Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-34163

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-14 Aug, 2024 | 13:45
Updated At-16 Aug, 2024 | 14:08
Rejected At-
Credits

Improper input validation in firmware for some Intel(R) NUC may allow a privileged user to potentially enableescalation of privilege via local access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:14 Aug, 2024 | 13:45
Updated At:16 Aug, 2024 | 14:08
Rejected At:
▼CVE Numbering Authority (CNA)

Improper input validation in firmware for some Intel(R) NUC may allow a privileged user to potentially enableescalation of privilege via local access.

Affected Products
Vendor
n/a
Product
Intel(R) NUC
Default Status
unaffected
Versions
Affected
  • See references
Problem Types
TypeCWE IDDescription
N/AN/Aescalation of privilege
CWECWE-20Improper input validation
Type: N/A
CWE ID: N/A
Description: escalation of privilege
Type: CWE
CWE ID: CWE-20
Description: Improper input validation
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
4.08.7HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html
N/A
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Intel Corporationintel
Product
lapac71g_firmware
CPEs
  • cpe:2.3:o:intel:lapac71g_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0065 (custom)
Vendor
Intel Corporationintel
Product
lapac71h_firmware
CPEs
  • cpe:2.3:o:intel:lapac71h_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0065 (custom)
Vendor
Intel Corporationintel
Product
lapbc510_firmware
CPEs
  • cpe:2.3:o:intel:lapbc510_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0083 (custom)
Vendor
Intel Corporationintel
Product
lapbc710_firmware
CPEs
  • cpe:2.3:o:intel:lapbc710_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0083 (custom)
Vendor
Intel Corporationintel
Product
laprc510_firmware
CPEs
  • cpe:2.3:o:intel:laprc510_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0066 (custom)
Vendor
Intel Corporationintel
Product
laprc710_firmware
CPEs
  • cpe:2.3:o:intel:laprc710_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0066 (custom)
Vendor
Intel Corporationintel
Product
lapkc51e_firmware
CPEs
  • cpe:2.3:o:intel:lapkc51e_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0048 (custom)
Vendor
Intel Corporationintel
Product
lapkc71e_firmware
CPEs
  • cpe:2.3:o:intel:lapkc71e_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0048 (custom)
Vendor
Intel Corporationintel
Product
lapkc71f_firmware
CPEs
  • cpe:2.3:o:intel:lapkc71f_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0048 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:14 Aug, 2024 | 14:15
Updated At:12 Sep, 2024 | 18:59

Improper input validation in firmware for some Intel(R) NUC may allow a privileged user to potentially enableescalation of privilege via local access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.7HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.18.2HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc510_firmware>>Versions before 0083(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc510>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc710_firmware>>Versions before 0083(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapbc710>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71g_firmware>>Versions before 0065(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapac71g_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71g>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapac71g:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71h_firmware>>Versions before 0065(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapac71h_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapac71h>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapac71h:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc51e_firmware>>Versions before 0048(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapkc51e_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc51e>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapkc51e:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71e_firmware>>Versions before 0048(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapkc71e_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71e>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapkc71e:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71f_firmware>>Versions before 0048(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_lapkc71f_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_lapkc71f>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_lapkc71f:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc510_firmware>>Versions before 0066(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_laprc510_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc510>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_laprc510:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc710_firmware>>Versions before 0066(exclusive)
cpe:2.3:o:intel:nuc_x15_laptop_kit_laprc710_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>nuc_x15_laptop_kit_laprc710>>-
cpe:2.3:h:intel:nuc_x15_laptop_kit_laprc710:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-20Secondarysecure@intel.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-20
Type: Secondary
Source: secure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

355Records found

CVE-2020-8722
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.19% / 41.55%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:51
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-32231
