Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-21820

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-13 Nov, 2024 | 20:34
Updated At-14 Nov, 2024 | 19:49
Rejected At-
Credits

Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:13 Nov, 2024 | 20:34
Updated At:14 Nov, 2024 | 19:49
Rejected At:
▼CVE Numbering Authority (CNA)

Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX
Default Status
unaffected
Versions
Affected
  • See references
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-276Incorrect default permissions
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-276
Description: Incorrect default permissions
Metrics
VersionBase scoreBase severityVector
3.17.2HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
4.08.5HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Intel Corporationintel
Product
3rd_generation_intel_xeon_scalable_processor_family
CPEs
  • cpe:2.3:h:intel:3rd_generation_intel_xeon_scalable_processor_family:606a6:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 606A6
Vendor
Intel Corporationintel
Product
4th_generation_intel_xeon_processor_scalable_family
CPEs
  • cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f7:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 806f7
Vendor
Intel Corporationintel
Product
4th_generation_intel_xeon_processor_scalable_family
CPEs
  • cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f8:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 806f8
Vendor
Intel Corporationintel
Product
5th_generation_intel_xeon_processor_scalable_family
CPEs
  • cpe:2.3:h:intel:5th_generation_intel_xeon_processor_scalable_family:c06f2:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • c06f2
Vendor
Intel Corporationintel
Product
xeon_d_processor
CPEs
  • cpe:2.3:h:intel:xeon_d_processor:606c1:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 606C1
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:13 Nov, 2024 | 21:15
Updated At:15 Nov, 2024 | 14:00

Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.5HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.17.2HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
Type: Secondary
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-276Primarysecure@intel.com
CWE ID: CWE-276
Type: Primary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.htmlsecure@intel.com
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
Source: secure@intel.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

96Records found

CVE-2022-33196
Matching Score-10
Assigner-Intel Corporation
ShareView Details
Matching Score-10
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 5.68%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-27 Jan, 2025 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_d-2796texeon_d-1627_firmwarexeon_d-2738xeon_platinum_8362xeon_gold_6338xeon_gold_6338t_firmwarexeon_d-2777nxxeon_d-1527xeon_d-2766ntxeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_platinum_8360hl_firmwarexeon_d-1746ter_firmwarexeon_gold_6354_firmwarexeon_d-2163it_firmwarexeon_gold_6326xeon_d-2776ntxeon_d-1527_firmwarexeon_d-2798ntxeon_d-1733ntxeon_d-1521_firmwarexeon_gold_5317_firmwarexeon_d-1557_firmwarexeon_d-2775te_firmwarexeon_d-2766nt_firmwarexeon_silver_4316xeon_d-1518xeon_gold_5318y_firmwarexeon_d-1714xeon_d-2799_firmwarexeon_d-2745nx_firmwarexeon_d-2143itxeon_gold_6348_firmwarexeon_d-2163itxeon_gold_5318s_firmwarexeon_d-1734nt_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_d-1567_firmwarexeon_d-1567xeon_d-2777nx_firmwarexeon_platinum_8380hxeon_d-2173it_firmwarexeon_platinum_8368q_firmwarexeon_platinum_8376hxeon_d-1746terxeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8362_firmwarexeon_silver_4310t_firmwarexeon_d-1531_firmwarexeon_gold_6314uxeon_d-2123it_firmwarexeon_d-1715terxeon_d-1571xeon_d-1736_firmwarexeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwarexeon_d-2173itxeon_d-2123itxeon_d-2177nt_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_d-2796ntxeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8358p_firmwarexeon_gold_5320xeon_d-2779xeon_platinum_8360yxeon_gold_6330h_firmwarexeon_d-1602xeon_d-1712trxeon_d-1539xeon_d-2796te_firmwarexeon_gold_6338txeon_d-1713ntexeon_d-2752ter_firmwarexeon_gold_5318sxeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_d-2146ntxeon_d-1577_firmwarexeon_platinum_8356h_firmwarexeon_d-2145nt_firmwarexeon_d-1726_firmwarexeon_d-2187ntxeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8358pxeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2776nt_firmwarexeon_d-1732te_firmwarexeon_d-2712t_firmwarexeon_gold_6328h_firmwarexeon_d-1623n_firmwarexeon_d-1548_firmwarexeon_gold_6328hl_firmwarexeon_d-1713nte_firmwarexeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_d-2183itxeon_d-1622xeon_d-1559_firmwarexeon_platinum_8356hxeon_gold_6348h_firmwarexeon_d-2145ntxeon_platinum_8360y_firmwarexeon_d-1529_firmwarexeon_d-1540_firmwarexeon_gold_5318h_firmwarexeon_d-1637_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_gold_5320txeon_gold_6312uxeon_gold_5320h_firmwarexeon_d-2142it_firmwarexeon_d-2143it_firmwarexeon_d-1736xeon_d-1735trxeon_d-1513n_firmwarexeon_d-2795nt_firmwarexeon_d-2752ntexeon_d-1523n_firmwarexeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarexeon_d-2753nt_firmwarexeon_platinum_8358xeon_gold_5315yxeon_platinum_8352s_firmwarexeon_platinum_8354hxeon_silver_4310_firmwarexeon_gold_6338n_firmwarexeon_d-1718txeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_d-1523nxeon_d-2786nte_firmwarexeon_d-2786ntexeon_d-1540xeon_platinum_8368xeon_d-1653nxeon_d-1528xeon_d-1637xeon_d-1577xeon_silver_4310txeon_d-1715ter_firmwarexeon_platinum_8380xeon_d-2141ixeon_d-1541xeon_gold_6314u_firmwarexeon_d-1543n_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_gold_6330n_firmwarexeon_d-1633n_firmwarexeon_platinum_8352vxeon_gold_6336yxeon_d-1722ne_firmwarexeon_d-1747ntexeon_d-2757nx_firmwarexeon_d-1653n_firmwarexeon_d-1734ntxeon_d-1735tr_firmwarexeon_d-1747nte_firmwarexeon_d-1553nxeon_d-1571_firmwarexeon_d-1633nxeon_platinum_8360hlxeon_d-1548xeon_platinum_8380_firmwarexeon_d-1649nxeon_d-1529xeon_gold_6330_firmwarexeon_d-1518_firmwarexeon_gold_5320_firmwarexeon_d-2738_firmwarexeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_d-2757nxxeon_d-1713ntxeon_gold_6354xeon_gold_6336y_firmwarexeon_d-1520xeon_platinum_8354h_firmwarexeon_d-2752terxeon_platinum_8352mxeon_d-2799xeon_d-2146nt_firmwarexeon_d-2795ntxeon_gold_6330hxeon_d-1739_firmwarexeon_d-1736ntxeon_gold_5318hxeon_d-1713nt_firmwarexeon_d-1520_firmwarexeon_platinum_8376hlxeon_silver_4316_firmwarexeon_d-2798nt_firmwarexeon_d-1623nxeon_d-1531xeon_d-1533nxeon_d-1722nexeon_gold_6346xeon_d-2142itxeon_d-1718t_firmwarexeon_d-1622_firmwarexeon_gold_6338nxeon_d-2796nt_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarexeon_d-1702_firmwarexeon_d-1749nt_firmwarexeon_d-2161ixeon_d-2141i_firmwarexeon_gold_6348xeon_gold_6330nxeon_platinum_8368_firmwarexeon_d-2798nxxeon_platinum_8352v_firmwarexeon_d-2745nxxeon_platinum_8368qxeon_gold_5320t_firmwarexeon_d-1748texeon_silver_4310xeon_silver_4314_firmwarexeon_gold_6334xeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1739xeon_d-1543nxeon_d-1528_firmwarexeon_d-1539_firmwarexeon_d-1559xeon_d-1702xeon_d-1521xeon_gold_6342xeon_d-1748te_firmwarexeon_d-1749ntxeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_d-1712tr_firmwarexeon_d-2798nx_firmwarexeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_6328hxeon_d-2183it_firmwarexeon_d-2753ntxeon_gold_6334_firmwarexeon_d-2775texeon_d-1557xeon_d-1714_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_gold_6328hlxeon_d-1726xeon_d-2177ntxeon_d-1553n_firmwareIntel(R) Xeon(R) Processors with Intel® Software Guard Extensions (SGX)
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-24985
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.5||HIGH
EPSS-0.03% / 6.42%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:02
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of resource to wrong sphere in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) processors with Intel(R) ACTM5th_generation_intel_xeon_processor_scalable_family4th_generation_intel_xeon_processor_scalable_family
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2024-22185
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.5||HIGH
EPSS-0.02% / 4.23%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:02
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check Time-of-use Race Condition in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) processors with Intel(R) ACTM5th_generation_intel_xeon_processor_scalable_family4th_generation_intel_xeon_processor_scalable_family
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-27504
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.23%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-02 Aug, 2024 | 12:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in some Intel(R) BIOS Guard firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) BIOS Guard firmwarecomet_laketiger_lakecoffee_lakeamber_lakeice_lakekaby_lakealder_lakerocket_lake
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CVE-2022-37343
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 8.49%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-atom_c3750xeon_d-2796teatom_c3858_firmwareatom_c3338ratom_c3758_firmwarexeon_d-1627_firmwarexeon_d-2738atom_p5322_firmwareatom_c3830_firmwareatom_c3558r_firmwareatom_c3758rxeon_d-2777nxxeon_d-1718txeon_d-1527xeon_d-2766ntatom_c3950_firmwareatom_c3708xeon_d-1523nxeon_d-2786nte_firmwareatom_p5752_firmwarexeon_d-2786ntexeon_d-1540xeon_d-1746ter_firmwareatom_c3336_firmwareatom_c3955_firmwareatom_p5322xeon_d-1653nxeon_d-2163it_firmwarexeon_d-1528atom_p5742xeon_d-2776ntxeon_d-1637xeon_d-2798ntatom_p5362xeon_d-1715ter_firmwarexeon_d-1733ntxeon_d-1577xeon_d-1521_firmwareatom_c3758r_firmwarexeon_d-1527_firmwareatom_p5742_firmwarexeon_d-2775te_firmwarexeon_d-2141ixeon_d-2766nt_firmwarexeon_d-1557_firmwarexeon_d-1541atom_c3708_firmwarexeon_d-1543n_firmwarexeon_d-1518xeon_d-1633n_firmwarexeon_d-1714xeon_d-1722ne_firmwarexeon_d-2799_firmwarexeon_d-2745nx_firmwarexeon_d-1747ntexeon_d-2143itxeon_d-2757nx_firmwarexeon_d-2163itxeon_d-1653n_firmwarexeon_d-1734ntxeon_d-1734nt_firmwarexeon_d-1735tr_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_d-1747nte_firmwarexeon_d-1553natom_c3538xeon_d-1567_firmwareatom_c3808_firmwarexeon_d-1571_firmwareatom_c3955xeon_d-1567xeon_d-2777nx_firmwarexeon_d-1633natom