fxeon_w-3225_firmwareceleron_n2910core_i7-1065g7_firmwareceleron_j4115_firmwarecore_i7-10700f_firmwarecore_i7-1265ul_firmwarecore_i3-10300t_firmwarecore_i5-11600kcore_i9-10900kf_firmwarecore_i5-11400t_firmwareceleron_g6900core_i3-10110u_firmwarecore_i5-12600t_firmwarepentium_gold_g6405t_firmwareceleron_6305_firmwarexeon_w-1270_firmwareceleron_3955u_firmwarecore_i7-10700tcore_i7-12700core_i7-12700kf_firmwareceleron_3955uxeon_w-1350celeron_1020e_firmwarepentium_gold_g5400_firmwareceleron_n3150_firmwarecore_i5-1140g7_firmwarecore_i5-1038ng7_firmwarecore_i5-11500h_firmwarecore_i7-11600hxeon_w-3323celeron_n4020_firmwarecore_i9-10900celeron_7305_firmwarecore_i5-1235ucore_i7-11375hcore_i7-12700eceleron_2955uceleron_n5100_firmwareceleron_g3900tceleron_n4504core_i7-1255ul_firmwarecore_i7-12800hl_firmwarepentium_gold_4425ycore_i7-1250u_firmwarecore_i5-10400tcore_i3-10100y_firmwareceleron_g555core_i3-12300t_firmwarepentium_gold_g6405tceleron_3965y_firmwareceleron_g3930celeron_g1610tcore_i5-10400_firmwarecore_i5-12600kf_firmwarecore_i9-12900teceleron_g1840_firmwarexeon_w-2255_firmwarecore_i5-10500hcore_i7-10700kcore_i7-10700ecore_i9-10900tcore_i9-10900f_firmwarecore_i9-12950hxxeon_w-1370_firmwareceleron_b810_firmwarecore_i5-11500hpentium_gold_g6505_firmwareceleron_j4125xeon_w-1350p_firmwarecore_i5-11600_firmwarecore_i5-10400f_firmwareceleron_3865uxeon_w-3223core_i9-11900h_firmwarepentium_gold_8505celeron_1019y_firmwarecore_i3-12300celeron_g5905_firmwareceleron_n2840celeron_725c_firmwarecore_i5-1035g1celeron_797_firmwarecore_i5-12500_firmwarecore_i7-11850h_firmwarepentium_gold_g6505t_firmwareceleron_g540tcore_i7-10510yceleron_n4020cceleron_j6413_firmwarecore_i5-11320h_firmwarexeon_w-2295celeron_6305e_firmwarecore_i3-12100e_firmwarecore_i7-1068ng7_firmwareceleron_b810exeon_w-2225core_i5-11600t_firmwarecore_i3-10100fcore_i7-10750h_firmwareceleron_b720_firmwarecore_i5-1035g7core_i7-10870hcore_i5-11500hecore_i3-12300he_firmwarecore_i7-11700t_firmwarecore_i7-1185g7core_i9-11900f_firmwarecore_i9-12900hpentium_gold_g6605celeron_n4120core_i5-10500_firmwareceleron_n6211_firmwareceleron_807_firmwareceleron_j4105_firmwarecore_i9-11900kceleron_847e_firmwarecore_i5-12450hxceleron_n4100core_i9-10900kceleron_b720core_i7-10700t_firmwarepentium_gold_6405u_firmwarecore_i9-10900fcore_i9-12900core_i5-10500exeon_w-2265core_i7-1270pecore_i9-12900ks_firmwarecore_i7-11700celeron_g550t_firmwareceleron_g440celeron_g4900tcore_i5-10200h_firmwareceleron_g3930_firmwarecore_i5-11600k_firmwareceleron_j1900core_i5-10500pentium_gold_8500_firmwarecore_i9-12900hxceleron_g1820tcore_i9-11950h_firmwarecore_i5-10210y_firmwarepentium_silver_n6005_firmwarepentium_gold_4415ypentium_gold_g6405xeon_w-3275m_firmwareceleron_n2806_firmwareceleron_g1820core_i5-1245ue_firmwarepentium_gold_g6400_firmwarecore_i5-10600t_firmwareceleron_j1850_firmwarecore_i9-12950hx_firmwareceleron_4305ue_firmwarecore_i3-1115gre_firmwareceleron_n5105celeron_g5920_firmwareceleron_5305u_firmwarecore_i5-12400tceleron_g460core_i7-10610uceleron_b815_firmwarecore_i9-12900te_firmwarepentium_gold_g5420tcore_i3-1005g1_firmwareceleron_n3350xeon_w-3245m_firmwarexeon_w-3345core_i9-10900k_firmwarepentium_gold_g7400_firmwarecore_i9-10900_firmwareceleron_g470_firmwareceleron_j3060core_i3-1125g4celeron_g5905core_i7-11700kf_firmwarepentium_gold_g7400core_i9-12900tcore_i5-11500t_firmwarexeon_w-3365core_i7-1280pcore_i3-10105f_firmwarepentium_gold_g6505xeon_w-2265_firmwareceleron_6305xeon_w-1350pceleron_2957u_firmwareceleron_j4005_firmwareceleron_725cceleron_887pentium_gold_g6505txeon_w-1390tceleron_6305ecore_i5-12600tcore_i9-10900t_firmwarexeon_w-3323_firmwareceleron_1005mcore_i7-12700teceleron_j3160core_i5-10600kcore_i5-11260hceleron_5305ucore_i5-1245ulcore_i5-12500teceleron_887_firmwareceleron_n4500core_i5-12600hxceleron_g1630_firmwarecore_i3-1005g1core_i5-1250peceleron_j4025_firmwareceleron_n2820_firmwarecore_i7-1250ucore_i5-11600core_i7-1265u_firmwarecore_i9-10885h_firmwareceleron_867core_i5-1240pxeon_w-1290txeon_w-1370celeron_1000m_firmwarepentium_gold_g5500core_i3-1110g4_firmwareceleron_n2940_firmwareceleron_g3920core_i7-1255u_firmwarepentium_gold_6405uceleron_g1820_firmwarecore_i5-11400h_firmwareceleron_g530_firmwarecore_i5-1235ul_firmwareceleron_g4950_firmwareceleron_g1850_firmwareceleron_g4930xeon_w-2275celeron_b820_firmwareceleron_807uecore_i9-12900t_firmwarecore_i5-10200hceleron_n3060_firmwarexeon_w-3275_firmwarexeon_w-3235xeon_w-3245_firmwareceleron_6600hecore_i5-1240p_firmwarecore_i5-10210ucore_i7-11700tcore_i3-12300tcore_i3-10100e_firmwareceleron_j3355e_firmwarecore_i3-1215ulceleron_g3902e_firmwarecore_i3-1000g1_firmwareceleron_b820core_i3-12300hlcore_i7-12850hxcore_i5-12400fceleron_g4950celeron_7300_firmwarecore_i3-1210u_firmwarecore_i9-12900kcore_i3-1220pecore_i9-12900hk_firmwareceleron_n5095pentium_gold_g6600celeron_j3160_firmwarepentium_gold_g5500t_firmwarecore_i5-11400f_firmwarecore_i5-10210ycore_i9-10885hxeon_w-2245celeron_847ecore_i3-10305t_firmwareceleron_g550core_i5-11500_firmwareceleron_1020ecore_i9-11900hceleron_j1750celeron_g540_firmwarecore_i5-1030g7core_i7-10875h_firmwarecore_i5-11600tcore_i5-1240ucore_i7-10700k_firmwareceleron_g3920tceleron_g6900_firmwarecore_i3-10305tpentium_gold_g6400celeron_1007ucore_i7-1260pcore_i3-10325_firmwarexeon_w-1270pceleron_7305celeron_j1850pentium_gold_5405u_firmwarecore_i5-10600k_firmwarecore_i3-12300hepentium_gold_4417ucore_i3-10100epentium_gold_6500yceleron_4305u_firmwarecore_i7-11700fcore_i5-10600_firmwarecore_i7-12700te_firmwareceleron_g1610pentium_gold_4410ycore_i5-10400h_firmwareceleron_3755uceleron_787_firmwarecore_i7-10610u_firmwareceleron_n3010celeron_827e_firmwarepentium_gold_4415uceleron_j3355_firmwarecore_i7-1260p_firmwarecore_i7-1265ue_firmwarecore_i3-1220pcore_i3-12100te_firmwareceleron_857core_i5-1030g4celeron_1047uecore_i5-12600hx_firmwarecore_i7-12700hlxeon_w-1290_firmwarecore_i7-1180g7celeron_n5095_firmwarecore_i7-1260u_firmwareceleron_n4505_firmwareceleron_n5105_firmwareceleron_3965ucore_i7-10850hpentium_gold_g5600core_i7-12650hx_firmwarecore_i5-11600kfpentium_gold_g6400t_firmwareceleron_g3930e_firmwarepentium_gold_g6400tcore_i3-1000g4core_i7-1270pe_firmwarecore_i5-1245uceleron_2980uceleron_2981u_firmwareceleron_g4930tcore_i5-12450hx_firmwareceleron_n4020core_i7-12650hxcore_i9-11900tceleron_1020m_firmwarecore_i3-1120g4celeron_j3455ecore_i5-12500te_firmwarecore_i5-10505core_i5-1035g1_firmwarexeon_w-1250pcore_i9-12900fcore_i5-12400_firmwareceleron_3965u_firmwareceleron_g1820t_firmwarecore_i7-12800he_firmwarecore_i5-1038ng7core_i7-10810u_firmwarecore_i9-12900f_firmwarexeon_w-3225core_i9-12900hx_firmwarecore_i5-1145greceleron_3867u_firmwarexeon_w-3265_firmwarexeon_w-3245celeron_n3350_firmwarecore_i5-12500h_firmwareceleron_n4505core_i3-12100_firmwarecore_i5-1145gre_firmwarecore_i3-10100f_firmwareceleron_n2810celeron_n4100_firmwareceleron_g1620t_firmwareceleron_1037ucore_i9-10850k_firmwarecore_i7-12700k_firmwareceleron_g5900tceleron_877_firmwarecore_i5-1155g7celeron_g3940_firmwarecore_i5-10500e_firmwarecore_i5-11400fceleron_n4120_firmwarecore_i7-12700f_firmwareceleron_2955u_firmwareceleron_g1840t_firmwareceleron_g6900tcore_i3-12100f_firmwarecore_i7-10700tecore_i5-11400core_i7-10510u_firmwareceleron_n2830_firmwareceleron_927ue_firmwarecore_i7-11700f_firmwareceleron_g5900core_i5-12500t_firmwarecore_i7-11850hecore_i7-1060g7_firmwarecore_i5-10210u_firmwareceleron_1037u_firmwarepentium_gold_7505pentium_gold_g5400core_i3-10105celeron_j3355core_i7-10850h_firmwarecore_i3-10110ucore_i7-11700kceleron_n2808celeron_g3900tecore_i5-1235u_firmwarecore_i5-10600celeron_g1820te_firmwarecore_i5-12500e_firmwarecore_i5-11260h_firmwareceleron_n3160core_i5-10400fcore_i5-1250p_firmwareceleron_1000mceleron_g1620_firmwareceleron_j3455core_i3-10100yceleron_g4920_firmwarecore_i5-12600kxeon_w-1370p_firmwarecore_i3-1110g4core_i5-1135g7pentium_gold_g6500_firmwarecore_i3-1000g1core_i5-1130g7_firmwarecore_i7-10700celeron_b840core_i3-1000g4_firmwareceleron_787core_i9-10980hkxeon_w-3265mcore_i3-10100te_firmwarexeon_w-3223_firmwareceleron_4205u_firmwarecore_i9-11900k_firmwareceleron_b710_firmwarecore_i3-12100fcore_i3-1215ul_firmwareceleron_n3520core_i7-12800hlceleron_3867uceleron_b810celeron_g4932e_firmwarepentium_gold_g5400tceleron_n2815_firmwarecore_i3-1115greceleron_g4930ecore_i7-1265uexeon_w-3265m_firmwareceleron_3765uceleron_n3010_firmwareceleron_n2805core_i7-10510y_firmwarecore_i5-11400_firmwarecore_i9-11950hceleron_g530pentium_gold_g5420celeron_j1800_firmwarexeon_w-3245mceleron_n2806celeron_g5905tceleron_n2920_firmwarecore_i7-12700kfpentium_gold_g5500_firmwarexeon_w-1250_firmwarexeon_w-3335pentium_silver_n6000_firmwarepentium_gold_g6500txeon_w-1270xeon_w-1390p_firmwarecore_i7-1185g7_firmwarecore_i5-10500t_firmwarepentium_gold_8500core_i7-12700h_firmwareceleron_g5900t_firmwarecore_i5-10310uceleron_3855u_firmwareceleron_n2910_firmwarecore_i5-12600h_firmwarecore_i5-12600he_firmwareceleron_n4500_firmwarecore_i5-1140g7core_i9-10900e_firmwarecore_i9-11980hkceleron_j1900_firmwareceleron_j1750_firmwarecore_i7-12700hl_firmwarecore_i3-10325celeron_n2930core_i7-12700kcore_i3-1215ue_firmwareceleron_927uecore_i7-1270pcore_i9-12900_firmwarepentium_silver_n6000xeon_w-1250p_firmwareceleron_n3350eceleron_g540t_firmwareceleron_n3050celeron_n2815celeron_g4932ecore_i7-1060g7xeon_w-1390pcore_i5-10600kfcore_i3-12300hl_firmwareceleron_b830core_i7-1165g7_firmwareceleron_b840_firmwarecore_i3-10305_firmwareceleron_n3060core_i9-11980hk_firmwarepentium_gold_5405uceleron_g3950_firmwarecore_i7-1185gre_firmwarecore_i3-10305core_i5-10310y_firmwarecore_i7-12700t_firmwarecore_i9-12900e_firmwareceleron_1005m_firmwareceleron_g1850core_i7-1195g7_firmwarecore_i5-10400celeron_1047ue_firmwarecore_i7-1255ulcore_i7-12800hxcore_i7-12700e_firmwarecore_i7-1065g7core_i7-1185greceleron_g1840celeron_j3355eceleron_g1620celeron_2970m_firmwareceleron_n2807_firmwareIntel(R) Processors
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-33075
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.10% / 29.12%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in firmware for some Intel(R) Optane(TM) SSD, Intel(R) Optane(TM) SSD DC and Intel(R) SSD DC Products may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_ssd_905poptane_ssd_dc_p4800xoptane_ssd_900poptane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4801xoptane_ssd_905p_firmwareoptane_ssd_p5800xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_dc_p4800x_firmwareoptane_ssd_p5800x_firmwareoptane_memory_h10_with_solid_state_storageoptane_memory_h10_with_solid_state_storage_firmwareoptane_ssd_900p_firmwareIntel(R) Optane(TM) SSD, Intel(R) Optane(TM) SSD DC and Intel(R) SSD DC Products
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-33078
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.10% / 29.12%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition within a thread in firmware for some Intel(R) Optane(TM) SSD and Intel(R) SSD DC Products may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-optane_ssd_905poptane_ssd_dc_p4800xoptane_ssd_900poptane_memory_h20_with_solid_state_storageoptane_ssd_dc_p4801xoptane_ssd_905p_firmwareoptane_ssd_p5800xoptane_memory_h20_with_solid_state_storage_firmwareoptane_ssd_dc_p4801x_firmwareoptane_ssd_dc_p4800x_firmwareoptane_ssd_p5800x_firmwareoptane_memory_h10_with_solid_state_storageoptane_memory_h10_with_solid_state_storage_firmwareoptane_ssd_900p_firmwareIntel(R) Optane(TM) SSD and Intel(R) SSD DC Products