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.79%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276lxeon_silver_4210r_firmwarexeon_platinum_8170_firmwarexeon_platinum_9222xeon_bronze_3104_firmwarexeon_gold_6230txeon_gold_6146xeon_gold_6126f_firmwarexeon_gold_6126txeon_platinum_8362xeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_gold_6338xeon_gold_6338t_firmwarexeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_silver_4309yxeon_platinum_8352yxeon_gold_5217_firmwarexeon_platinum_8380h_firmwarexeon_gold_6138xeon_platinum_8360hl_firmwarexeon_gold_6354_firmwarexeon_gold_6246xeon_gold_6326xeon_platinum_8164xeon_gold_5317_firmwarexeon_gold_6240_firmwarexeon_gold_6234xeon_silver_4116t_firmwarexeon_gold_6238rxeon_silver_4316xeon_gold_5318y_firmwarexeon_gold_5215xeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_gold_6348_firmwarexeon_platinum_8168xeon_gold_5318s_firmwarexeon_gold_6244_firmwarexeon_gold_5218xeon_silver_4109txeon_bronze_3206r_firmwarexeon_platinum_8380hxeon_gold_5215lxeon_silver_4215rxeon_gold_6138t_firmwarexeon_gold_5220r_firmwarexeon_silver_4116_firmwarexeon_gold_5122_firmwarexeon_silver_4215_firmwarexeon_platinum_8368q_firmwarexeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_platinum_8376hxeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_gold_6136_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_silver_4210txeon_platinum_8362_firmwarexeon_gold_6212u_firmwarexeon_gold_6126_firmwarexeon_silver_4310t_firmwarexeon_gold_6212uxeon_silver_4114xeon_gold_6240l_firmwarexeon_gold_6314uxeon_gold_6248rxeon_gold_6250l_firmwarexeon_silver_4214r_firmwarexeon_platinum_8276_firmwarexeon_gold_6258rxeon_bronze_3104xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6150_firmwarexeon_gold_6250xeon_platinum_8353hxeon_gold_6348hxeon_gold_6338_firmwarexeon_platinum_8156xeon_bronze_3106_firmwarexeon_gold_6138_firmwarexeon_gold_5218n_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8260y_firmwarexeon_platinum_8358p_firmwarexeon_gold_5320xeon_gold_6144_firmwarexeon_platinum_8360yxeon_gold_6330h_firmwarexeon_gold_6126fxeon_silver_4109t_firmwarexeon_gold_6338txeon_gold_5218txeon_gold_6150xeon_gold_6240y_firmwarexeon_gold_6242_firmwarexeon_gold_5220rxeon_silver_4114_firmwarexeon_gold_5318sxeon_gold_6140xeon_gold_6230_firmwarexeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_gold_6148f_firmwarexeon_platinum_8356h_firmwarexeon_gold_6250lxeon_gold_6210uxeon_gold_6126xeon_platinum_8380hlxeon_gold_5318nxeon_platinum_8158_firmwarexeon_platinum_8358pxeon_gold_5120_firmwarexeon_gold_6328h_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6134_firmwarexeon_gold_6328hl_firmwarexeon_gold_6130t_firmwarexeon_gold_6242r_firmwarexeon_gold_6342_firmwarexeon_gold_5218r_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4116txeon_gold_6130f_firmwarexeon_gold_6348h_firmwarexeon_platinum_8356hxeon_gold_6246r_firmwarexeon_gold_6142fxeon_platinum_8360y_firmwarexeon_gold_6238xeon_gold_6126t_firmwarexeon_platinum_8153_firmwarexeon_gold_6130xeon_gold_5318h_firmwarexeon_silver_4214y_firmwarexeon_gold_5320txeon_silver_4208xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_gold_6312uxeon_silver_4214_firmwarexeon_gold_5320h_firmwarexeon_gold_5220sxeon_platinum_9242xeon_platinum_9282xeon_gold_5119t_firmwarexeon_platinum_8280lxeon_silver_4110xeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_bronze_3204xeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8352y_firmwarexeon_platinum_8280_firmwarexeon_gold_6240r_firmwarexeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_6246rxeon_platinum_8358xeon_gold_5315yxeon_gold_5217xeon_platinum_8352s_firmwarexeon_gold_6230nxeon_silver_4215r_firmwarexeon_platinum_8354hxeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_bronze_3106xeon_gold_6138txeon_silver_4310_firmwarexeon_gold_6338n_firmwarexeon_gold_6248r_firmwarexeon_gold_6256_firmwarexeon_platinum_9221_firmwarexeon_gold_5120xeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_platinum_8368xeon_gold_6154_firmwarexeon_gold_5220xeon_platinum_8160txeon_silver_4214rxeon_gold_6254xeon_silver_4209t_firmwarexeon_silver_4310txeon_silver_4114txeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_gold_6230t_firmwarexeon_platinum_8380xeon_gold_6314u_firmwarexeon_gold_5215l_firmwarexeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_silver_4208_firmwarexeon_gold_6208uxeon_gold_6330n_firmwarexeon_platinum_8268xeon_platinum_8352vxeon_gold_6336yxeon_gold_6252n_firmwarexeon_gold_5120t_firmwarexeon_gold_6230n_firmwarexeon_gold_5222xeon_platinum_8270_firmwarexeon_gold_6230r_firmwarexeon_silver_4209txeon_silver_4116xeon_gold_6234_firmwarexeon_gold_6210u_firmwarexeon_platinum_8360hlxeon_gold_6252nxeon_platinum_8380_firmwarexeon_platinum_9221xeon_gold_6244xeon_gold_6330_firmwarexeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_gold_5320_firmwarexeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_gold_6152_firmwarexeon_gold_6146_firmwarexeon_gold_6354xeon_platinum_8176f_firmwarexeon_gold_6148fxeon_gold_6336y_firmwarexeon_gold_5218_firmwarexeon_gold_6132xeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_gold_6238t_firmwarexeon_platinum_8256xeon_gold_6152xeon_platinum_8158xeon_gold_6238l_firmwarexeon_gold_6330hxeon_gold_5218b_firmwarexeon_gold_6222vxeon_gold_5318hxeon_platinum_8176xeon_platinum_8160_firmwarexeon_silver_4316_firmwarexeon_platinum_8376hlxeon_gold_6242xeon_silver_4112_firmwarexeon_gold_6262v_firmwarexeon_gold_6142xeon_platinum_8260yxeon_platinum_8270xeon_gold_6242rxeon_gold_6148_firmwarexeon_gold_6128xeon_gold_6346xeon_silver_4215xeon_gold_5220t_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_gold_5118xeon_gold_6130fxeon_silver_4210t_firmwarexeon_gold_5220_firmwarexeon_gold_6338nxeon_gold_6208u_firmwarexeon_silver_4214xeon_gold_6142f_firmwarexeon_platinum_8360hxeon_gold_5315y_firmwarexeon_platinum_8276xeon_gold_6250_firmwarexeon_gold_6238txeon_silver_4210rxeon_platinum_8164_firmwarexeon_silver_4214yxeon_gold_6348xeon_gold_5218bxeon_gold_6330nxeon_platinum_8368_firmwarexeon_silver_4216_firmwarexeon_gold_6138pxeon_gold_6254_firmwarexeon_gold_6138p_firmwarexeon_platinum_8176fxeon_platinum_8352v_firmwarexeon_platinum_8368qxeon_gold_5320t_firmwarexeon_gold_6240rxeon_silver_4310xeon_gold_6258r_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_gold_6209uxeon_silver_4112xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_6256xeon_gold_6238r_firmwarexeon_gold_6342xeon_gold_5120txeon_gold_6230rxeon_gold_6252xeon_gold_6134xeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_5218rxeon_bronze_3206rxeon_gold_6226rxeon_gold_6328hxeon_gold_6252_firmwarexeon_gold_6334_firmwarexeon_gold_6148xeon_silver_4110_firmwarexeon_gold_6209u_firmwarexeon_platinum_8260lxeon_gold_6144xeon_gold_6328hlxeon_platinum_9282_firmwarexeon_platinum_8180xeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_gold_5220tIntel(R) Processors
