Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.1 | 8.2 | HIGH | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Primary | 2.0 | 4.6 | MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
CWE-20 | Primary | nvd@nist.gov |
Hyperlink | Source | Resource |
---|---|---|
https://support.f5.com/csp/article/K56215245?utm_source=f5support&%3Butm_medium=RSS | secure@intel.com | N/A |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03967en_us | secure@intel.com | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html | secure@intel.com | Vendor Advisory |