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-8755
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.07% / 20.99%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:09
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in subsystem for Intel(R) CSME versions before 12.0.70 and 14.0.45, Intel(R) SPS versions before E5_04.01.04.400 and E3_05.01.04.200 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_platform_servicesconverged_security_and_management_engineIntel(R) CSME, Intel(R) SPS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-11090
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.78% / 72.74%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cryptographic timing conditions in the subsystem for Intel(R) PTT before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0 and 14.0.10; Intel(R) TXE 3.1.70 and 4.0.20; Intel(R) SPS before versions SPS_E5_04.01.04.305.0, SPS_SoC-X_04.00.04.108.0, SPS_SoC-A_04.00.04.191.0, SPS_E3_04.01.04.086.0, SPS_E3_04.08.04.047.0 may allow an unauthenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_platform_services_firmwaretrusted_execution_engine_firmwareplatform_trust_technology_firmwareIntel(R) PTT
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-0114
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.04% / 12.81%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driverIntel(R) Graphics Drivers
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-22310
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.88%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 15:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel CorporationMicrosoft Corporation
Product-windowslinux_kernelaptio_v_uefi_firmware_integrator_toolsIntel(R) Aptio* V UEFI Firmware Integrator Tools
CWE ID-CWE-421
Race Condition During Access to Alternate Channel
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-22276
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 6.61%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in firmware for some Intel(R) Ethernet Controllers and Adapters E810 Series before version 1.7.2.4 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_network_controller_e810-cam1_firmwareethernet_network_controller_e810-cam1ethernet_network_controller_e810-cam2_firmwareethernet_network_controller_e810-xxvam2ethernet_network_controller_e810-cam2ethernet_network_controller_e810-xxvam2_firmwareIntel(R) Ethernet Controllers and Adapters E810 Series
CWE ID-CWE-421
Race Condition During Access to Alternate Channel
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-8680
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7||HIGH
EPSS-0.04% / 12.72%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:19
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in some Intel(R) Graphics Drivers before version 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driversIntel(R) Graphics Drivers Advisory
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-32764
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.34%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Description: Race condition in the Intel(R) DSA software before version 22.4.26 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-driver_\&_support_assistantIntel(R) DSA software
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-11184
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.20% / 42.57%
||
7 Day CHG~0.00%
Published-16 Sep, 2019 | 15:59
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in specific microprocessors using Intel (R) DDIO cache allocation and RDMA may allow an authenticated user to potentially enable partial information disclosure via adjacent access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.
Product-xeon_e5-2687w_v2_firmwarexeon_e5-2667xeon_e7-8893_v3xeon_e5-1620_v2_firmwarexeon_e5-1630_v3_firmwarexeon_e7-4860_v2xeon_e5-4620_v2xeon_e5-4610_v4xeon_e7-8894_v4xeon_e5-2608l_v4_firmwarexeon_e5-4640xeon_e5-2470_v2_firmware6138_firmwarexeon_e5-2660_v3xeon_e5-2450_v26126_firmwarexeon_e7-8880l_v2xeon_e5-2630_v2_firmwarexeon_e5-2448lxeon_e5-4650_firmwarexeon_e5-2670_v2xeon_e5-1680_v3xeon_e5-4610_v2_firmwarexeon_e5-2697_v4xeon_e5-2408l_v3xeon_e5-2608l_v3_firmwarexeon_e5-2643_v2_firmware5120t_firmwarexeon_e5-2687w_firmwarexeon_e5-2637xeon_e5-2690_v2xeon_e7-8890_v3_firmwarexeon_e5-2648l_v2xeon_e5-4610_v3xeon_e7-8870_v3xeon_e7-4850_v3_firmwarexeon_e5-2640_v4_firmwarexeon_e5-4650_v4xeon_e7-8880_v4xeon_e5-2448l_v2_firmwarexeon_e5-2620_v2_firmwarexeon_e5-1630_v4xeon_e5-2643_firmwarexeon_e5-4660_v3xeon_e7-2850_v2_firmwarexeon_e5-1428l_v2xeon_e5-1660_v4xeon_e5-2699r_v4_firmwarexeon_e7-8891_v4xeon_e5-2603_v2xeon_e5-2603_v3_firmwarexeon_e5-2697_v3_firmwarexeon_e5-2683_v4_firmwarexeon_e5-1620_v2xeon_e5-2407_v2xeon_e5-2628l_v4_firmwarexeon_e5-4628l_v4_firmwarexeon_e5-2603_v3xeon_e5-2699r_v4xeon_e5-2658a_v3_firmwarexeon_e7-4850_v4_firmwarexeon_e5-2658_v3_firmware6138xeon_e7-4820_v2_firmwarexeon_e5-1680_v3_firmwarexeon_e5-2637_firmwarexeon_e7-8870_v3_firmwarexeon_e5-1620_v3_firmwarexeon_e7-4830_v2xeon_e5-2667_v3xeon_e5-2687wxeon_e5-4655_v3xeon_e7-4830_v3_firmwarexeon_e5-2650_v2xeon_e7-4820_v3xeon_e5-2620_v4_firmwarexeon_e5-2609_v4_firmwarexeon_e5-1650_firmwarexeon_e5-2683_v4xeon_e5-2608l_v4xeon_e5-1660_v3_firmwarexeon_e5-2640_v3xeon_e5-2699_v4xeon_e5-4640_firmwarexeon_e5-2418l_v3_firmwarexeon_e5-1620_v4xeon_e7-8880l_v3xeon_e5-2699_v3_firmwarexeon_e5-2650l_v2_firmwarexeon_e5-2643_v4_firmwarexeon_e5-2630l_v3xeon_e5