_c3850xeon_d-1548xeon_d-2173it_firmwareatom_p5332xeon_d-1649nxeon_d-1529atom_c3308_firmwarexeon_d-1746teratom_p5731atom_c3436l_firmwarexeon_d-1531_firmwarexeon_d-1518_firmwareatom_c3338r_firmwareatom_c3750_firmwareatom_p5752xeon_d-2123it_firmwareatom_p5332_firmwarexeon_d-2738_firmwareatom_p5721xeon_d-2757nxxeon_d-1713ntxeon_d-1715teratom_c3508xeon_d-1520xeon_d-1571xeon_d-2752terxeon_d-1736_firmwarexeon_d-2799atom_c3338xeon_d-2146nt_firmwareatom_p5352xeon_d-2795ntxeon_d-2173itatom_c3508_firmwarexeon_d-1739_firmwarexeon_d-2123itxeon_d-1736ntxeon_d-2177nt_firmwarexeon_d-1713nt_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_d-1520_firmwarexeon_d-2796ntxeon_d-2798nt_firmwarexeon_d-1623nxeon_d-2779xeon_d-1531xeon_d-1602xeon_d-1712tratom_p5731_firmwarexeon_d-1533nxeon_d-2796te_firmwarexeon_d-1539xeon_d-1722nexeon_d-1713ntexeon_d-2142itxeon_d-1718t_firmwarexeon_d-2752ter_firmwarexeon_d-1622_firmwarexeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_d-2146ntatom_p5342_firmwareatom_c3436lxeon_d-1577_firmwarexeon_d-2796nt_firmwareatom_p5931bxeon_d-2145nt_firmwarexeon_d-1702_firmwarexeon_d-1749nt_firmwareatom_c3538_firmwareatom_p5342atom_c3858xeon_d-2161ixeon_d-2141i_firmwarexeon_d-1726_firmwareatom_c3558_firmwarexeon_d-2187ntatom_p5352_firmwarexeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_d-2798nxatom_c3338_firmwarexeon_d-1732te_firmwarexeon_d-2776nt_firmwarexeon_d-2712t_firmwarexeon_d-2745nxxeon_d-1623n_firmwareatom_p5931b_firmwarexeon_d-1748teatom_c3336atom_c3958xeon_d-1548_firmwareatom_c3850_firmwarexeon_d-1713nte_firmwareatom_c3808xeon_d-2183itxeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1622xeon_d-1739atom_p5962b_firmwarexeon_d-1543nxeon_d-1559_firmwarexeon_d-1528_firmwarexeon_d-1539_firmwarexeon_d-1559xeon_d-1702xeon_d-1521xeon_d-2145ntatom_c3950xeon_d-1748te_firmwarexeon_d-1749ntxeon_d-1637_firmwarexeon_d-1529_firmwarexeon_d-1712tr_firmwarexeon_d-1540_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_d-2798nx_firmwareatom_c3558atom_p5362_firmwareatom_p5721_firmwarexeon_d-2142it_firmwarexeon_d-2183it_firmwareatom_c3308xeon_d-2143it_firmwarexeon_d-2753ntxeon_d-1736xeon_d-2775texeon_d-1557atom_p5962bxeon_d-1735trxeon_d-1513n_firmwarexeon_d-1714_firmwarexeon_d-2795nt_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_d-2752ntexeon_d-1523n_firmwarexeon_d-1726xeon_d-2753nt_firmwarexeon_d-2177ntatom_c3758atom_c3958_firmwarexeon_d-1553n_firmwareatom_c3558ratom_c3830Intel(R) Processors
CWE ID-CWE-284
Improper Access Control
CVE-2022-32766
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.22%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_stick_stk2mv64cccompute_stick_stk2mv64cc_firmwareIntel(R) BIOS firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-28402
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.23%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-21 Aug, 2024 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) BIOS Guard firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) BIOS Guard firmwarecomet_lake
CWE ID-CWE-20
Improper Input Validation
CVE-2022-30704
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.04% / 12.63%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_2957uxeon_w-10885m_firmwarexeon_w-1350_firmwarecore_i7-11850he_firmwarexeon_w-3245mcore_i5-12600heceleron_3955u_firmwarecore_i7-1280pcore_i7-11370h_firmwareceleron_g1620_firmwarexeon_e-2378gcore_i7-1068ng7celeron_j1900_firmwarecore_i7-1160g7core_i5-12600tcore_i5-1035g7core_i3-10105f_firmwarepentium_gold_g5420celeron_5305upentium_gold_g6600_firmwarepentium_gold_g5420t_firmwarexeon_e-2314xeon_w-2125core_i7-10870h_firmwareceleron_j1850core_i7-1260upentium_gold_g6400t_firmwarepentium_gold_g5420_firmwarecore_i3-1110g4_firmwarecore_i9-12900te_firmwarecore_i5-11600_firmwarecore_i3-1110g4celeron_g1610t_firmwareceleron_4305uxeon_w7-3455_firmwarecore_i7-1060g7_firmwareceleron_n2815core_i5-12500tcore_i5-12500hl_firmwarecore_i5-10200hceleron_2961yxeon_w-1250p_firmwarecore_i3-10100f_firmwarepentium_gold_g5400tcore_i5-12500hcore_i5-1035g4core_i5-10400hcore_i7-11700core_i3-1220pcore_i7-10700k_firmwareceleron_n5105celeron_4205uceleron_2002e_firmwarexeon_w-2255celeron_n3000_firmwarexeon_w-11555mlecore_i3-10100ycore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i5-1250pe_firmwarecore_i3-12300t_firmwarecore_i9-11900txeon_w3-2435core_i7-1270pcore_i7-10700t_firmwarexeon_w3-2425core_i7-1270p_firmwareceleron_n4500core_i7-1195g7_firmwareceleron_g1830core_i5-11600tcore_i5-1235ul_firmwarexeon_e-2378core_i7-11850hcore_i5-12600hcore_i9-11900core_i7-12800hxcore_i5-12500te_firmwarecore_i5-10600_firmwarexeon_w-2245celeron_n3150core_i7-12700eceleron_n4100celeron_g6900celeron_n5100_firmwarexeon_w-3335_firmwarecore_i3-12100tceleron_n3060core_i5-10400celeron_1020ecore_i5-12600k_firmwarepentium_gold_g6605_firmwarecore_i7-10610u_firmwareceleron_g5920core_i7-10710u_firmwarecore_i5-10500teceleron_1020mxeon_w-1250e_firmwarexeon_w-1250te_firmwarecore_i5-1240pcore_i5-12500pentium_gold_g5620celeron_1020e_firmwarexeon_w-3335core_i7-11850hecore_i5-11600xeon_w-1290tcore_i7-12800hl_firmwarepentium_gold_g7400te_firmwareceleron_n4120xeon_w-11155mre_firmwareceleron_5305u_firmwarepentium_gold_g6505tcore_i9-10980hkpentium_gold_g6405t_firmwareceleron