Search criteria

70 vulnerabilities found for N/A by Intel

CERTFR-2025-AVI-0684

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel les processeurs Intel Processeur Intel Core de 8e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core de 13e génération sans les derniers correctifs de sécurité
Intel N/A AI Playground versions antérieures à v2.3.0 alpha
Intel les processeurs Intel Jeux de puces de la série Intel 700 sans les derniers correctifs de sécurité
Intel N/A QuickAssist Technology versions antérieures à 2.5.0
Intel les processeurs Intel Processeur Intel Xeon W série 2200 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Silver de 5e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel 500 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core i9 14900 sans les derniers correctifs de sécurité
Intel N/A Clock Jitter Tool versions antérieures à 6.0.1
Intel les processeurs Intel Processeur Intel Xeon Silver de 4e génération sans les derniers correctifs de sécurité
Intel N/A AI pour Enterprise Retrieval-augmented Generation versions antérieures à 1.1.0
Intel les processeurs Intel Processeur Intel Xeon W série 2100 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core de 11e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel 600 sans les derniers correctifs de sécurité
Intel N/A DSA versions antérieures à 25.2.15.9
Intel les processeurs Intel Jeux de puces de la série Intel C250 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Gold de 4e génération sans les derniers correctifs de sécurité
Intel N/A Pilotes Linux pour Intel 700 Series Ethernet versions antérieures à 2.28.5
Intel N/A Module Trust Domain Extensions (TDX) pour les processeurs Xeon de 4e et 5e génération et pour les processeurs Xeon avec E-cores versions antérieures à 1.5.13
Intel N/A Firmware package et LED mode toggle tool pour Intel PCIe Switch toutes versions
Intel les processeurs Intel Jeux de puces Intel 790 sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Intel Pentium Gold (G54XXU) sans les derniers correctifs de sécurité
Intel les processeurs Intel Famille de processeurs Intel Xeon E sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeurs Intel Core (Série 1) sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Scalable de 3e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces Intel X299 sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel C240 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon W série 10000/1200 sans les derniers correctifs de sécurité
Intel N/A UEFI pour Intel Xeon 6 sans les derniers correctifs de sécurité
Intel N/A Processeurs Intel Xeon sans les derniers correctifs de sécurité
Intel les processeurs Intel Famille de processeurs Intel Celeron sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel C230 sans les derniers correctifs de sécurité
Intel N/A Intel RealSense Dynamic Calibrator versions antérieures à 2.14.2.0
Intel les processeurs Intel Processeur Intel Core de 10e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Scalable de 4e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Intel Celeron J4000/N4000 sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Intel Pentium J4000/N4000 sans les derniers correctifs de sécurité
Intel N/A Out of band management service module (OOB-MSM) pour les processeurs Xeon 6 sans les derniers correctifs de sécurité
Intel N/A Intel Distribution pour Python versions antérieures à 2025.1.0
Intel les processeurs Intel Processeurs Intel Xeon W2400 et W3400 sans les derniers correctifs de sécurité
Intel les processeurs Intel Famille de processeurs Intel Core de 13e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Celeron série 4000 sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Intel Atom X E3900 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon W séries 2400 et 3400 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Gold de 5e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel C620 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur de la série Intel Xeon CPU Max (mémoire à haute bande passante HBM) sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Bronze de 4e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core série U sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeurs Intel Pentium et Celeron séries N et J sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core de 9e génération sans les derniers correctifs de sécurité
Intel N/A Intel oneAPI Toolkits sans les derniers correctifs de sécurité
Intel les processeurs Intel Famille de processeurs Intel Pentium Gold sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core i9 13900 sans les derniers correctifs de sécurité
Intel N/A Pilotes Linux pour Intel I350 Series Ethernet versions antérieures à 5.19.2
Intel les processeurs Intel Processeur Intel Xeon Platinum de 4e génération sans les derniers correctifs de sécurité
Intel N/A LMS versions antérieures à 2514.7.16.0
Intel les processeurs Intel Processeur Intel Core série X sans les derniers correctifs de sécurité
Intel N/A PROSet/Wireless Wi-Fi versions antérieures à 23.110.0.5
Intel les processeurs Intel Processeur Intel Xeon E sans les derniers correctifs de sécurité
Intel N/A Edge Orchestrator pour Intel Tiber Edge Platform pour AWS versions antérieures à 24.11.1
Intel les processeurs Intel Intel Core 9 sans les derniers correctifs de sécurité
Intel N/A Pilotes Linux pour Intel 800 Series Ethernet versions antérieures à 1.17.2
Intel les processeurs Intel Processeur Intel Core i7 14700 sans les derniers correctifs de sécurité
Intel N/A Bibliothèque TinyCBOR versions antérieures à 0.6.1
Intel les processeurs Intel Processeurs Intel Core Ultra (Série 1) sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Platinum de 5e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Intel Atom P5000 sans les derniers correctifs de sécurité
Intel N/A Intel Driver & Support Assistant versions antérieures à 24.6.49.8
Intel les processeurs Intel Processeur Celeron série 6000 sans les derniers correctifs de sécurité
Intel N/A Pilotes Graphics pour processeurs Intel Core de générations 7 à 10 et Intel Atom Pentium et Céléron versions antérieures à 31.0.101.2135
Intel N/A Pilotes Graphics pour Arc et Iris Xe versions antérieures à 32.0.101.6737
Intel les processeurs Intel Processeurs Intel Core (Série 2) sans les derniers correctifs de sécurité
Intel N/A Micrologiciel pour Intel E810 Ethernet NVM versions antérieures à 4.6
Intel les processeurs Intel Série Intel Atom x6000E sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Celeron série G sans les derniers correctifs de sécurité
Intel N/A Pilotes Graphics pour Data Center GPU Flex versions antérieures à 32.0.101.6733
Intel N/A Trace Analyzer and Collector toutes versions