-4640_v4xeon_e5-2690_v3xeon_e5-4655_v4_firmware6130txeon_e5-4655_v4xeon_e5-2658_v4xeon_e5-2440_v2xeon_e5-1630_v3xeon_e5-2603xeon_e5-4650_v2_firmwarexeon_e5-1660_firmwarexeon_e7-8893_v3_firmwarexeon_e5-2418l_v2_firmwarexeon_e5-2680_v3xeon_e5-2648lxeon_e5-4650xeon_e5-2699_v3xeon_e5-2420xeon_e5-2697_v4_firmwarexeon_e7-4830_v3xeon_e5-2420_v2_firmwarexeon_e5-4624l_v2_firmwarexeon_e5-2680_firmwarexeon_e5-4640_v2xeon_e5-1650xeon_e5-2618l_v2_firmwarexeon_e5-4655_v3_firmwarexeon_e5-2698_v3xeon_e5-4657l_v2xeon_e7-8880_v3_firmwarexeon_e7-8870_v4_firmwarexeon_e5-4627_v4_firmwarexeon_e5-2648l_v3_firmwarexeon_e7-8857_v2_firmwarexeon_e5-2430l_firmwarexeon_e5-4607_firmwarexeon_e5-4650l_firmwarexeon_e5-2609_v2_firmwarexeon_e7-8870_v4xeon_e5-26704116txeon_e5-2699_v4_firmwarexeon_e5-2637_v3xeon_e7-8890_v2_firmwarexeon_e5-1620_v3xeon_e7-8880l_v3_firmwarexeon_e7-8850_v2_firmwarexeon_e5-2470_firmwarexeon_e5-2450l_v2_firmwarexeon_e5-2648l_firmwarexeon_e7-8893_v4_firmwarexeon_e7-4860_v2_firmwarexeon_e5-2667_v4_firmware5119txeon_e7-8893_v2xeon_e5-2670_v3_firmwarexeon_e5-2637_v4xeon_e5-2420_firmware4116_firmwarexeon_e5-2667_v4xeon_e5-4610_firmwarexeon_e5-2687w_v3xeon_e5-4650lxeon_e5-1428l_v3_firmwarexeon_e5-2695_v4_firmwarexeon_e5-2450lxeon_e5-2470xeon_e5-26504116t_firmwarexeon_e7-8890_v4xeon_e5-2428lxeon_e5-2628l_v2xeon_e7-8870_v2xeon_e5-2680_v4xeon_e5-4607_v2_firmwarexeon_e5-2630l_v3_firmwarexeon_e5-2697a_v4xeon_e5-1680_v4xeon_e7-4809_v3_firmwarexeon_e5-2690_v4xeon_e7-4809_v3xeon_e5-2609_v4xeon_e7-8891_v2xeon_e5-2609_v2xeon_e5-2658_v4_firmwarexeon_e7-4850_v2xeon_e5-2630lxeon_e7-4820_v3_firmwarexeon_e5-2660_v2xeon_e5-1650_v2_firmwarexeon_e5-2658_v3xeon_e5-4660_v4xeon_e5-4603xeon_e7-4870_v2xeon_e5-2450l_firmwarexeon_e5-1428lxeon_e5-2643_v3_firmwarexeon_e5-4669_v4_firmwarexeon_e5-2640xeon_e5-2680_v2xeon_e5-2698_v3_firmwarexeon_e5-2630l_firmwarexeon_e5-24075120txeon_e5-2699a_v4xeon_e5-2643_v4xeon_e5-2403_v2_firmwarexeon_e5-2630l_v4xeon_e5-2440xeon_e5-4667_v4xeon_e5-2670_firmwarexeon_e5-2628l_v4xeon_e5-2658_v26130_firmwarexeon_e5-2690_v3_firmwarexeon_e7-2870_v2xeon_e5-2690_v4_firmwarexeon_e7-8860_v3xeon_e5-2630_v4xeon_e5-2620_firmwarexeon_e5-2687w_v2xeon_e5-4610_v3_firmwarexeon_e5-4667_v3xeon_e5-2650lxeon_e5-2609_v3_firmwarexeon_e5-2698_v4_firmwarexeon_e5-4648_v3_firmwarexeon_e5-2637_v2xeon_e7-4809_v2_firmwarexeon_e7-4809_v4_firmwarexeon_e5-2643_v3xeon_e5-1650_v4xeon_e7-4870_v2_firmwarexeon_e5-2630_v3xeon_e5-2697a_v4_firmwarexeon_e5-4650_v3xeon_e5-2650l_v4xeon_e5-4627_v2_firmwarexeon_e5-1650_v3_firmwarexeon_e5-2448l_firmwarexeon_e7-8850_v2xeon_e5-2695_v2xeon_e5-4640_v2_firmwarexeon_e5-2667_v2_firmwarexeon_e5-2623_v4xeon_e5-4620_v4_firmwarexeon_e5-2470_v2xeon_e7-8890_v4_firmwarexeon_e5-2630xeon_e5-2420_v2xeon_e5-4617_firmwarexeon_e5-2683_v3xeon_e7-4850_v3xeon_e5-2637_v2_firmwarexeon_e5-2658xeon_e5-2697_v2xeon_e5-2430_v2xeon_e5-4627_v3_firmwarexeon_e5-2428l_v3_firmwarexeon_e5-1620_v4_firmwarexeon_e5-2667_firmware3106xeon_e5-2643xeon_e5-2665xeon_e5-1620_firmware4110_firmwarexeon_e7-8880l_v2_firmwarexeon_e5-4669_v3_firmwarexeon_e5-2408l_v3_firmwarexeon_e7-8870_v2_firmwarexeon_e5-2618l_v4_firmwarecloud_backupxeon_e5-2403_firmware4110xeon_e5-2650_v3_firmwarexeon_e5-2637_v4_firmwarexeon_e5-2428l_v2xeon_e7-8867_v4xeon_e5-2687w_v4_firmwarexeon_e7-8867_v3_firmwarexeon_e5-2430l_v26126t_firmwarexeon_e5-2628l_v2_firmwarexeon_e5-2660_v3_firmwaresteelstore_cloud_integrated_storagexeon_e7-2850_v2xeon_e5-2620_v4xeon_e7-4820_v4_firmwarexeon_e5-2620xeon_e5-2618l_v3xeon_e7-8880_v3xeon_e5-2608l_v3xeon_e5-2407_firmwarexeon_e5-4660_v3_firmwarexeon_e7-8891_v3_firmwarexeon_e7-8880_v2xeon_e7-8891_v2_firmwarexeon_e5-1650_v2xeon_e5-2698_v4xeon_e7-4890_v2_firmwarexeon_e5-2650l_v3_firmwarexeon_e7-8860_v4_firmwarexeon_e5-4650_v2xeon_e5-2697_v3xeon_e5-4603_v2xeon_e5-4627_v4xeon_e5-4620_v2_firmwarexeon_e5-4669_v4xeon_e5-2660xeon_e5-2620_v3_firmwarexeon_e5-2660_v4xeon_e7-4830_v4xeon_e7-4809_v26130t_firmwarexeon_e5-2603_firmwarexeon_e5-2609_firmwarexeon_e5-2640_v4xeon_e7-8893_v4xeon_e5-2650_v4_firmwarexeon_e5-1660_v2xeon_e5-2690_v2_firmwarexeon_e5-2430lxeon_e5-1650_v33106_firmwarexeon_e5-4620_v3_firmware6130xeon_e5-4617xeon_e5-2630_v2xeon_e5-2687w_v4xeon_e5-2630_v4_firmwarexeon_e7-8891_v3xeon_e5-2690xeon_e5-2640_v3_firmwarexeon_e5-4607_v2xeon_e5-2695_v2_firmwarexeon_e5-4620_v3xeon_e5-4667_v3_firmwarexeon_e5-2665_firmwarexeon_e5-2640_firmwarexeon_e5-4667_v4_firmwarexeon_e5-4607xeon_e5-2699a_v4_firmwarexeon_e7-4820_v4xeon_e5-2603_v4_firmwarexeon_e5-2650_v2_firmwarexeon_e5-2695_v3xeon_e5-4620xeon_e5-2658_v2_firmwarexeon_e5-4660_v4_firmwarexeon_e5-2403_v2xeon_e5-2428l_v34109t_firmwarexeon_e5-2667_v3_firmwarexeon_e5-4648_v3xeon_e7-4809_v46126xeon_e5-2438l_v3_firmwarexeon_e5-2603_v2_firmwarexeon_e5-1660_v3xeon_e5-2690_firmwarexeon_e5-2630l_v4_firmwarexeon_e5-4657l_v2_firmwarexeon_e5-2640_v2xeon_e5-2407_v2_firmwarexeon_e5-2618l_v3_firmwarexeon_e5-2618l_v4xeon_e7-8891_v4_firmwarexeon_e5-2623_v3xeon_e7-4830_v4_firmware4114t_firmware6126txeon_e5-2658a_v3xeon_e5-2418l_v3xeon_e5-2440_firmwarexeon_e5-2623_v3_firmwarexeon_e5-2650l_v4_firmwarexeon_e7-8857_v2xeon_e5-2680_v2_firmwarexeon_e7-2890_v2xeon_e5-2450_firmwarexeon_e5-2430_firmwarexeon_e7-8894_v4_firmwarexeon_e5-2648l_v2_firmwarexeon_e5-4610_v2xeon_e7-4820_v2xeon_e5-2660_v4_firmwarexeon_e5-4650_v3_firmwarexeon_e5-2650_v4xeon_e7-8867_v3xeon_e7-8880_v2_firmwarexeon_e5-2450l_v2xeon_e5-2660_firmwarexeon_e5-2403xeon_e5-4610_v4_firmwarexeon_e5-2695_v4xeon_e5-4624l_v2xeon_e5-2418l_firmwarexeon_e5-2620_v2xeon_e5-4640_v3_firmwarexeon_e5-2680_v4_firmwarexeon_e5-1428l_v2_firmwarexeon_e5-1630_v4_firmwarexeon_e5-2650_firmwarexeon_e5-2428l_firmwarexeon_e7-8890_v25118