_g1820te_firmwarexeon_w-3345_firmwareceleron_3865u_firmwarepentium_gold_6405u_firmwarecore_i7-12800he_firmwareceleron_g3930tecore_i7-10510ucore_i5-10400t_firmwareceleron_n2840celeron_5205uceleron_3865ucore_i5-1245ulcore_i3-10100eceleron_g4930e_firmwarecore_i7-1060g7xeon_w-2265core_i9-11900hcore_i9-10900celeron_n2930celeron_n2840_firmwarecore_i5-11600k_firmwarexeon_w-10855mxeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarecore_i3-11100hexeon_e-2374g_firmwareceleron_g4900tcore_i7-12700core_i5-1235u_firmwarecore_i3-10100txeon_w-3375_firmwarexeon_w-1390t_firmwareceleron_3855u_firmwarexeon_w-11555mrecore_i7-11700k_firmwarexeon_w3-2423celeron_g3900te_firmwarepentium_gold_g7400ecore_i9-10900kcore_i3-10325_firmwarepentium_gold_g6505t_firmwarexeon_e-2386gceleron_g4932exeon_w3-2425_firmwareceleron_2955upentium_gold_g7400tceleron_5205u_firmwarecore_i5-12600he_firmwarecore_i9-10900fcore_i7-10700te_firmwarecore_i5-11500t_firmwarexeon_w-2223_firmwarecore_i7-1160g7_firmwareceleron_6305e_firmwarecore_i3-10105t_firmwareceleron_g3900_firmwareceleron_g6900t_firmwareceleron_j3060xeon_w9-3495x_firmwareceleron_n3160core_i3-10100tecore_i7-1255ul_firmwareceleron_7305celeron_g6900_firmwarecore_i5-10400_firmwareceleron_g4930core_i3-1115gre_firmwareceleron_n4505_firmwareceleron_2002exeon_w-3265_firmwarecore_i7-10700fcore_i5-12400tcore_i7-1180g7_firmwarecore_i5-12400_firmwarecore_i5-1030g4_firmwarexeon_w-1270te_firmwarecore_i5-1145g7core_i3-1125g4core_i7-1068ng7_firmwarecore_i7-10750hxeon_w-2195celeron_3867uxeon_w-1290p_firmwarexeon_w-3235_firmwarexeon_w-1390core_i3-1000g4xeon_w-3365_firmwarecore_i3-12300_firmwareceleron_6600he_firmwareceleron_j6413_firmwarecore_i3-1220pe_firmwareceleron_g4932e_firmwareceleron_j4105core_i5-12500e_firmwarecore_i5-10400h_firmwarecore_i9-12900h_firmwarexeon_w-2145_firmwarecore_i9-12950hx_firmwarecore_i5-10500_firmwareceleron_j1800pentium_gold_g6505xeon_w-1250pcore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-12650hceleron_j6412_firmwarecore_i3-1215uceleron_g5900t_firmwarexeon_e-2334_firmwarecore_i5-1245ul_firmwarecore_i7-1260u_firmwarecore_i7-1265uecore_i5-10210ycore_i5-1140g7pentium_gold_g6400te_firmwarecore_i5-12500hlcore_i5-10500ecore_i3-1215ul_firmwareceleron_2970mxeon_w-2123xeon_w-3275mceleron_j3355core_i5-10210u_firmwarecore_i7-12700e_firmwarecore_i5-10600txeon_e-2356gcore_i3-10110ycore_i5-10600kfceleron_1005m_firmwarecore_i7-10700ecore_i5-1245ueceleron_j3355ecore_i5-12600hlceleron_g4930eceleron_1047ue_firmwarecore_i7-12650h_firmwarepentium_gold_4410ycore_i5-11600kfcore_i5-10500h_firmwareceleron_j4125_firmwarecore_i7-11700kfpentium_gold_g5500tpentium_gold_g6500t_firmwarecore_i5-12600t_firmwarecore_i7-10870hxeon_w-11555mre_firmwareceleron_3205uxeon_w7-2475x_firmwarepentium_gold_g7400tecore_i5-1245u_firmwarecore_i9-11900_firmwarepentium_gold_g5600t_firmwarecore_i3-12300hl_firmwarecore_i7-1250upentium_gold_6405uceleron_g4920celeron_n3350celeron_3215u_firmwarexeon_w5-3435x_firmwarecore_i5-11500tcore_i7-12700k_firmwarecore_i7-10700kcore_i9-12900k_firmwareceleron_g1820core_i9-12900kceleron_g5925_firmwarecore_i5-1250pecore_i5-10500te_firmwareceleron_n2807core_i7-11700kcore_i5-1130g7_firmwarecore_i3-1215ulcore_i3-12100_firmwareceleron_g3902ecore_i7-10710ucore_i7-10700kfxeon_w-1350p_firmwarecore_i3-11100he_firmwarepentium_gold_7505_firmwarexeon_w-1250texeon_w7-2495x_firmwarecore_i7-1255u_firmwareceleron_g6900tcore_i3-1220peceleron_1047uepentium_gold_8505_firmwarepentium_gold_g6400e_firmwarecore_i7-12800heceleron_n3350_firmwareceleron_1019ycore_i3-10300_firmwareceleron_n2820xeon_w-2133_firmwarecore_i9-11900t_firmwareceleron_n4500_firmwarepentium_gold_g5420tpentium_gold_4415y_firmwarecore_i9-11900fxeon_w-11955m_firmwareceleron_j3355e_firmwarecore_i7-10510y_firmwareceleron_g5900tcore_i5-12600xeon_w-1250_firmwarecore_i3-10100e_firmwarecore_i7-11600hcore_i9-12900f_firmwarecore_i7-11390h_firmwareceleron_n2806core_i9-12900hk_firmwarepentium_gold_g5500xeon_w-3265m_firmwareceleron_3765uxeon_w-11555mle_firmwarexeon_w-11865mle_firmwarecore_i5-1038ng7_firmwareceleron_g5905tceleron_2980u_firmwarexeon_e-2336xeon_e-2388gxeon_w-2225_firmwarecore_i3-10105xeon_w9-3475x_firmwarepentium_gold_g6405_firmwarecore_i3-10100te_firmwarecore_i5-12400fpentium_gold_6500y_firmwarepentium_gold_g6500_firmwareceleron_g1630_firmwarecore_i3-1120g4_firmwarecore_i9-12900e_firmwarecore_i9-10900k_firmwarexeon_w-1270_firmwarexeon_w-2155celeron_g1840_firmwarexeon_w7-2475xcore_i7-1280p_firmwareceleron_n3010xeon_w-2135core_i7-1185g7_firmwareceleron_j4025xeon_w-2145core_i5-12600h_firmwarecore_i5-11320hcore_i5-1235ulpentium_gold_4425ycore_i3-10300t_firmwareceleron_3205u_firmwarecore_i7-11375h_firmwarepentium_gold_g6500xeon_w-3323_firmwarecore_i9-10900_firmwarecore_i7-10610ucore_i5-10505_firmwarecore_i7-12850hx_firmwarecore_i5-1035g1_firmwareceleron_g6900teceleron_g1620core_i3-12300tcore_i9-12900t_firmwareceleron_g3900e_firmwarexeon_w-2295_firmwarecore_i9-12900kfceleron_n3160_firmwareceleron_1037u_firmwarecore_i5-11260hceleron_3755uxeon_w-1390pcore_i3-12100f_firmwarecore_i5-10300h_firmwarecore_i7-11850h_firmwareceleron_n2820_firmwarecore_i9-12900teceleron_n6211core_i7-12700kf_firmwarecore_i9-11900f_firmwarecore_i5-11300h_firmwarecore_i5-10200h_firmwareceleron_1007u_firmwareceleron_2955u_firmwareceleron_2980uceleron_n6210_firmwarecore_i7-11700t_firmwareceleron_n6211_firmwareceleron_n3010_firmwareceleron_n3060_firmwareceleron_3955ucore_i5-12600kf_firmwareceleron_n4000celeron_n2830core_i5-1145g7e_firmwareceleron_7300core_i7-1185gre_firmwarecore_i3-12100te_firmwarepentium_gold_g6400_firmwarecore_i7-12800hcore_i3-10300tceleron_n3450celeron_n5100core_i5-11500core_i5-1135g7celeron_n2805_firmwarexeon_w-1290teceleron_g3930_firmwarecore_i7-1265ue_firmwarexeon_w-3223celeron_j6412xeon_w-3275m_firmwarepentium_gold_g6600celeron_n2810xeon_w-3323xeon_w-3175xxeon_w5-2465xxeon_w-2235_firmwareceleron_g1610tceleron_n2808_firmwarecore_i7-1260p_firmwarecore_i7-10700kf_firmwarexeon_w5-2445pentium_gold_g6605xeon_w-3235xeon_e-2336_firmwareceleron_g5925pentium_gold_g5400t_firmwarecore_i7-12700f_firmwarepentium_gold_4410y_firmwarepentium_gold_g6405xeon_w-2225xeon_w-2133celeron_g3920_firmwarecore_i3-10305tcore_i7-10700_firmwarecore_i9-12900hxpentium_gold_g7400t_firmwarecore_i5-1250pcore_i7-12700h_firmwarepentium_gold_g5500_firmwarepentium_gold_g5600celeron_j4125core_i5-1145gre_firmwarexeon_w-2223core_i3-1215ue_firmwareceleron_g4950_firmwareceleron_j1750celeron_n2940_firmwareceleron_7305lxeon_w7-3465xcore_i5-12450h_firmwarecore_i7-11700fcore_i7-12650hxxeon_w-3225pentium_gold_g5620_firmwarecore_i7-12700hcore_i5-12500t_firmwarexeon_w-1370core_i7-10850hcore_i3-1210ucore_i7-1185grecore_i3-1125g4_firmwarecore_i7-11375hpentium_gold_4415u_firmwareceleron_g1820t_firmwarecore_i7-11800h_firmwarecore_i5-12600hx_firmwareceleron_g5905celeron_n6210core_i5-10400fceleron_g3950celeron_2981uxeon_w-2155_firmwarexeon_w-1290te_firmwarecore_i5-1245ue_firmwarecore_i9-10900te_firmwarecore_i3-10300pentium_gold_8500core_i7-10700tcore_i5-1140g7_firmwareceleron_7305l_firmwareceleron_n2930_firmwarexeon_w7-3465x_firmwarexeon_w-3225_firmwarecore_i5-10210upentium_gold_g5500t_firmwarexeon_w-2295core_i5-12450hpentium_gold_5405u_firmwarexeon_w7-2495xcore_i5-1240u_firmwarexeon_w-3245m_firmwarecore_i5-12500h_firmwarecore_i5-12500tecore_i7-1260pxeon_w-3175x_firmwarecore_i9-11900kf_firmwarecore_i5-1155g7_firmwarepentium_gold_g6405tceleron_n2940celeron_n2830_firmwarecore_i7-10510u_firmwareceleron_j3455celeron_g1610_firmwareceleron_3867u_firmwarecore_i3-10100_firmwareceleron_2000ecore_i5-10505core_i5-1030g7celeron_n2807_firmwarexeon_w-1390tpentium_gold_g7400e_firmwarexeon_w-1270core_i5-10310y_firmwarepentium_gold_4417ucore_i7-12700hlcore_i3-1000g1core_i7-10510ycore_i7-1185g7e_firmwarecore_i7-12700kceleron_g1820_firmwareceleron_g1620t_firmwarecore_i5-10600kf_firmwarecore_i3-10110ucore_i9-12900fceleron_j3160core_i7-11800hxeon_w-2275_firmwareceleron_n3150_firmwarecore_i7-1255ulceleron_1000m_firmwarecore_i5-12400celeron_g3900core_i3-10305t_firmwarecore_i5-10310u_firmwareceleron_g5905t_firmwarexeon_w-1270tecore_i3-12300hlceleron_7305e_firmwareceleron_n5105_firmwarecore_i9-10900f_firmwarecore_i7-1270pecore_i5-1155g7core_i9-12900ecore_i9-12900hkcore_i3-10105fceleron_g4900t_firmwarexeon_w5-3425core_i5-11320h_firmwarecore_i9-12900_firmwarepentium_gold_4415ycore_i3-1220p_firmwareceleron_3215ucore_i9-11950hceleron_g5900celeron_g5900texeon_e-2386g_firmwareceleron_1005mcore_i5-10300hxeon_w-11865mleceleron_n3050_firmwarecore_i3-1005g1_firmwareceleron_n4000_firmwareceleron_2950m_firmwarexeon_w-3223_firmwarecore_i7-11700tceleron_g1830_firmwareceleron_j3455_firmwareceleron_g3930core_i3-12300he_firmwarexeon_w-11855mceleron_g3930t_firmwarecore_i3-10100y_firmwareceleron_1017u_firmwarexeon_w-3265mceleron_3965y_firmwarecore_i5-11400h_firmwareceleron_n2806_firmwarecore_i7-12700hl_firmwarecore_i9-12900hx_firmwarexeon_w-2255_firmwareceleron_n2910celeron_g5900eceleron_j1800_firmwarepentium_gold_g7400_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kcore_i3-12100e_firmwareceleron_g1820tceleron_g3930ecore_i9-10900ecore_i9-10850kpentium_gold_8505pentium_gold_g5600_firmwareceleron_g5905_firmwarexeon_e-2314_firmwarecore_i7-12700tepentium_gold_g6400tceleron_1019y_firmwarexeon_w-2123_firmwarepentium_gold_g5600tceleron_g3930tcore_i7-12800hx_firmwarecore_i3-12100fcore_i7-10700xeon_w-1270pcore_i7-11600h_firmwarexeon_w5-2455xceleron_j4105_firmwarexeon_w-1290_firmwarecore_i7-10750h_firmwarexeon_e-2334xeon_w-1290e_firmwarecore_i5-1240p_firmwareceleron_g4920_firmwarecore_i3-10105tcore_i9-10885hcore_i5-11400tceleron_3965uxeon_w9-3495xcore_i5-11300hxeon_w-1250ecore_i9-11900kfcore_i3-10325celeron_g1840t_firmwarecore_i9-12950hxxeon_w-3375celeron_g1840core_i3-12300hecore_i3-12100ecore_i9-12900kscore_i5-12500exeon_w-3365core_i7-10875hceleron_n3350e_firmwareceleron_1037upentium_gold_g5400_firmwarecore_i7-12700te_firmwareceleron_4305ue_firmwarecore_i9-12900txeon_e-2324gcore_i9-11900k_firmwareceleron_g1630celeron_6305_firmwarecore_i3-10100celeron_j4025_firmwarecore_i5-1035g7_firmwarexeon_w7-3445_firmwarecore_i7-10700f_firmwareceleron_j1900pentium_gold_4417u_firmwareceleron_6305celeron_n4505core_i3-12100celeron_g4930_firmwareceleron_g1610core_i3-10305_firmwarecore_i7-12700fcore_i3-1210u_firmwareceleron_g4930t_firmwarecore_i9-12900xeon_w5-3425_firmwarecore_i5-11400fceleron_n2810_firmwarecore_i5-11500_firmwarecore_i9-10900e_firmwarecore_i5-1145grecore_i7-1180g7celeron_2970m_firmwarexeon_e-2378g_firmwarecore_i3-1215ueceleron_6600hecore_i7-12700t_firmwarexeon_w-1390_firmwarexeon_w-11865mreceleron_j1850_firmwarepentium_gold_g7400core_i9-11950h_firmwarepentium_gold_4415ucore_i5-1035g1celeron_2961y_firmwarecore_i5-1038ng7core_i5-11260h_firmwarexeon_w-3265pentium_gold_4425y_firmwareceleron_7305_firmwarexeon_w-3245core_i5-11400f_firmwarecore_i7-10700e_firmwarecore_i9-12900kf_firmwareceleron_g1850_firmwarecore_i5-1035g4_firmwarecore_i3-10110y_firmwareceleron_n2920_firmwarecore_i7-1185g7core_i7-1195g7core_i7-12800hlcore_i7-12700_firmwarecore_i7-1165g7core_i5-1250p_firmwareceleron_n3050core_i5-11600kcore_i7-11390hcore_i9-11900h_firmwarecore_i5-12400f_firmwarecore_i5-1030g4pentium_gold_8500_firmwarexeon_w3-2435_firmwarecore_i7-10700teceleron_n3000core_i3-12100t_firmwarecore_i5-10500core_i7-11700_firmwareceleron_g3930e_firmwareceleron_3965u_firmwarexeon_e-2356g_firmwarecore_i7-1265ulceleron_n4100_firmwarecore_i5-10500e_firmwareceleron_1007uxeon_w-1250celeron_g3900tcore_i5-11500he_firmwarexeon_w-1270p_firmwarecore_i7-1265uxeon_w-2195_firmwareceleron_2981u_firmwarexeon_w5-3435xcore_i5-1145g7_firmwareceleron_g3920xeon_w7-3455core_i5-10600t_firmwarexeon_w-1290ecore_i5-10210y_firmwareceleron_g1850pentium_gold_g6505_firmwarecore_i5-11400hcore_i7-1250u_firmwarexeon_w-2265_firmwarexeon_w-3275core_i3-10305core_i3-1000g4_firmwareceleron_g5900_firmwareceleron_g5920_firmwarexeon_w-1270ecore_i5-12600hl_firmwarexeon_w-1370p_firmwarecore_i5-11400_firmwarecore_i9-12900ks_firmwarecore_i5-1230u_firmwareceleron_g1840txeon_w5-2465x_firmwarecore_i7-1255uceleron_n3450_firmwarecore_i3-1215u_firmwarexeon_w-1290t_firmwareceleron_n2805xeon_w-3245_firmwarecore_i9-11980hkceleron_1017ucore_i5-10600kceleron_j1750_firmwareceleron_4305uexeon_e-2388g_firmwarexeon_w-1370pcore_i7-1165g7_firmwarexeon_w-2135_firmwarecore_i9-10900kfxeon_w-11155mrexeon_w-2235celeron_g3902e_firmwareceleron_n4120_firmwarecore_i3-1115g4e_firmwarecore_i5-1130g7celeron_n3350ecore_i5-12400t_firmwarecore_i3-1120g4core_i3-1000g1_firmwarecore_i5-10600k_firmwareceleron_4205u_firmwarecore_i5-10310yceleron_1020m_firmwarexeon_w-1290pceleron_4305u_firmwarecore_i5-1245uxeon_w-2125_firmwarecore_i7-12700txeon_w-11155mlecore_i5-10500hxeon_w-2175_firmwareceleron_n2808core_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i3-10100t_firmwarecore_i3-12300core_i5-11600kf_firmwarecore_i5-12450hx_firmwareceleron_2950mcore_i7-10810ucore_i7-11700kf_firmwarecore_i5-10400f_firmwarecore_i3-1115g4_firmwarecore_i5-12600kcore_i3-10105_firmwareceleron_j6413xeon_w-1370_firmwarexeon_w-1270e_firmwareceleron_j3160_firmwarecore_i3-1115grecore_i7-10875h_firmwareceleron_g5900te_firmwarexeon_e-2378_firmwarecore_i5-11500hcore_i5-10500t_firmwareceleron_j3455e_firmwarecore_i7-12800h_firmwareceleron_j4005_firmwareceleron_j3060_firmwarexeon_w-11955mxeon_e-2374gcore_i3-10100fpentium_gold_g6400eceleron_g4930txeon_w5-2445_firmwareceleron_n2920core_i7-12700kfcore_i7-1065g7_firmwarecore_i5-1135g7_firmwarepentium_gold_7505core_i5-10600celeron_g3930te_firmwarecore_i5-12500_firmwarecore_i3-12100teceleron_n2815_firmwarecore_i3-1115g4eceleron_3755u_firmwarecore_i9-10900kf_firmwarecore_i9-12900hceleron_7305eceleron_7300_firmwarexeon_w-1350core_i5-11600t_firmwarecore_i5-12450hxcore_i9-11980hk_firmwarexeon_w7-3445xeon_w-11155mle_firmwareceleron_n4020_firmwarecore_i9-10850k_firmwarexeon_w-1290xeon_w-3345core_i9-10885h_firmwarecore_i5-1235uceleron_g4950celeron_1000mcore_i7-1265u_firmwarecore_i5-1145g7ecore_i7-12650hx_firmwareceleron_j3455eceleron_6305ecore_i5-1240ucore_i5-11500hecore_i5-1030g7_firmwareceleron_g4900core_i3-10320celeron_g5900e_firmwarexeon_w-10885mcore_i9-10900txeon_w-3275_firmwarepentium_gold_g5400xeon_w-11855m_firmwareceleron_g3900t_firmwarexeon_w-2275core_i5-12600kfcore_i3-10110u_firmwareceleron_n4020celeron_g4900_firmwareceleron_g1620txeon_e-2324g_firmwareceleron_2957u_firmwareceleron_2000e_firmwarexeon_w-1350pceleron_g3900eceleron_g1820teceleron_g3950_firmwarexeon_w5-2455x_firmwarecore_i5-10500tceleron_3765u_firmwarecore_i3-10320_firmwarecore_i7-12850hxceleron_3965ycore_i7-1185g7ecore_i7-1265ul_firmwarexeon_w3-2423_firmwarexeon_w9-3475xpentium_gold_5405uceleron_g3900teceleron_j3355_firmwarecore_i3-1005g1celeron_j4005xeon_w-11865mre_firmwarecore_i5-12600hxceleron_3855ucore_i5-12600_firmwarecore_i5-11400celeron_n2910_firmwarecore_i7-10850h_firmwarecore_i7-1065g7celeron_g6900eceleron_g6900te_firmwarecore_i9-10900tecore_i9-10980hk_firmwarepentium_gold_g6400tecore_i5-1230uceleron_g6900e_firmwarepentium_gold_6500ypentium_gold_g6400xeon_w-2175core_i7-1270pe_firmwareIntel(R) Processors
CWE ID-CWE-665
Improper Initialization
CVE-2023-32666
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.02% / 3.65%
||
7 Day CHG~0.00%
Published-14 Mar, 2024 | 16:45
Updated-13 Feb, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDXxeon_e-2124g_firmware
CWE ID-CWE-1191
On-Chip Debug and Test Interface With Improper Access Control
CVE-2019-0134
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.77%
||
7 Day CHG~0.00%
Published-16 Dec, 2019 | 19:13
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the Intel(R) Dynamic Platform and Thermal Framework v8.3.10208.5643 and before may allow an authenticated user to potentially execute code at an elevated level of privilege.