CWE ID-CWE-665
Improper Initialization
CVE-2022-32569
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.42%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in BIOS firmware for some Intel(R) NUC M15 Laptop Kits before version BCTGL357.0074 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_m15_laptop_kit_lapbc710_firmwarenuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_lapbc710nuc_m15_laptop_kit_lapbc510_firmwareIntel(R) NUC M15 Laptop Kits
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-28714
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 10.42%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-17 Oct, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsproset\/wireless_wifiIntel(R) PROSet/Wireless WiFi software for Windowsintel_proset_wireless_wifi_software_for_windows
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-284
Improper Access Control
CVE-2022-30539
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.80%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_gold_6330hxeon_platinum_8358xeon_gold_5318hxeon_gold_5315yxeon_platinum_8376hlxeon_silver_4316_firmwarexeon_platinum_8352s_firmwarexeon_silver_4309y_firmwarexeon_gold_5320hxeon_platinum_8362xeon_platinum_8358p_firmwarexeon_gold_5320xeon_platinum_8360yxeon_gold_6330h_firmwarexeon_platinum_8354hxeon_gold_6338xeon_silver_4310_firmwarexeon_gold_6338t_firmwarexeon_gold_6338n_firmwarexeon_gold_6338txeon_gold_6346xeon_gold_6326_firmwarexeon_platinum_8351n_firmwarexeon_gold_5318sxeon_silver_4309yxeon_platinum_8352yxeon_platinum_8380h_firmwarexeon_gold_6338nxeon_platinum_8360hl_firmwarexeon_platinum_8368xeon_gold_6354_firmwarexeon_platinum_8356h_firmwarexeon_gold_6326xeon_platinum_8360hxeon_gold_5315y_firmwarexeon_silver_4310txeon_gold_5317_firmwarexeon_platinum_8380xeon_gold_6348xeon_gold_6314u_firmwarexeon_gold_6330nxeon_silver_4316xeon_platinum_8351nxeon_platinum_8376hl_firmwarexeon_platinum_8368_firmwarexeon_gold_5318y_firmwarexeon_platinum_8380hlxeon_gold_6330n_firmwarexeon_gold_5318nxeon_platinum_8358pxeon_platinum_8352vxeon_gold_6336yxeon_platinum_8352v_firmwarexeon_gold_6348_firmwarexeon_gold_6328h_firmwarexeon_platinum_8368qxeon_gold_5318s_firmwarexeon_gold_5320t_firmwarexeon_silver_4310xeon_gold_6328hl_firmwarexeon_gold_6342_firmwarexeon_gold_5317xeon_platinum_8352m_firmwarexeon_platinum_8358_firmwarexeon_silver_4314_firmwarexeon_gold_6334xeon_platinum_8356hxeon_gold_6348h_firmwarexeon_platinum_8380hxeon_platinum_8360hlxeon_platinum_8368q_firmwarexeon_platinum_8380_firmwarexeon_gold_6342xeon_platinum_8376hxeon_gold_6330_firmwarexeon_gold_6312u_firmwarexeon_gold_6330xeon_platinum_8360y_firmwarexeon_platinum_8362_firmwarexeon_gold_5318h_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8376h_firmwarexeon_silver_4310t_firmwarexeon_gold_5320txeon_gold_6314uxeon_platinum_8352sxeon_gold_6346_firmwarexeon_gold_5318yxeon_gold_5320_firmwarexeon_gold_6312uxeon_gold_5320h_firmwarexeon_gold_6328hxeon_platinum_8380hl_firmwarexeon_platinum_8360h_firmwarexeon_gold_6334_firmwarexeon_gold_6354xeon_gold_6336y_firmwarexeon_platinum_8354h_firmwarexeon_platinum_8352mxeon_gold_6328hlxeon_silver_4314xeon_gold_5318n_firmwarexeon_platinum_8353hxeon_platinum_8352y_firmwarexeon_gold_6348hxeon_gold_6338_firmwareIntel(R) Processors
CWE ID-CWE-416
Use After Free
CVE-2022-29510
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 25.55%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:05
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bps24compute_module_hns2600bpblc24rserver_board_s2600bpsserver_board_s2600bpqrcompute_module_hns2600bps_firmwarecompute_module_hns2600bpcompute_module_hns2600bpq24_firmwarecompute_module_hns2600bpb24rcompute_module_hns2600bpq_firmwarecompute_module_hns2600bpblc24_firmwareserver_board_s2600bpqr_firmwareserver_system_vrn2224bphy6compute_module_hns2600bpq24r_firmwarecompute_module_hns2600bps24rcompute_module_hns2600bpbserver_board_s2600bpb_firmwarecompute_module_hns2600bpsrserver_system_m70klp4s2uhhserver_system_vrn2224bphy6_firmwarecompute_module_hns2600bpblc_firmwarecompute_module_hns2600bpbrctcompute_module_hns2600bpblcrcompute_module_hns2600bpbr_firmwareserver_system_m20ntp1ur304server_system_vrn2224bpaf6compute_module_hns2600bpqrcompute_module_hns2600bpbrserver_system_vrn2224bpaf6_firmwarecompute_module_hns2600bpb_firmwarecompute_module_hns2600bpr_firmwareserver_board_m20ntp2sbserver_board_m10jnp2sb_firmwareserver_board_s2600bpbrserver_system_m70klp4s2uhh_firmwarecompute_module_hns2600bps24_firmwareserver_board_m70klp2sbcompute_module_hns2600bps24r_firmwareserver_system_zsb2224bpaf2compute_module_hns2600bprcompute_module_hns2600bp_firmwarecompute_module_hns2600bpsr_firmwarecompute_module_hns2600bpb24_firmwareserver_system_mcb2208wfaf5_firmwareserver_board_s2600bpbr_firmwarecompute_module_hns2600bpqcompute_module_hns2600bpblcr_firmwarecompute_module_hns2600bpblc24server_board_s2600bpbserver_system_zsb2224bphy1_firmwareserver_system_m20ntp1ur304_firmwarecompute_module_hns2600bpblc24r_firmwareserver_board_m70klp2sb_firmwareserver_board_s2600bpqserver_board_m10jnp2sbserver_system_zsb2224bpaf1server_board_s2600bpq_firmwarecompute_module_hns2600bpblcserver_system_zsb2224bpaf1_firmwareserver_board_s2600bpsrcompute_module_hns2600bpqr_firmwareserver_board_s2600bps_firmwarecompute_module_hns2600bpb24r_firmwarecompute_module_hns2600bpsserver_board_s2600bpsr_firmwarecompute_module_hns2600bpb24server_system_zsb2224bphy1compute_module_hns2600bpbrct_firmwareserver_system_zsb2224bpaf2_firmwarecompute_module_hns2600bpq24rcompute_module_hns2600bpq24server_board_m20ntp2sb_firmwareserver_system_mcb2208wfaf5Intel(R) Server Board M10JNP2SB BIOS firmware
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-26873
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.03% / 5.15%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 17:35
Updated-27 May, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The stack buffer overflow vulnerability in PlatformInitAdvancedPreMem leads to arbitrary code execution during PEI phase.