xeon_e5-2450xeon_e5-4603_v2_firmwarexeon_e5-2640_v2_firmwarexeon_e5-2603_v4xeon_e5-2630_firmware5118_firmwarexeon_e5-2643_v2xeon_e5-2695_v3_firmwarexeon_e5-2620_v3xeon_e5-1660_v4_firmwarexeon_e5-4628l_v4xeon_e5-2630l_v2_firmwarexeon_e5-2670_v3xeon_e7-2880_v2_firmwarexeon_e5-4640_v4_firmwarexeon_e5-2418l_v2xeon_e7-8860_v4xeon_e5-2650l_v2xeon_e5-2648l_v3xeon_e5-2680_v3_firmwarexeon_e5-1680_v4_firmwarexeon_e5-2609_v3xeon_e5-2430l_v2_firmwarexeon_e5-2438l_v3xeon_e5-4603_firmwarexeon_e5-1660xeon_e7-4880_v2xeon_e5-2430_v2_firmwarexeon_e7-8867_v4_firmwarexeon_e5-2450_v2_firmwarexeon_e5-2680xeon_e7-4850_v2_firmwarexeon_e5-2418lxeon_e5-2440_v2_firmware4116xeon_e7-8890_v3xeon_e5-2660_v2_firmwarexeon_e5-2650_v3xeon_e5-2623_v4_firmwarexeon_e5-1650_v4_firmwarexeon_e5-2648l_v4xeon_e5-4620_v4xeon_e5-1428l_firmwarexeon_e5-2683_v3_firmwarexeon_e7-8880_v4_firmwarexeon_e5-2630l_v2xeon_e5-2697_v2_firmwarexeon_e5-2667_v2xeon_e5-2618l_v2xeon_e7-4890_v24109txeon_e5-2630_v3_firmwarexeon_e7-4830_v2_firmwarexeon_e5-2637_v3_firmwarexeon_e5-2658_firmwarexeon_e5-2428l_v2_firmwarexeon_e5-2628l_v3xeon_e5-4640_v3xeon_e5-4650_v4_firmwarexeon_e5-2448l_v2xeon_e5-2648l_v4_firmwarexeon_e5-2430xeon_e5-4669_v3xeon_e7-8893_v2_firmwarexeon_e5-1660_v2_firmwarexeon_e5-1620xeon_e5-4620_firmwarexeon_e5-4627_v3xeon_e7-2890_v2_firmwarexeon_e7-4850_v4xeon_e5-2609xeon_e5-1428l_v34114txeon_e7-2870_v2_firmware5119t_firmwarexeon_e7-4880_v2_firmwarexeon_e5-2650l_firmwarexeon_e5-2670_v2_firmwarexeon_e7-8860_v3_firmwarexeon_e5-4610xeon_e5-2628l_v3_firmwarexeon_e5-2650l_v3xeon_e5-2687w_v3_firmwarexeon_e5-4627_v2xeon_e7-2880_v2Partial Information Disclosure Advisory
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-0568
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.11% / 30.61%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 16:58
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in the Intel(R) Driver and Support Assistant before version 20.1.5 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-driver_\&_support_assistantIntel(R) Driver and Support Assistant
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-0554
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7||HIGH
EPSS-1.39% / 79.54%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:28
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-ac_9461_firmwareac_9462_firmwarewindows_8.1ac_3165_firmwareac_9560_firmwareax200_firmwareac_8265_firmwareac_7265_firmwareac_3168_firmwarewindows_7ax201_firmwareac_9260_firmwarewindows_10ac_8260_firmwareIntel(R) Wireless Bluetooth(R) Advisory
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-34438
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.99%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-02 Aug, 2024 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7i5bnknuc_board_nuc7i3bnhx1nuc_kit_nuc7i5bnkp_firmwarenuc_kit_nuc7i3bnhx1_firmwarenuc_rugged_kit_nuc8cchbnnuc_board_nuc7i5bnk_firmwarenuc_mini_pc_nuc7i5bnkpnuc_rugged_kit_nuc8cchkrnuc_mini_pc_nuc7i5bnh_firmwarenuc_enthusiast_nuc7i3bnhx1nuc_kit_nuc7i5bnbnuc_kit_nuc7i3bnhxfnuc_kit_nuc7i5bnhnuc_board_nuc7i3bnk_firmwarenuc_mini_pc_nuc7i7bnh_firmwarenuc_enthusiast_nuc7i5bnhxf_firmwarenuc_board_nuc7i5bnbnuc_kit_nuc7i3bnknuc_board_nuc7i3bnb_firmwarenuc_enthusiast_nuc7i5bnkpnuc_board_nuc7i5bnhnuc_enthusiast_nuc7i5bnkp_firmwarenuc_board_nuc7i7bnkq_firmwarenuc_enthusiast_nuc7i7bnh_firmwarenuc_kit_nuc7i7bnhnuc_board_nuc7i5bnh_firmwarenuc_kit_nuc7i3bnh_firmwarenuc_kit_nuc7i3bnhx1nuc_board_nuc7i5bnhx1_firmwarenuc_board_nuc7i7bnhx1nuc_rugged_kit_nuc8cchbn_firmwarenuc_board_nuc7i7bnb_firmwarenuc_board_nuc7i7bnhxg_firmwarenuc_mini_pc_nuc7i7bnkq_firmwarenuc_kit_nuc7i5bnh_firmwarenuc_enthusiast_nuc7i5bnh_firmwarenuc_board_nuc7i7bnhx1_firmwarenuc_mini_pc_nuc7i5bnbnuc_mini_pc_nuc7i7bnbnuc_enthusiast_nuc7i3bnhxf_firmwarenuc_kit_nuc7i5bnhxfnuc_rugged_kit_nuc8cchkr_firmwarenuc_enthusiast_nuc7i3bnh_firmwarenuc_mini_pc_nuc7i5bnhcompute_element_stk2mv64ccnuc_kit_nuc6cayh_firmwarenuc_kit_nuc7i7bnhxgnuc_board_nuc7i3bnhxfnuc_kit_nuc7i5bnhx1_firmwarenuc_board_nuc7i5bnhxfnuc_kit_nuc7i3bnk_firmwarenuc_kit_nuc7i7bnhx1nuc_enthusiast_nuc7i3bnhnuc_mini_pc_nuc7i3bnhnuc_enthusiast_nuc7i7bnbnuc_board_nuc7i5bnkp_firmwarenuc_enthusiast_nuc7i7bnhx1nuc_kit_nuc6cays_firmwarenuc_kit_nuc7i7bnkqnuc_mini_pc_nuc7i3bnk_firmwarenuc_kit_nuc7i7bnbnuc_kit_nuc7i5bnkpnuc_board_nuc7i7bnhnuc_kit_nuc7i3bnbnuc_mini_pc_nuc7i3bnbnuc_enthusiast_nuc7i3bnb_firmwarenuc_mini_pc_nuc7i7bnkqnuc_enthusiast_nuc7i7bnb_firmwarenuc_enthusiast_nuc7i7bnkqnuc_mini_pc_nuc7i5bnhxfnuc_kit_nuc7i3bnhxf_firmwarenuc_rugged_kit_nuc8cchkrnnuc_enthusiast_nuc7i5bnk_firmwarenuc_board_nuc7i3bnhnuc_enthusiast_nuc7i3bnbnuc_enthusiast_nuc7i7bnhxgnuc_enthusiast_nuc7i5bnhxfnuc_board_nuc7i3bnhx1_firmwarenuc_enthusiast_nuc7i7bnhxg_firmwarenuc_mini_pc_nuc7i3bnhxf_firmwarenuc_enthusiast_nuc7i5bnhx1nuc_mini_pc_nuc7i7bnhxgnuc_kit_nuc7i5bnhx1nuc_mini_pc_nuc7i3bnh_firmwarenuc_enthusiast_nuc7i5bnbnuc_board_nuc7i5bnkpnuc_enthusiast_nuc7i5bnb_firmwarecompute_element_stk2mv64cc_firmwarenuc_mini_pc_nuc7i3bnhx1nuc_board_nuc7i3bnh_firmwarenuc_kit_nuc7i3bnb_firmwarenuc_kit_nuc7i7bnb_firmwarenuc_board_nuc7i3bnhxf_firmwarenuc_mini_pc_nuc7i7bnhxg_firmwarenuc_mini_pc_nuc7i3bnhx1_firmwarenuc_enthusiast_nuc7i3bnk_firmwarenuc_mini_pc_nuc7i5bnhxf_firmwarenuc_enthusiast_nuc7i5bnhx1_firmwarenuc_kit_nuc6caysnuc_mini_pc_nuc7i5bnknuc_enthusiast_nuc7i5bnknuc_kit_nuc7i7bnh_firmwarenuc_mini_pc_nuc7i5bnhx1_firmwarenuc_mini_pc_nuc7i7bnb_firmwarenuc_mini_pc_nuc7i5bnkp_firmwarenuc_rugged_kit_nuc8cchbnuc_kit_nuc6cayhnuc_enthusiast_nuc7i3bnknuc_board_nuc7i3bnbnuc_board_nuc7i7bnhxgnuc_kit_nuc7i7bnhxg_firmwarenuc_board_nuc7i3bnknuc_kit_nuc7i5bnhxf_firmwarenuc_mini_pc_nuc7i7bnhx1nuc_kit_nuc7i5bnk_firmwarenuc_mini_pc_nuc7i5bnhx1nuc_mini_pc_nuc7i7bnhnuc_enthusiast_nuc7i5bnhnuc_enthusiast_nuc7i3bnhxfnuc_enthusiast_nuc7i7bnhx1_firmwarenuc_kit_nuc7i7bnhx1_firmwarenuc_enthusiast_nuc7i7bnkq_firmwarenuc_enthusiast_nuc7i3bnhx1_firmwarenuc_rugged_kit_nuc8cchb_firmwarenuc_board_nuc7i7bnkqnuc_board_nuc7i7bnh_firmwarenuc_mini_pc_nuc7i3bnb_firmwarenuc_board_nuc7i5bnhx1nuc_kit_nuc7i7bnkq_firmwarenuc_mini_pc_nuc7i7bnhx1_firmwarenuc_board_nuc7i5bnhxf_firmwarenuc_board_nuc7i5bnb_firmwarenuc_mini_pc_nuc7i3bnhxfnuc_enthusiast_nuc7i7bnhnuc_rugged_kit_nuc8cchkrn_firmwarenuc_mini_pc_nuc7i5bnb_firmwarenuc_mini_pc_nuc7i5bnk_firmwarenuc_mini_pc_nuc7i3bnknuc_board_nuc7i5bnknuc_kit_nuc7i5bnb_firmwarenuc_kit_nuc7i3bnhnuc_board_nuc7i7bnbIntel(R) NUC BIOS firmware