Action-Not Available
Vendor-n/aIntel Corporation
Product-dynamic_platform_and_thermal_frameworkIntel(R) Dynamic Platform and Thermal Framework
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-27461
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 3.36%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-06 Sep, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in software installer for Intel(R) MAS (GUI) may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-memory_and_storage_tool_guiIntel(R) MAS (GUI)
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-26025
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 3.63%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-06 Sep, 2024 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for some Intel(R) Advisor software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_base_toolkitadvisorIntel(R) Advisor softwareadvisor
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-23495
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 3.63%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-31 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_base_toolkitdistribution_for_gdbIntel(R) Distribution for GDB softwaredistribution_for_gdb_software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-22378
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 3.55%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-14 Aug, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel Unite(R) Client Extended Display Plugin software installers before version 1.1.352.157 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel Unite(R) Client Extended Display Plugin software installersunite
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33071
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:03
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) oneAPI Rendering Toolkit before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_rendering_toolkitIntel(R) oneAPI Rendering Toolkit
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33166
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.37%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for the Intel(R) RXT for Chromebook application, all versions, may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-retail_experience_toolversion
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33062
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:10
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the software installer for the Intel(R) VTune(TM) Profiler before version 2021.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-vtune_profilerIntel(R) VTune(TM) Profiler
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-33088
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.35%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 18:36
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack before version 5.4.1.4449 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_integrated_sensor_hub_driver_packnuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2018-12175
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-17 Sep, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Default install directory permissions in Intel Distribution for Python (IDP) version 2018 may allow an unprivileged user to escalate privileges via local access.

Action-Not Available
Vendor-Intel Corporation
Product-distribution_for_pythonIntel(R) Distribution for Python 2018
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2018-12160
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 10.07%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 19:00
Updated-16 Sep, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL injection vulnerability in software installer for Intel Data Center Migration Center Software v3.1 and before may allow an authenticated user to potentially execute code using default directory permissions via local access.

Action-Not Available
Vendor-Intel Corporation
Product-data_migration_softwareIntel(R) Data Migration Software
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-43747
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 3.55%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-14 Aug, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions for some Intel(R) Connectivity Performance Suite software installers before version 2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Connectivity Performance Suite software installersconnectivity_performance_suite
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-43629
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 16.86%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-23 Jan, 2025 | 18:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) GPA software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_performance_analyzersIntel(R) GPA software installersgraphics_performance_analyzer
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-42668
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.39%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-02 Aug, 2024 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some onboard video driver software before version 1.14 for Intel(R) Server Boards based on Intel(R) 62X Chipset may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-onboard video driver software for Intel(R) Server Boards based on Intel(R) 62X Chipset62x_chipset
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-42433
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.39%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-02 Aug, 2024 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Endurance Gaming Mode software installers before version 1.3.937.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Endurance Gaming Mode software installersendurance_gaming_mode_software_installers
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-40154
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.26%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:38
Updated-23 Oct, 2024 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the Intel(R) SUR for Gameplay Software before version 2.0.1901 may allow privillaged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-system_usage_reportIntel(R) SUR for Gameplay Softwaresystem_usage_report
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-12307
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 18:13
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-high_definition_audio_driverIntel(R) High Definition Audio drivers
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-34315
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.88%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:38
Updated-28 Oct, 2024 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-virtual_raid_on_cpuIntel(R) VROC softwarevirtual_raid_on_cpu
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-0143
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-17 Jun, 2021 | 11:12
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for the Intel(R) Brand Verification Tool before version 11.0.0.1225 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-brand_verification_toolIntel(R) Brand Verification Tool
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-0058
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:05
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the Intel(R) NUC M15 Laptop Kit Driver Pack software before updated version 1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-lapbc510_firmwarelapbc510lapbc710lapbc710_firmwareIntel(R) NUC M15 Laptop Kit Driver Pack software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-0065
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:19
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ac_8265ac_9462ac_3165_firmwareac_9560_firmwareac_8265_firmwareax200ac_3165ac_9461ac_8260ac_9260ac_9461_firmware9260_firmwareac_3168ac_9462_firmwareac_9560ax200_firmware7265_firmwareac_3168_firmwareax201ax210_firmwareax201_firmwareac_9260_firmwareac_8260_firmwareax2107265Intel(R) PROSet/Wireless WiFi software installer for Windows 10
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-0100
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.41%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:12
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) SSD Data Center Tool, versions downloaded before 12/31/2020, may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ssd_data_center_toolIntel(R) SSD Data Center Tool, versions downloaded
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2021-0106
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.41%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:13