A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory. This issue affects: Module name: PlatformInitAdvancedPreMem SHA256: 644044fdb8daea30a7820e0f5f88dbf5cd460af72fbf70418e9d2e47efed8d9b Module GUID: EEEE611D-F78F-4FB9-B868-55907F169280 This issue affects: AMI Aptio 5.x.

Action-Not Available
Vendor-AMIIntel Corporation
Product-nuc_m15_laptop_kit_lapbc510nuc_m15_laptop_kit_lapbc510_firmwarenuc_m15_laptop_kit_lapbc710aptio_vnuc_m15_laptop_kit_lapbc710_firmwareAptio
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-27635
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.08%
||
7 Day CHG+0.01%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationDebian GNU/LinuxFedora Project
Product-wireless-ac_9560killer_wireless-ac_1550i\/skillerwi-fi_6e_ax211wi-fi_6e_ax210wireless-ac_9462killer_wi-fi_6e_ax1675x\/wuefi_firmwarewireless-ac_9461killer_wi-fi_6e_ax1675i\/sdebian_linuxkiller_wi-fi_6_ax1650i\/sfedorawi-fi_6_ax201killer_wi-fi_6e_ax1690i\/swi-fi_6e_ax411proset\/wireless_wifiIntel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software
CWE ID-CWE-284
Improper Access Control
CVE-2023-25545
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.09% / 26.20%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_m50cyp2ur208server_system_d50tnp2mfalacserver_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-26079
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.04% / 10.10%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper conditions check in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xmm_7560_firmwarexmm_7560Intel(R) XMM(TM) 7560 Modem software
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2022-26367
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.05% / 15.66%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xmm_7560_firmwarexmm_7560Intel(R) XMM(TM) 7560 Modem software
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-22661
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.09% / 26.85%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-22297
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.08% / 23.82%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access of memory location after end of buffer in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-26124
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.73%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_8_rugged_kit_nuc8cchkrn_firmwarenuc_8_rugged_board_nuc8cchbn_firmwarenuc_8_rugged_board_nuc8cchbnnuc_board_nuc8cchbnuc_board_nuc8cchb_firmwarenuc_8_rugged_kit_nuc8cchkrnuc_8_rugged_kit_nuc8cchkr_firmwarenuc_8_rugged_kit_nuc8cchkrnIntel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-26343
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.49%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 19:59
Updated-27 Jan, 2025 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276lxeon_d-2796texeon_silver_4210r_firmwarexeon_platinum_8170_firmwarexeon_platinum_9222xeon_bronze_3104_firmwarexeon_gold_6230txeon_d-1627_firmwarexeon_d-2738xeon_gold_6126f_firmwarexeon_gold_6146xeon_gold_6126txeon_gold_6140_firmwarexeon_platinum_8168_firmwarexeon_silver_4108_firmwarexeon_d-1527xeon_d-2766ntxeon_gold_5115xeon_gold_6238_firmwarexeon_platinum_8170xeon_gold_6136xeon_gold_6138f_firmwarexeon_gold_5217_firmwarexeon_gold_6138xeon_d-1746ter_firmwarexeon_d-2163it_firmwarexeon_gold_6246xeon_d-2776ntxeon_platinum_8164xeon_d-1521_firmwarexeon_d-1527_firmwarexeon_d-2798ntxeon_d-1733ntxeon_gold_6240_firmwarexeon_gold_6234xeon_d-1557_firmwarexeon_d-2775te_firmwarexeon_silver_4116t_firmwarexeon_d-2766nt_firmwarexeon_gold_6238rxeon_d-1518xeon_d-1714xeon_gold_5215xeon_platinum_p-8136_firmwarexeon_d-2799_firmwarexeon_platinum_8268_firmwarexeon_gold_6248_firmwarexeon_gold_6262vxeon_d-2143itxeon_d-2163itxeon_platinum_8168xeon_gold_6244_firmwarexeon_d-1734nt_firmwarexeon_d-2161i_firmwarexeon_d-2779_firmwarexeon_gold_5218xeon_d-1567_firmwarexeon_d-1567xeon_silver_4109txeon_bronze_3206r_firmwarexeon_gold_5215lxeon_silver_4215_firmwarexeon_gold_6138t_firmwarexeon_gold_5220r_firmwarexeon_silver_4116_firmwarexeon_d-2173it_firmwarexeon_gold_5122_firmwarexeon_silver_4215rxeon_gold_6138fxeon_gold_5122xeon_platinum_8180_firmwarexeon_silver_4210_firmwarexeon_gold_6132_firmwarexeon_d-1746terxeon_gold_6136_firmwarexeon_silver_4210txeon_gold_6212u_firmwarexeon_gold_6126_firmwarexeon_gold_6212uxeon_d-1531_firmwarexeon_gold_6240l_firmwarexeon_silver_4114xeon_d-2123it_firmwarexeon_gold_6248rxeon_gold_6250l_firmwarexeon_silver_4214r_firmwarexeon_d-1715terxeon_platinum_8276_firmwarexeon_gold_6258rxeon_bronze_3104xeon_d-1571xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6150_firmwarexeon_d-1736_firmwarexeon_gold_6250xeon_d-2173itxeon_platinum_8156xeon_d-2123itxeon_bronze_3106_firmwarexeon_d-2177nt_firmwarexeon_gold_6138_firmwarexeon_d-1627xeon_d-1533n_firmwarexeon_gold_5218n_firmwarexeon_d-2796ntxeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_platinum_8260y_firmwarexeon_d-2779xeon_gold_6144_firmwarexeon_d-1602xeon_gold_6126fxeon_d-1712trxeon_d-1539xeon_d-2796te_firmwarexeon_silver_4109t_firmwarexeon_gold_5218txeon_platinum_p-8124xeon_d-1713ntexeon_gold_6150xeon_gold_6240y_firmwarexeon_gold_6242_firmwarexeon_d-2752ter_firmwarexeon_gold_5220rxeon_silver_4114_firmwarexeon_gold_6140xeon_d-2733nt_firmwarexeon_d-1649n_firmwarexeon_gold_6230_firmwarexeon_d-2146ntxeon_platinum_8280l_firmwarexeon_platinum_8160fxeon_d-1577_firmwarexeon_platinum_p-8136xeon_gold_6148f_firmwarexeon_d-2145nt_firmwarexeon_gold_6250lxeon_gold_6210uxeon_d-1726_firmwarexeon_d-2187ntxeon_d-1732texeon_d-2712txeon_d-1537_firmwarexeon_d-1541_firmwarexeon_gold_6126xeon_platinum_8158_firmwarexeon_d-2166nt_firmwarexeon_d-2166ntxeon_gold_5120_firmwarexeon_d-2776nt_firmwarexeon_d-1732te_firmwarexeon_d-2712t_firmwarexeon_d-1623n_firmwarexeon_platinum_p-8124_firmwarexeon_silver_4114t_firmwarexeon_silver_4216xeon_gold_6230xeon_platinum_8253xeon_gold_6134_firmwarexeon_d-1548_firmwarexeon_d-1713nte_firmwarexeon_gold_6130t_firmwarexeon_gold_6242r_firmwarexeon_gold_5218r_firmwarexeon_gold_6130f_firmwarexeon_d-2183itxeon_silver_4116txeon_d-1622xeon_d-1559_firmwarexeon_gold_6246r_firmwarexeon_gold_6142fxeon_d-2145ntxeon_gold_6238xeon_platinum_8153_firmwarexeon_gold_6126t_firmwarexeon_gold_6130xeon_d-1529_firmwarexeon_d-1540_firmwarexeon_d-1637_firmwarexeon_silver_4214y_firmwarexeon_d-1733nt_firmwarexeon_d-2733ntxeon_silver_4208xeon_platinum_8160t_firmwarexeon_platinum_8260xeon_bronze_3204_firmwarexeon_silver_4214_firmwarexeon_d-2142it_firmwarexeon_gold_5220sxeon_d-2143it_firmwarexeon_d-1736xeon_platinum_9282xeon_platinum_9242xeon_gold_5119t_firmwarexeon_d-1735trxeon_d-1513n_firmwarexeon_d-2795nt_firmwarexeon_platinum_8280lxeon_gold_6142_firmwarexeon_platinum_9242_firmwarexeon_silver_4110xeon_bronze_3204xeon_d-1523n_firmwarexeon_d-2752ntexeon_d-2753nt_firmwarexeon_platinum_8280_firmwarexeon_gold_6240r_firmwarexeon_gold_5119txeon_silver_4108xeon_gold_6130txeon_silver_4210xeon_platinum_8256_firmwarexeon_gold_6246rxeon_gold_5217xeon_gold_6230nxeon_silver_4215r_firmwarexeon_gold_5218nxeon_gold_6246_firmwarexeon_gold_5222_firmwarexeon_bronze_3106xeon_gold_6138txeon_d-1718txeon_gold_6248r_firmwarexeon_gold_6256_firmwarexeon_platinum_9221_firmwarexeon_gold_5120xeon_d-1523nxeon_d-2786nte_firmwarexeon_d-2786ntexeon_d-1540xeon_d-1653nxeon_gold_5220xeon_platinum_8160txeon_gold_6154_firmwarexeon_d-1528xeon_silver_4214rxeon_d-1577xeon_d-1637xeon_gold_6254xeon_silver_4114txeon_d-1715ter_firmwarexeon_silver_4209t_firmwarexeon_gold_6240yxeon_platinum_8176_firmwarexeon_gold_6154xeon_gold_6230t_firmwarexeon_d-2141ixeon_d-1541xeon_gold_5215l_firmwarexeon_d-1543n_firmwarexeon_silver_4208_firmwarexeon_gold_6208uxeon_d-1633n_firmwarexeon_platinum_8268xeon_d-1722ne_firmwarexeon_gold_6252n_firmwarexeon_d-1747ntexeon_gold_5120t_firmwarexeon_gold_6230n_firmwarexeon_d-1653n_firmwarexeon_gold_5222xeon_d-1734ntxeon_d-1735tr_firmwarexeon_d-1747nte_firmwarexeon_platinum_8270_firmwarexeon_gold_6230r_firmwarexeon_d-1553nxeon_d-1571_firmwarexeon_silver_4209txeon_gold_6234_firmwarexeon_silver_4116xeon_d-1633nxeon_gold_6210u_firmwarexeon_d-1548xeon_gold_6252nxeon_d-1649nxeon_d-1529xeon_platinum_9221xeon_gold_6244xeon_platinum_8160xeon_gold_5218t_firmwarexeon_gold_6248xeon_gold_5115_firmwarexeon_platinum_8260l_firmwarexeon_platinum_8156_firmwarexeon_gold_6226_firmwarexeon_d-1518_firmwarexeon_gold_5118_firmwarexeon_platinum_8280xeon_d-2738_firmwarexeon_gold_6152_firmwarexeon_d-1713ntxeon_gold_6146_firmwarexeon_platinum_8176f_firmwarexeon_gold_6148fxeon_d-1520xeon_gold_5218_firmwarexeon_gold_6132xeon_d-2752terxeon_d-2799xeon_gold_6238t_firmwarexeon_d-2146nt_firmwarexeon_gold_6152xeon_platinum_8256xeon_gold_6238l_firmwarexeon_d-2795ntxeon_platinum_8158xeon_d-1739_firmwarexeon_gold_5218b_firmwarexeon_d-1736ntxeon_gold_6222vxeon_d-1713nt_firmwarexeon_d-1520_firmwarexeon_platinum_8176xeon_platinum_8160_firmwarexeon_gold_6242xeon_d-2798nt_firmwarexeon_silver_4112_firmwarexeon_d-1623nxeon_d-1531xeon_gold_6262v_firmwarexeon_gold_6142xeon_platinum_8260yxeon_platinum_8270xeon_d-1533nxeon_gold_6242rxeon_d-1722nexeon_gold_6148_firmwarexeon_gold_6128xeon_silver_4215xeon_gold_5220t_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarexeon_d-1718t_firmwarexeon_d-2142itxeon_gold_5118xeon_gold_5220_firmwarexeon_gold_6130fxeon_d-1622_firmwarexeon_silver_4210t_firmwarexeon_gold_6208u_firmwarexeon_d-2796nt_firmwarexeon_silver_4214xeon_gold_6142f_firmwarexeon_d-1702_firmwarexeon_platinum_8276xeon_d-1749nt_firmwarexeon_gold_6250_firmwarexeon_d-2161ixeon_silver_4210rxeon_platinum_8164_firmwarexeon_gold_6238txeon_d-2141i_firmwarexeon_silver_4214yxeon_gold_5218bxeon_silver_4216_firmwarexeon_gold_6138pxeon_gold_6254_firmwarexeon_gold_6138p_firmwarexeon_platinum_8176fxeon_gold_6240rxeon_d-1748texeon_gold_6258r_firmwarexeon_d-1513nxeon_d-1537xeon_d-2187nt_firmwarexeon_d-2752nte_firmwarexeon_d-1739xeon_d-1543nxeon_gold_6209uxeon_d-1528_firmwarexeon_d-1539_firmwarexeon_silver_4112xeon_d-1559xeon_gold_6226xeon_gold_6130_firmwarexeon_gold_6256xeon_d-1521xeon_d-1702xeon_gold_6238r_firmwarexeon_gold_5120txeon_gold_6230rxeon_gold_6252xeon_gold_6134xeon_d-1748te_firmwarexeon_d-1749ntxeon_d-1712tr_firmwarexeon_gold_6222v_firmwarexeon_platinum_8160f_firmwarexeon_gold_6226r_firmwarexeon_platinum_8260_firmwarexeon_gold_5218rxeon_gold_6226rxeon_bronze_3206rxeon_d-2183it_firmwarexeon_gold_6252_firmwarexeon_d-2753ntxeon_d-1557xeon_gold_6148xeon_d-2775texeon_gold_6209u_firmwarexeon_silver_4110_firmwarexeon_platinum_8260lxeon_gold_6144xeon_d-1714_firmwarexeon_d-1736nt_firmwarexeon_d-1602_firmwarexeon_d-1726xeon_platinum_9282_firmwarexeon_platinum_8180xeon_d-2177ntxeon_d-1553n_firmwarexeon_platinum_8276l_firmwarexeon_gold_6128_firmwarexeon_gold_5220tIntel(R) Processors
CVE-2020-12300
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.15% / 36.19%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:25
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-s2600wttrs2600cw2s_firmwares2600kpf_firmwares2600tp_firmwares2600kpr_firmwares2600tpfs2600wtts2600cwtrs2600tpf_firmwares2600kps2600cwtr_firmwares2600tprs2600tpnr_firmwares2600cw2rs2600wt2r_firmwares2600kp_firmwares2600cwtss2600cwtsr_firmwares2600tpnrs2600cw2sr_firmwares2600wtt_firmwares2600kpfs2600tps2600kptrs2600wtts1r_firmwares2600tpfr_firmwares2600cw2ss2600cwts_firmwares2600wt2_firmwares2600cwt_firmwares2600cw2s2600cwtsrs2600wttr_firmwares2600wtts1rs2600wt2rs2600kprs2600cw2_firmwares2600kptr_firmwares2600cwts2600cw2srs2600wt2s2600kpfrs2600tpfrs2600tpr_firmwares2600kpfr_firmwares2600cw2r_firmwareIntel(R) Server Board Families Advisory