Intel les processeurs Intel Série de processeurs Intel Pentium Gold sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel C620A sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon W série 1300 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon de 5e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core i9 13900E sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core i7 14701E sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon de 5e générationJeu de puces Intel C420 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core de 12e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeurs Intel Core i9 de 13e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Celeron série G sans les derniers correctifs de sécurité
Intel N/A Edger8r pour Intel Software Guard Extensions SDK (Intel SGX SDK) toutes versions
Intel les processeurs Intel Série de processeurs Intel Celeron J3000/N3000 sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel C740 sans les derniers correctifs de sécurité
Intel N/A Module Trust Domain Extensions (TDX) pour les processeurs Xeon 6 versions antérieures à 2.0.8
Intel les processeurs Intel Jeux de puces de la série Intel 100 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Scalable de 5e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeurs Intel Xeon Scalable de 4e génération avec Intel vRAN sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel 300 sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel 200 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core de 7e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Famille de processeurs Intel Core de 14e génération sans les derniers correctifs de sécurité
Intel N/A Device Plugins for Kubernetes versions antérieures à 0.32.0
Intel N/A Connectivity Performance Suite versions antérieures à 40.24.11210
Intel les processeurs Intel Jeux de puces Intel C420 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core i9 14901E sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core i9 14900HX sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Core de 6e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Jeux de puces de la série Intel 400 sans les derniers correctifs de sécurité
Intel N/A Trust Domain Extensions (TDX) versions antérieures à 1.5.07.00.774
Intel les processeurs Intel Processeur Intel Xeon Bronze de 5e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Intel Pentium J5000/N5000 sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel série N sans les derniers correctifs de sécurité
Intel les processeurs Intel Famille de processeurs Intel Core de 12e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Pentium Silver sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Celeron série N sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeurs Intel Core Ultra (Série 2) sans les derniers correctifs de sécurité
Intel les processeurs Intel Processeur Intel Xeon Edge Enhanced de 4e génération sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de jeux de puces Intel C240 sans les derniers correctifs de sécurité
Intel les processeurs Intel Série de processeurs Pentium Gold sans les derniers correctifs de sécurité
Intel N/A Rapid Storage Technology versions antérieures à 20.2.1.1016
References
Bulletin de sécurité Intel INTEL-SA-01316 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01296 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01347 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01335 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01329 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01280 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01257 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01342 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01313 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01192 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01300 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01245 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01310 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01383 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01318 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01308 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01321 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01339 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01317 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01311 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01292 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01285 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01367 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01345 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01266 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01286 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01301 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01338 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01299 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01352 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01249 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01298 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01312 2025-08-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01326 2025-08-12 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Processeur Intel Core de 8e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 13e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "AI Playground versions ant\u00e9rieures \u00e0 v2.3.0 alpha",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel 700 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "QuickAssist Technology versions ant\u00e9rieures \u00e0 2.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon W s\u00e9rie 2200 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Silver de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel 500 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core i9 14900 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Clock Jitter Tool versions ant\u00e9rieures \u00e0 6.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Silver de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "AI pour Enterprise Retrieval-augmented Generation versions ant\u00e9rieures \u00e0 1.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon W s\u00e9rie 2100 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 11e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel 600 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "DSA versions ant\u00e9rieures \u00e0 25.2.15.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel C250 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Gold de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Linux pour Intel 700 Series Ethernet versions ant\u00e9rieures \u00e0 2.28.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Module Trust Domain Extensions (TDX) pour les processeurs Xeon de 4e et 5e g\u00e9n\u00e9ration et pour les processeurs Xeon avec E-cores versions ant\u00e9rieures \u00e0 1.5.