Updated-03 Aug, 2024 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the Intel(R) Optane(TM) DC Persistent Memory for Windows software versions before 2.00.00.3842 or 1.00.00.3515 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6246rxeon_platinum_8276lxeon_platinum_8358xeon_platinum_9222xeon_gold_5315yxeon_gold_5217xeon_gold_6230txeon_platinum_8362xeon_gold_6230nxeon_platinum_8354hxeon_gold_5218nxeon_gold_6338xeon_silver_4309yxeon_platinum_8352yxeon_platinum_8368xeon_gold_5220xeon_gold_6246xeon_silver_4214rxeon_gold_6326xeon_gold_6254xeon_silver_4310txeon_gold_6269yxeon_gold_6240yxeon_gold_6234xeon_platinum_8380xeon_gold_6238rxeon_silver_4316xeon_platinum_8351nxeon_gold_6208uxeon_platinum_8268xeon_gold_5215xeon_platinum_8352vxeon_gold_6336yxeon_gold_6262vxeon_gold_5222xeon_gold_5218xeon_platinum_8284xeon_silver_4209txeon_platinum_8380hxeon_gold_5215lxeon_platinum_8360hlxeon_silver_4215rxeon_gold_6252nxeon_platinum_9221xeon_platinum_8376hxeon_gold_6244xeon_gold_6330xeon_silver_4210txeon_platinum_8321hcxeon_gold_6248xeon_gold_6212uxeon_gold_6314uxeon_platinum_8280xeon_gold_6248rxeon_gold_6354xeon_gold_6258rxeon_gold_6240xeon_gold_6238lxeon_platinum_8352mxeon_gold_6240lxeon_gold_6250xeon_platinum_8353hxeon_platinum_8256xeon_gold_6348hxeon_gold_6262xeon_gold_6330hxeon_gold_5219yxeon_gold_6222vxeon_gold_5318hxeon_platinum_8376hlxeon_gold_6242xeon_gold_5320hxeon_gold_5320xeon_platinum_8360yxeon_platinum_8274xeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_6338txeon_gold_6346xeon_gold_5218txeon_silver_4215xeon_gold_5220rxeon_gold_5318sxeon_gold_6338nxeon_silver_4214xeon_platinum_8276xeon_platinum_8360hxeon_gold_6238txeon_silver_4210rxeon_gold_6250lxeon_silver_4214yxeon_gold_6210uxeon_gold_6348xeon_gold_6330nxeon_gold_5218bxeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8358pxeon_platinum_8368qxeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6240rxeon_silver_4310xeon_gold_6222xeon_gold_5317xeon_gold_6334ipmctlxeon_platinum_8356hxeon_gold_6209uxeon_gold_6226xeon_gold_6256xeon_gold_6342xeon_gold_6230rxeon_gold_6238xeon_gold_6252xeon_gold_5320txeon_silver_4208xeon_platinum_8260xeon_platinum_8352sxeon_gold_5318yxeon_gold_5218rxeon_bronze_3206rxeon_gold_6226rxeon_gold_6312uxeon_gold_6328hxeon_gold_5220sxeon_platinum_9242xeon_platinum_9282xeon_platinum_8260lxeon_platinum_8280lxeon_bronze_3204xeon_gold_6328hlxeon_silver_4314xeon_gold_5220txeon_silver_4210Intel(R) Optane(TM) DC Persistent Memory for Windows software versions
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-32663
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.81%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-15 Oct, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) RealSense(TM) SDKs in version 2.53.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_software_development_kitIntel(R) RealSense(TM) SDKs in version 2.53.1
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-8763
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:14
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for the Intel(R) RealSense(TM) D400 Series UWP driver for Windows* 10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-realsense_d435_firmwarerealsense_d415_firmwarerealsense_d435i_firmwarewindows_10Intel(R) RealSense(TM) D400 Series Advisory
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-8741
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:44
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for the Intel(R) Thunderbolt(TM) non-DCH driver, all versions, for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-thunderbolt_non-dch_driverIntel(R) Thunderbolt(TM)
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2017-5684
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.9||LOW
EPSS-0.05% / 14.63%
||
7 Day CHG~0.00%
Published-03 Apr, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BIOS in Intel Compute Stick systems based on 6th Gen Intel Core processors prior to version CC047 may allow an attacker with physical access to the system to gain access to personal information.

Action-Not Available
Vendor-Intel Corporation
Product-stk2mv64cc_biosstk2mv64ccIntel Compute Stick STK2MV64CC
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-8765
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 8.61%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:57
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the installer for the Intel(R) RealSense(TM) DCM may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_camera_f200realsense_camera_sr300realsense_camera_r200realsense_depth_camera_managerIntel(R) RealSense(TM) DCM
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2022-33963
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 22.08%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-24 Jan, 2025 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the software installer for Intel(R) Unite(R) Client software for Windows before version 4.2.34870 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-unitesoftware installer for Intel(R) Unite(R) Client software for Windows
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-32547
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.81%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-10 Oct, 2024 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the MAVinci Desktop Software for Intel(R) Falcon 8+ before version 6.2 may allow authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-topconpositioningn/aIntel Corporation
Product-falcon_8\+mavinci_desktopMAVinci Desktop Software for Intel(R) Falcon 8+mavinci_desktop_software_for_intel_falcon_8_plus
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2017-5686
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.9||LOW
EPSS-0.06% / 17.18%
||
7 Day CHG~0.00%
Published-03 Apr, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BIOS in Intel NUC systems based on 6th Gen Intel Core processors prior to version SY0059 may allow may allow an attacker with physical access to the system to gain access to personal information.

Action-Not Available
Vendor-Intel Corporation
Product-nuc6i5syhnuc6i3syknuc6i3syk_biosnuc6i3syh_biosIntel NUC NUC6i5SYSH/K, Intel NUC6i3SYSH/K
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2020-8743
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.78%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:14
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper permissions in the installer for the Intel(R) Mailbox Interface driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-mailbox_interface_driverIntel(R) Mailbox Interface driver Advisory
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2017-5685
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.9||LOW
EPSS-0.06% / 19.84%
||
7 Day CHG~0.00%
Published-03 Apr, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BIOS in Intel NUC systems based on 6th Gen Intel Core processors prior to version KY0045 may allow may allow an attacker with physical access to the system to gain access to personal information.

Action-Not Available
Vendor-Intel Corporation
Product-nuc6i7kyknuc6i7kyk_biosIntel NUC NUC6i7KYK
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-31246
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 19.08%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-10 Oct, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) SDP Tool software before version 1.4 build 5 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_debug_and_provisioning_toolIntel(R) SDP Tool software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-28739
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.26%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-07 Jan, 2025 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-chipset_device_softwareIntel(R) Chipset Driver Softwarechipset_driver_software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-29244
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 9.75%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:03
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel Integrated Sensor Hub (ISH) driver for Windows 10 for Intel NUC P14E Laptop Element software installers before version 5.4.1.4479 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_p14e_laptop_elementIntel Integrated Sensor Hub (ISH) driver for Windows 10 for Intel NUC P14E Laptop Element software installers
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-28389
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.02%
||
7 Day CHG~0.00%
Published-14 Mar, 2024 | 16:45
Updated-02 Aug, 2024 | 12:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) CSME installer software before version 2328.5.5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) CSME installer softwareconverged_security_and_manageability_engine
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-27305
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.34%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-02 Aug, 2024 | 12:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsarc_a_graphicsiris_xe_graphicsIntel(R) Arc(TM) Control software
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-27392
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 6.84%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-02 Oct, 2024 | 13:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the Intel(R) Support android application before version v23.02.07 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-supportIntel(R) Support android application
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-27505
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.81%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-10 Oct, 2024 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in some Intel(R) Advanced Link Analyzer Standard Edition software installers before version 22.1 .1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-advanced_link_analyzerIntel(R) Advanced Link Analyzer Standard Edition software installers
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2022-30338
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.81%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-27 Jan, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect default permissions in the Intel(R) VROC software before version 7.7.6.1003 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-virtual_raid_on_cpuIntel(R) VROC software
CWE ID-CWE-276
Incorrect Default Permissions
  • Previous
  • 1
  • 2
  • Next
Details not found