CWE ID-CWE-421
Race Condition During Access to Alternate Channel
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-39735
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.36%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:04
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gasket_alloc_coherent_memory of gasket_page_table.c, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151455484References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-39712
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.02%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:03
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TBD of TBD, there is a possible user after free vulnerability due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176918884References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-39642
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.02%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:06
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In synchronous_process_io_entries of lwis_ioctl.c, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195731663References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-30313
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.32%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free condition can occur in wired connectivity due to a race condition while creating and deleting folders in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca8337ar9380ipq8173_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qcn5064csra6620_firmwareqcs605_firmwarecsra6640_firmwareqca9987_firmwarewcn3998wcn3950qcn6024_firmwareipq8076asd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwareqca6438_firmwareqca9986ipq8070_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405wcd9340sd765gqualcomm215_firmwareqca6436wcn6851sa6155pqcs603_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwaresd870_firmwareqca9988_firmwareqcn5154_firmwarewcn3910_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988qca6438sa8195p_firmwaresm8475qcn5022_firmwarewcn6750_firmwareqca9898ipq4028wcn3610qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwaresda429w_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwareipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwarewcd9380qualcomm215qcn5054_firmwareqcs410qcn5024ipq4019_firmwareqca8072_firmwareqca9985qcn9012_firmwarewcd9335_firmwareqcn5052_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850pmp8074_firmwarewcn3910qca6320qca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwareqcn5550_firmwaresdx55mipq8064_firmwarewcn6740_firmwareqcn5064_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qcn5502qca9994qca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwareqsm8250sa6145pipq6018qca9886_firmwarear8031apq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwaresd780g_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155pcsra6640qca9531_firmwarear8035_firmwareqcm2290qsm8250_firmwareqcn5024_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830qcn9070sa8145p_firmwareqcs2290_firmwareqca9563_firmwarecsra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000wcd9370ipq8072qcn5152_firmwareqca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377ipq5018wcd9385_firmwaresdxr2_5g_firmwareqca9563ipq8074asd662qcn5124_firmwaresa8155qca6320_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresd778gsa6155p_firmwaresm6225ipq8174qca9990qcs6490sdxr2_5gqcn5052wcn3988_firmwareqcn9074sd205sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca6390qca9898_firmwarewcd9375ar8035csr8811ipq4019qcn9100_firmwaresda429wsd210wcn3620_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwarewcn3620qca6564aqca9988qca8072qcm2290_firmwarewcn3990qcn9000sd780gsd865_5gar9380_firmwareqcn9012sd888qca9558_firmwareqcn6122_firmwareipq8065_firmwarewsa8835sd665_firmwaresd888_5gqcn5154qca8075_firmwareipq4018qca6574awcn6855_firmwareqca9889qca6174asm7325pqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886qcn5502_firmwaresm7325p_firmwaresd665ipq8076sd765qca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresm7315sd460qca6391qcn9100sdx65_firmwareqcm4290qcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122sd205_firmwarewcd9341_firmwarewsa8810mdm9150wcn6856qcn5022sd768gipq6010_firmwarewcn6740qca6696sa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresdx12ipq8071_firmwareqcs410_firmwareqcn9074_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-1958
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 9.84%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:35