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Firmware package et LED mode toggle tool pour Intel PCIe Switch toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces Intel 790 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Pentium Gold (G54XXU) sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon E sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Core (S\u00e9rie 1) sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Scalable de 3e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces Intel X299 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel C240 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon W s\u00e9rie 10000/1200 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "UEFI pour Intel Xeon 6 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Celeron sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel C230 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RealSense Dynamic Calibrator versions ant\u00e9rieures \u00e0 2.14.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 10e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Scalable de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Celeron J4000/N4000 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Pentium J4000/N4000 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Out of band management service module (OOB-MSM) pour les processeurs Xeon 6 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2025.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon W2400 et W3400 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core de 13e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Celeron s\u00e9rie 4000 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Atom X E3900 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon W s\u00e9ries 2400 et 3400 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Gold de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel C620 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur de la s\u00e9rie Intel Xeon CPU Max (m\u00e9moire \u00e0 haute bande passante HBM) sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Bronze de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core s\u00e9rie U sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Pentium et Celeron s\u00e9ries N et J sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 9e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Toolkits sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Pentium Gold sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core i9 13900 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Linux pour Intel I350 Series Ethernet versions ant\u00e9rieures \u00e0 5.19.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Platinum de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "LMS versions ant\u00e9rieures \u00e0 2514.7.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core s\u00e9rie X sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "PROSet/Wireless Wi-Fi versions ant\u00e9rieures \u00e0 23.110.0.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon E sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Edge Orchestrator pour Intel Tiber Edge Platform pour AWS versions ant\u00e9rieures \u00e0 24.11.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Core 9 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Linux pour Intel 800 Series Ethernet versions ant\u00e9rieures \u00e0 1.17.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core i7 14700 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Biblioth\u00e8que TinyCBOR versions ant\u00e9rieures \u00e0 0.6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Core Ultra (S\u00e9rie 1) sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Platinum de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Atom P5000 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Driver \u0026 Support Assistant versions ant\u00e9rieures \u00e0 24.6.49.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Celeron s\u00e9rie 6000 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Graphics pour processeurs Intel Core de g\u00e9n\u00e9rations 7 \u00e0 10 et Intel Atom Pentium et C\u00e9l\u00e9ron versions ant\u00e9rieures \u00e0 31.0.101.2135",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Graphics pour Arc et Iris Xe versions ant\u00e9rieures \u00e0 32.0.101.6737",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Core (S\u00e9rie 2) sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel pour Intel E810 Ethernet NVM versions ant\u00e9rieures \u00e0 4.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie Intel Atom x6000E sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Celeron s\u00e9rie G sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Graphics pour Data Center GPU Flex versions ant\u00e9rieures \u00e0 32.0.101.6733",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Trace Analyzer and Collector toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Pentium Gold sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel C620A sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon W s\u00e9rie 1300 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core i9 13900E sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core i7 14701E sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon de 5e g\u00e9n\u00e9rationJeu de puces Intel C420 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 12e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Core i9 de 13e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Celeron s\u00e9rie G sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Edger8r pour Intel Software Guard Extensions SDK (Intel SGX SDK) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Celeron J3000/N3000 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel C740 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Module Trust Domain Extensions (TDX) pour les processeurs Xeon 6 versions ant\u00e9rieures \u00e0 2.0.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel 100 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Scalable de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon Scalable de 4e g\u00e9n\u00e9ration avec Intel vRAN sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel 300 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel 200 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 7e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core de 14e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Device Plugins for Kubernetes versions ant\u00e9rieures \u00e0 0.32.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Connectivity Performance Suite versions ant\u00e9rieures \u00e0 40.24.11210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces Intel C420 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core i9 14901E sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core i9 14900HX sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 6e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Jeux de puces de la s\u00e9rie Intel 400 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Trust Domain Extensions (TDX) versions ant\u00e9rieures \u00e0 1.5.07.00.774",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Bronze de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Intel Pentium J5000/N5000 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel s\u00e9rie N sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core de 12e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Pentium Silver sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Celeron s\u00e9rie N sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Core Ultra (S\u00e9rie 2) sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon Edge Enhanced de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de jeux de puces Intel C240 sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9rie de processeurs Pentium Gold sans les derniers correctifs de s\u00e9curit\u00e9",