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2020-12301
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.06% / 19.65%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 03:26
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-s2600wftr_firmwares2600bpbr_firmwares2600wfqrs2600stbrs2600stqr_firmwares2600wftrs2600wf0r_firmwares2600stbr_firmwares2600bpqr_firmwares2600wfqr_firmwares2600stqrs2600wf0rs2600bpsr_firmwares2600bpqrs2600bpbrs2600bpsrIntel(R) Server Board Families Advisory
CWE ID-CWE-665
Improper Initialization
CVE-2023-28385
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.04% / 11.07%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-10 Oct, 2024 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authorization in the Intel(R) NUC Pro Software Suite for Windows before version 2.0.0.9 may allow a privileged user to potentially enable escalation of privilage via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsnext_unit_of_computing_firmwareIntel(R) NUC Pro Software Suite for Windowsnuc_pro_software_suite
CWE ID-CWE-285
Improper Authorization
CVE-2022-40262
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-8.2||HIGH
EPSS-0.01% / 1.60%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 17:35
Updated-27 May, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The arbitrary write vulnerability in S3Resume2Pei leads to arbitrary code execution during PEI phase.

A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory. This issue affects: Module name: S3Resume2Pei SHA256: 7bb29f05534a8a1e010443213451425098faebd45948a4642db969b19d0253fc Module GUID: 89E549B0-7CFE-449D-9BA3-10D8B2312D71

Action-Not Available
Vendor-AMIIntel Corporation
Product-server_board_m10jnp2sbserver_board_m10jnp2sb_firmwareaptio_vAptio
CWE ID-CWE-123
Write-what-where Condition
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-36789
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.75%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_10_performance_mini_pc_nuc10i7fnkpanuc_10_performance_kit_nuc10i7fnk_firmwarenuc_10_performance_mini_pc_nuc10i7fnhjanuc_10_performance_kit_nuc10i5fnhnnuc_10_performance_kit_nuc10i7fnhc_firmwarenuc_10_performance_kit_nuc10i3fnh_firmwarenuc_10_performance_kit_nuc10i5fnhjnuc_10_performance_kit_nuc10i7fnhnuc_10_performance_kit_nuc10i3fnhn_firmwarenuc_10_performance_mini_pc_nuc10i3fnhja_firmwarenuc_10_performance_kit_nuc10i3fnknnuc_10_performance_kit_nuc10i3fnk_firmwarenuc_10_performance_kit_nuc10i5fnhn_firmwarenuc_10_performance_mini_pc_nuc10i5fnhja_firmwarenuc_10_performance_mini_pc_nuc10i3fnhfanuc_10_performance_kit_nuc10i7fnhcnuc_10_performance_kit_nuc10i5fnkn_firmwarenuc_10_performance_kit_nuc10i3fnhnuc_10_performance_kit_nuc10i3fnhf_firmwarenuc_10_performance_mini_pc_nuc10i5fnhcanuc_10_performance_kit_nuc10i5fnknnuc_10_performance_kit_nuc10i7fnhn_firmwarenuc_10_performance_kit_nuc10i3fnhnnuc_10_performance_kit_nuc10i5fnhj_firmwarenuc_10_performance_kit_nuc10i3fnhfnuc_10_performance_mini_pc_nuc10i7fnhaanuc_10_performance_mini_pc_nuc10i7fnkpa_firmwarenuc_10_performance_kit_nuc10i5fnkpnuc_10_performance_kit_nuc10i7fnhnnuc_10_performance_mini_pc_nuc10i7fnhja_firmwarenuc_10_performance_kit_nuc10i5fnkp_firmwarenuc_10_performance_kit_nuc10i5fnhnuc_10_performance_mini_pc_nuc10i3fnhfa_firmwarenuc_10_performance_kit_nuc10i7fnknnuc_10_performance_kit_nuc10i5fnhfnuc_10_performance_mini_pc_nuc10i7fnhaa_firmwarenuc_10_performance_kit_nuc10i3fnkn_firmwarenuc_10_performance_kit_nuc10i7fnkn_firmwarenuc_10_performance_kit_nuc10i7fnkp_firmwarenuc_10_performance_kit_nuc10i5fnknuc_10_performance_kit_nuc10i5fnh_firmwarenuc_10_performance_kit_nuc10i7fnh_firmwarenuc_10_performance_kit_nuc10i7fnknuc_10_performance_mini_pc_nuc10i3fnhjanuc_10_performance_mini_pc_nuc10i5fnkpanuc_10_performance_kit_nuc10i7fnkpnuc_10_performance_mini_pc_nuc10i5fnhca_firmwarenuc_10_performance_kit_nuc10i5fnk_firmwarenuc_10_performance_mini_pc_nuc10i5fnhjanuc_10_performance_kit_nuc10i5fnhf_firmwarenuc_10_performance_kit_nuc10i3fnknuc_10_performance_mini_pc_nuc10i5fnkpa_firmwareIntel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs
CWE ID-CWE-284
Improper Access Control
CVE-2022-36370
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.21%
||
7 Day CHG~0.00%
Published-11 Nov, 2022 | 15:48
Updated-05 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_board_nuc5i3mybe_firmwarenuc_kit_nuc5i3myhenuc_board_nuc5i3mybenuc_kit_nuc5i3myhe_firmwareIntel(R) NUC Boards and Intel(R) NUC Kits
CWE ID-CWE-287
Improper Authentication
CVE-2022-36396
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.07% / 23.11%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-03 Aug, 2024 | 10:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools before version iDmiEdit-Linux-5.27.06.0017 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel CorporationMicrosoft Corporation
Product-windowslinux_kernelaptio_v_uefi_firmware_integrator_toolsIntel(R) Aptio* V UEFI Firmware Integrator Tools
CWE ID-CWE-284
Improper Access Control
CVE-2022-36372