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition in fastrpc kernel driver for dynamic process creation can lead to use after free scenario in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991sda429w_firmwarewcd9380_firmwaresa6150p_firmwarewsa8830sa8145p_firmwaresd780gqca6595wcn6856_firmwarewsa8835wcd9380sa8150p_firmwaresd888_5gqca6595au_firmwarewcd9370qca6574awcn6855_firmwaresm7325wcn3980wcn6750wcd9385_firmwarewcn3660bwcn6850wcn3660b_firmwaresa8155qca6574a_firmwareqca6574au_firmwareqca6595auwcd9375_firmwarewcn3980_firmwarewcn3610_firmwarewcn6740_firmwaresd778gsa6155p_firmwaresd480_firmwaresa8155_firmwarewcn6851_firmwarewcn3988_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresd778g_firmwaresa8195pwcd9341_firmwaresd480wcn6855wcn6851sa6155pwcn6856sa6145pwcd9385wcd9341qca6696_firmwareqca6595_firmwaresa8145pwcn6740qca6696wcd9375sd780g_firmwarewcd9370_firmwaresa8150psa6150psa8155pwsa8830_firmwaresda429wwcn3620_firmwarewcn3988sd888_5g_firmwarewsa8835_firmwarewcn3620wcn6850_firmwaresa8195p_firmwarewcn6750_firmwarewcn3610sm7325_firmwareSnapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-0387
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.98%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 16:12
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FindQuotaDeviceForUuid of QuotaUtils.cpp, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-169421939

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-0367
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 6.53%
||
7 Day CHG~0.00%
Published-26 Feb, 2021 | 20:19
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vpu, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05371580; Issue ID: ALPS05379085.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-0366
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 6.53%
||
7 Day CHG~0.00%
Published-26 Feb, 2021 | 20:19
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vpu, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05371580; Issue ID: ALPS05379093.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-0401
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 5.38%
||
7 Day CHG~0.00%
Published-26 Feb, 2021 | 20:19
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vow, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05418265.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-2189
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.90%
||
7 Day CHG~0.00%
Published-27 Sep, 2019 | 18:21
Updated-04 Aug, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Easel driver, there is possible memory corruption due to race conditions. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112312381

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-2188
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.90%
||
7 Day CHG~0.00%
Published-27 Sep, 2019 | 18:21
Updated-04 Aug, 2024 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Easel driver, there is possible memory corruption due to race conditions. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112309571

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-48420
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.40%
||
7 Day CHG~0.00%
Published-08 Dec, 2023 | 15:45
Updated-28 Aug, 2024 | 15:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-20835
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 2.40%
||
7 Day CHG~0.00%
Published-04 Sep, 2023 | 02:27
Updated-21 Oct, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In camsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07341261; Issue ID: ALPS07326570.

Action-Not Available
Vendor-Google LLCMediaTek Inc.The Linux Foundation
Product-mt6895mt8188androidmt8395mt6983iot_yoctoyoctomt8781mt8195MT6895, MT6983, MT8188, MT8195, MT8395, MT8781mt8781
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-20686
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.50%
||
7 Day CHG~0.00%
Published-06 Apr, 2023 | 00:00
Updated-12 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display drm, there is a possible double free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07570826; Issue ID: ALPS07570826.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-androidmt6983mt6895mt8781mt6879MT6879, MT6895, MT6983, MT8781
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-20834
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 2.40%
||
7 Day CHG~0.00%
Published-04 Sep, 2023 | 02:27
Updated-21 Oct, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In pda, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07608514; Issue ID: ALPS07608514.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6895mt6985mt8175mt8188androidmt6886mt6983mt8195mt8365mt8781mt6879MT6879, MT6886, MT6895, MT6983, MT6985, MT8175, MT8188, MT8195, MT8365, MT8781mt8781
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-20827
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 2.07%
||
7 Day CHG~0.00%
Published-04 Sep, 2023 | 02:27
Updated-10 Oct, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6855mt6879mt6873mt6893mt6886mt8791tmt6983mt6891mt6883mt6853tmt6835mt6769mt6761mt6875mt6889mt8797mt6768mt6985mt6771mt6833mt6885mt8673mt6877mt6762mt6781mt6853mt6895mt6789androidmt6779mt6785mt6763MT6761, MT6762, MT6763, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8673, MT8791T, MT8797mt6855mt6873mt6893mt6763mt6886mt8791tmt6983mt6891mt6883mt6853tmt6835mt6769mt6761mt6875mt6889mt8797mt6768mt6985mt6771mt6833mt6885mt8673mt6877mt6762mt6781mt6853mt6895mt6789androidmt6779mt6785mt6879
CWE ID-CWE-1298
Hardware Logic Contains Race Conditions
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-20801
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 2.60%
||
7 Day CHG~0.00%
Published-07 Aug, 2023 | 03:21
Updated-07 Nov, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In imgsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420968.