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.63%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-09 Oct, 2024 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_enthusiast_nuc8i7hvkva_firmwarenuc_business_nuc8i7hnkqc_firmwarenuc_8_compute_element_cm8ccb4rnuc_kit_nuc8i7hnkqcnuc_pro_kit_nuc8i3pnh_firmwarenuc_business_nuc8i7hnkqcnuc_pro_compute_element_nuc9v7qnb_firmwarenuc_pro_compute_element_nuc9v7qnx_firmwarenuc_8_compute_element_cm8i3cb4nnuc_rugged_kit_nuc8cchbnnuc_8_compute_element_cm8i7cb8nnuc_kit_nuc8i7hnknuc_rugged_kit_nuc8cchkrnuc_business_nuc8i7hvkva_firmwarenuc_enthusiast_nuc8i7hvkvanuc_8_compute_element_cm8i5cb8nnuc_pro_board_nuc8i3pnh_firmwarenuc_kit_nuc8i7hvknuc_pro_compute_element_nuc9v7qnbnuc_pro_compute_element_nuc9vxqnb_firmwarenuc_business_nuc8i7hvkvanuc_kit_nuc8i7hnk_firmwarenuc_pro_kit_nuc8i3pnknuc_enthusiast_nuc8i7hnknuc_pro_compute_element_nuc9vxqnxnuc_pro_board_nuc8i3pnk_firmwarenuc_business_nuc8i7hvkvawnuc_business_nuc8i7hnknuc_kit_nuc8i7hvkvawnuc_8_compute_element_cm8pcb4r_firmwarenuc_pro_board_nuc8i3pnb_firmwarenuc_pro_board_nuc8i3pnhnuc_8_compute_element_cm8ccb4r_firmwarenuc_enthusiast_nuc8i7hnkqcnuc_business_nuc8i7hnk_firmwarenuc_rugged_kit_nuc8cchbn_firmwarenuc_kit_nuc8i7hvk_firmwarenuc_8_compute_element_cm8pcb4rnuc_pro_kit_nuc8i3pnbnuc_enthusiast_nuc8i7hvkvaw_firmwarenuc_rugged_kit_nuc8cchbnuc_enthusiast_nuc8i7hvknuc_kit_nuc8i7hvkva_firmwarenuc_pro_kit_nuc8i3pnb_firmwarenuc_8_compute_element_cm8i3cb4n_firmwarenuc_rugged_kit_nuc8cchkr_firmwarenuc_kit_nuc8i7hvkvanuc_pro_kit_nuc8i3pnk_firmwarenuc_enthusiast_nuc8i7hvk_firmwarenuc_business_nuc8i7hvk_firmwarenuc_kit_nuc8i7hnkqc_firmwarenuc_8_compute_element_cm8i7cb8n_firmwarenuc_8_compute_element_cm8i5cb8n_firmwarenuc_kit_nuc8i7hvkvaw_firmwarenuc_rugged_kit_nuc8cchb_firmwarenuc_enthusiast_nuc8i7hnk_firmwarenuc_pro_compute_element_nuc9vxqnx_firmwarenuc_pro_board_nuc8i3pnknuc_pro_kit_nuc8i3pnhnuc_pro_board_nuc8i3pnbnuc_pro_compute_element_nuc9v7qnxnuc_pro_compute_element_nuc9vxqnbnuc_rugged_kit_nuc8cchkrn_firmwarenuc_rugged_kit_nuc8cchkrnnuc_enthusiast_nuc8i7hvkvawnuc_business_nuc8i7hvkvaw_firmwarenuc_enthusiast_nuc8i7hnkqc_firmwarenuc_business_nuc8i7hvkIntel(R) NUC BIOS firmwarebios
CWE ID-CWE-92
DEPRECATED: Improper Sanitization of Custom Special Characters
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-40885
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.03% / 7.38%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:10
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in the UEFI firmware of some Intel(R) Server M20NTP BIOS may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Server M20NTP BIOSm20ntp_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-39609
Matching Score-8
Assigner-Intel Corporation
ShareView Details
Matching Score-8
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.02% / 4.19%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:10
Updated-19 Nov, 2024 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control in UEFI firmware for some Intel(R) Server Board M70KLP may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_board_m70klp2sb_firmwareserver_board_m70klp2sbIntel(R) Server Board M70KLPm70klp_firmware
CWE ID-CWE-284
Improper Access Control
CVE-2019-0163
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.05% / 15.78%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 17:03
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in system firmware for Intel(R) Broadwell U i5 vPro before version MYBDWi5v.86A may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i5-5350u_firmwarei5-5350uIntel(R) NUC Advisory
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0094
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.19% / 40.60%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) Active Management Technology (AMT)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0166
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.5||HIGH
EPSS-0.93% / 75.12%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0168
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.14% / 34.85%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 12.0.45 and 13.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwaretrusted_execution_engine_firmwareIntel(R) CSME, Intel(R) TXE
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0097
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.34% / 56.04%
||
7 Day CHG-0.02%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) Active Management Technology (AMT)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0092
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.14% / 34.72%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) Active Management Technology (AMT)
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0147
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.29%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:23
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0165
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.13% / 33.79%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient Input validation in the subsystem for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10 may allow a privileged user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_management_engine_firmwareIntel(R) CSME
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0149
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.09%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:24
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-ethernet_controller_x710-at2_firmwareethernet_controller_x710-tm4_firmwareethernet_controller_x710-bm2_firmwareethernet_controller_710-bm1ethernet_controller_xxv710-am2ethernet_controller_xxv710-am1_firmwareethernet_controller_xxv710-am1ethernet_controller_x710-bm2ethernet_controller_xxv710-am2_firmwareethernet_700_series_softwareethernet_controller_x710-at2ethernet_controller_710-bm1_firmwareethernet_controller_x710-tm42019.2 IPU – Intel(R) Ethernet 700 Series Controllers
CWE ID-CWE-20
Improper Input Validation
CVE-2010-3268
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-6.51% / 90.72%
||
7 Day CHG~0.00%
Published-22 Dec, 2010 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request.

Action-Not Available
Vendor-n/aIntel CorporationMicrosoft CorporationSymantec Corporation
Product-windows_2000intel_alert_management_systemendpoint_protectionantivirusn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2024-28028