Action-Not Available
Vendor-Google LLCMediaTek Inc.The Linux Foundation
Product-mt6895mt8188androidmt8395mt6983yoctomt8195mt8781mt6879MT6879, MT6895, MT6983, MT8188, MT8195, MT8395, MT8781mt6879mt6895mt8188mt8395mt6983mt8781mt8195
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-20687
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 0.50%
||
7 Day CHG~0.00%
Published-06 Apr, 2023 | 00:00
Updated-12 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display drm, there is a possible double free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07570772; Issue ID: ALPS07570772.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-androidmt6983mt6895mt8781mt6879MT6879, MT6895, MT6983, MT8781
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-20771
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 2.24%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 01:44
Updated-04 Dec, 2024 | 21:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07671046; Issue ID: ALPS07671046.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt8168mt6771androidmt6739mt6580mt6761mt6768mt6779mt6785mt8781mt6765MT6580, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6785, MT8168, MT8781
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-42831
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 13.46%
||
7 Day CHG~0.00%
Published-01 Nov, 2022 | 00:00
Updated-21 Apr, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosmacosiphone_osmacOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-42832
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 13.46%
||
7 Day CHG~0.00%
Published-01 Nov, 2022 | 00:00
Updated-21 Apr, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosmacosiphone_osmacOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-32612
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 3.97%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vcu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07203500; Issue ID: ALPS07203500.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6789mt6769mt6833mt6875mt6762mt6853mt6889mt6891mt6877androidmt8789mt8768mt8365mt6853tmt6781mt6883mt8185mt6855mt8791mt6785mt8797mt8798mt6873mt6779mt6893mt8168mt6768mt6879mt6895mt6983mt8696mt8786mt6885MT6762, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8185, MT8365, MT8696, MT8768, MT8786, MT8789, MT8791, MT8797, MT8798
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-41086
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 13.16%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 00:00
Updated-02 Jan, 2025 | 21:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Group Policy Elevation of Privilege Vulnerability

Windows Group Policy Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_7windows_11windows_10windows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows 10 Version 1607Windows 11 version 22H2Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows 7Windows Server 2012 (Server Core installation)Windows 7 Service Pack 1Windows 10 Version 20H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-32613
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 3.57%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vcu, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07206340; Issue ID: ALPS07206340.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6789mt6769mt6833mt6875mt6762mt6853mt6889mt6891mt6877androidmt8789mt8768mt8365mt6853tmt6781mt6883mt8185mt6855mt8791mt6785mt8797mt8798mt6873mt6779mt6893mt8168mt6768mt6879mt6895mt6983mt8696mt8786mt6885MT6762, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8168, MT8185, MT8365, MT8696, MT8768, MT8786, MT8789, MT8791, MT8797, MT8798
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-32621
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 2.02%
||
7 Day CHG~0.00%
Published-05 Dec, 2022 | 00:00
Updated-24 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In isp, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310829; Issue ID: ALPS07310829.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-androidmt6895mt6983MT6895, MT6983
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-20567
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.4||HIGH
EPSS-0.01% / 0.76%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-21 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-20373
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.48%
||
7 Day CHG~0.00%
Published-11 Aug, 2022 | 15:00
Updated-03 Aug, 2024 | 02:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In st21nfc_loc_set_polaritymode of fc/st21nfc.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208269510References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-20091
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.21%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 19:58
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06226345.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6873mt6893mt8765mt6580mt8788mt6983mt8735mt8167mt6765mt6891mt6883mt8696mt6853tmt6739mt8768mt8789mt6769mt6761mt6875mt6889mt8797mt8321mt6768mt8362amt8786mt8766mt6771mt6833mt6885mt6877mt6762mt6781mt8365mt6853mt6895mt8168androidmt8185mt8791mt6779mt8163mt6785mt6731mt8735bmt6879mt8173MT6580, MT6731, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8163, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8696, MT8735, MT8735B, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2022-20148
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 14.59%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 13:18
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-27067
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-15 Dec, 2020 | 16:17
Updated-04 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the l2tp subsystem, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152409173

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-3573
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 6.26%
||
7 Day CHG~0.00%
Published-13 Aug, 2021 | 00:00
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, IncRed Hat, Inc.
Product-enterprise_linuxlinux_kernelfedorakernel
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-11151
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 7.14%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Race condition occurs while calling user space ioctl from two different threads can results to use after free issue in video in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580wsa8830qln5030qbt1500pmi632qpa5581qdm2307qfs2530qpa8802pm6125qat3519qcs4290qet6100pmm855ausdr660gpm8150aqtc800hqdm5670qpa8686pm7150lqpa8821pm7150asmb1396wcd9370qdm5671sdr425qca6426qat3518wcn3998wcn3950qat5516wcn3660bqdm5620sd662pm3003asa8155qdm5652sd6905gqat5533qca6595auqpm5679qbt2000qpm8870pm6150asmb1354qca6584auqdm2305qpm8820pm8150bqsm7250pm8250pmx55qat3522pmr735aqca6421qdm3301sa8195pqpm5677qat5515sd765gqca6436sdr660wcn6851sa6155pqpa6560sdr865wcd9385wcd9341qca6431qln5020sd750gqca6390wcd9375qpa8673sa8150ppm6350pmm8195auqdm2310qdm5621qln4642sda429wqdm5650wcn3988wtr3925wcn3620smb1390pm6150lwcn3610qet6110qln5040qpm8895qpm6585qtc410sqpm5670wcn3991smb1355qln4650qpa8801wgr7640qet5100qca6595qpm8830sdxr25gpm6150qat5522wsa8835pm7250bpm8150cpmr735bqpa8842wcd9380qpa4360qca6574asdr735pm7250smb1395smr525qpa8803smr526wcn3980pmk8003wcn6750pmr525qdm2301qpm4650qtm525wsa8815wcn6850sd665sd765pm640pqat3555pm8009sd460qca6391sdx55mpm8008qsw8574qcm4290pm640aqtc801ssd8655gqca6574auqpm5621qpm6582wsa8810pm8150lqdm2308qat3550qdm5677qdm5679sdr8250sd768gwtr2965qca6696qpa2625pm640lpmk8002sdx55sd675qet4101qat3516sm7250pqpm5658qpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • Next
Details not found