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.7||HIGH
EPSS-0.04% / 11.38%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 21:12
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Neural Compressor software before version v3.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Neural Compressor softwareneural_compressor_software
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0131
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-8.1||HIGH
EPSS-0.21% / 43.47%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 21:08
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-active_management_technology_firmwareIntel(R) AMT
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0115
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 32.04%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-graphics_driverIntel(R) Graphics Driver KMD module
CWE ID-CWE-20
Improper Input Validation
CVE-2019-0157
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.00%
||
7 Day CHG~0.00%
Published-13 Jun, 2019 | 15:36
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the Intel(R) SGX driver for Linux may allow an authenticated user to potentially enable a denial of service via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel Corporation
Product-software_guard_extensions_data_center_attestation_primitiveslinux_kernelsoftware_guard_extensionsIntel(R) SGX for Linux
CWE ID-CWE-20
Improper Input Validation
CVE-2023-48368
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 1.88%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-27 Aug, 2025 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-media_sdkIntel(R) Media SDK softwaremedia_sdk
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-20
Improper Input Validation
CVE-2024-24973
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-1||LOW
EPSS-0.03% / 6.84%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-31 Aug, 2024 | 03:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) Distribution for GDB software before version 2024.0.1 may allow an authenticated user to potentially enable denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-oneapi_base_toolkitdistribution_for_gdbIntel(R) Distribution for GDB software
CWE ID-CWE-20
Improper Input Validation
CVE-2018-3611
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.36%
||
7 Day CHG~0.00%
Published-15 May, 2018 | 14:00
Updated-16 Sep, 2024 | 23:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel Graphics Driver
CWE ID-CWE-20
Improper Input Validation
CVE-2018-3634
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.82%
||
7 Day CHG~0.00%
Published-15 May, 2018 | 14:00
Updated-16 Sep, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Parameter corruption in NDIS filter driver in Intel Online Connect Access 1.9.22.0 allows an attacker to cause a denial of service via local access.

Action-Not Available
Vendor-Intel Corporation
Product-online_connect_accessOnline Connect Access
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22015
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 20.85%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-01 Aug, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel(R) DLB driver software before version 8.5.0 may allow an authenticated user to potentially denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) DLB driver softwaredynamic_load_balancer
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22095
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 24.71%
||
7 Day CHG~0.00%
Published-16 May, 2024 | 20:47
Updated-20 Aug, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in PlatformVariableInitDxe driver in UEFI firmware for some Intel(R) Server D50DNP Family products may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-UEFI firmware for some Intel(R) Server D50DNP Family productsserver_system_d50tnp2mhsvac_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-21810
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 9.82%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 13:45
Updated-16 Aug, 2024 | 04:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Ethernet Network Controllers and Adaptersethernet_complete_driver_pack
CWE ID-CWE-20
Improper Input Validation
CVE-2024-22476
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-10||CRITICAL
EPSS-62.36% / 98.30%
||
7 Day CHG+0.15%
Published-16 May, 2024 | 20:46
Updated-01 Aug, 2024 | 22:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Neural Compressor software before version 2.5.0 may allow an unauthenticated user to potentially enable escalation of privilege via remote access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-Intel(R) Neural Compressor softwareneural_compressor_software
CWE ID-CWE-20
Improper Input Validation
CVE-2022-45469
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-2.2||LOW
EPSS-0.06% / 17.27%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-20
Improper Input Validation
CVE-2018-3650
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 15:00
Updated-17 Sep, 2024 | 02:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient Input Validation in Bleach module in INTEL Distribution for Python versions prior to IDP 2018 Update 2 allows unprivileged user to bypass URI sanitization via local vector.

Action-Not Available
Vendor-Intel Corporation
Product-distribution_for_pythonIntel Distribution for Python
CWE ID-CWE-20
Improper Input Validation
CVE-2023-22342
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.7||HIGH
EPSS-0.07% / 22.99%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-12 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-thunderbolt_dch_driverIntel(R) Thunderbolt(TM) DCH drivers for Windows
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 7
  • 8
  • Next
Details not found