      "product": {
        "name": "les processeurs Intel",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Rapid Storage Technology versions ant\u00e9rieures \u00e0 20.2.1.1016",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-20627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20627"
    },
    {
      "name": "CVE-2025-24523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24523"
    },
    {
      "name": "CVE-2025-24515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24515"
    },
    {
      "name": "CVE-2025-20109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20109"
    },
    {
      "name": "CVE-2025-20099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20099"
    },
    {
      "name": "CVE-2025-25273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25273"
    },
    {
      "name": "CVE-2025-24840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24840"
    },
    {
      "name": "CVE-2024-33607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33607"
    },
    {
      "name": "CVE-2025-26472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26472"
    },
    {
      "name": "CVE-2025-20037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20037"
    },
    {
      "name": "CVE-2025-26403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26403"
    },
    {
      "name": "CVE-2025-26404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26404"
    },
    {
      "name": "CVE-2025-22392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22392"
    },
    {
      "name": "CVE-2025-20093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20093"
    },
    {
      "name": "CVE-2025-24923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24923"
    },
    {
      "name": "CVE-2025-21090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21090"
    },
    {
      "name": "CVE-2025-24835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24835"
    },
    {
      "name": "CVE-2025-24302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24302"
    },
    {
      "name": "CVE-2025-20613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20613"
    },
    {
      "name": "CVE-2025-22839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22839"
    },
    {
      "name": "CVE-2025-24511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24511"
    },
    {
      "name": "CVE-2025-20092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20092"
    },
    {
      "name": "CVE-2025-24303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24303"
    },
    {
      "name": "CVE-2025-21093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21093"
    },
    {
      "name": "CVE-2025-22853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22853"
    },
    {
      "name": "CVE-2025-22889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22889"
    },
    {
      "name": "CVE-2025-26470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26470"
    },
    {
      "name": "CVE-2025-20067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20067"
    },
    {
      "name": "CVE-2025-22840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22840"
    },
    {
      "name": "CVE-2025-32004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32004"
    },
    {
      "name": "CVE-2025-24484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24484"
    },
    {
      "name": "CVE-2025-20017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20017"
    },
    {
      "name": "CVE-2025-24323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24323"
    },
    {
      "name": "CVE-2025-27250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27250"
    },
    {
      "name": "CVE-2025-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27537"
    },
    {
      "name": "CVE-2025-20090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20090"
    },
    {
      "name": "CVE-2025-21096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21096"
    },
    {
      "name": "CVE-2025-20053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20053"
    },
    {
      "name": "CVE-2025-27717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27717"
    },
    {
      "name": "CVE-2025-27576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27576"
    },
    {
      "name": "CVE-2025-20077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20077"
    },
    {
      "name": "CVE-2025-32086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32086"
    },
    {
      "name": "CVE-2025-27559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27559"
    },
    {
      "name": "CVE-2025-24921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24921"
    },
    {
      "name": "CVE-2025-26697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26697"
    },
    {
      "name": "CVE-2025-22838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22838"
    },
    {
      "name": "CVE-2025-26863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26863"
    },
    {
      "name": "CVE-2025-24520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24520"
    },
    {
      "name": "CVE-2025-20025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20025"
    },
    {
      "name": "CVE-2025-20048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20048"
    },
    {
      "name": "CVE-2025-22836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22836"
    },
    {
      "name": "CVE-2025-20074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20074"
    },
    {
      "name": "CVE-2025-27707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27707"
    },
    {
      "name": "CVE-2025-24313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24313"
    },
    {
      "name": "CVE-2025-22893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22893"
    },
    {
      "name": "CVE-2025-20044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20044"
    },
    {
      "name": "CVE-2025-23241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23241"
    },
    {
      "name": "CVE-2025-24325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24325"
    },
    {
      "name": "CVE-2025-21086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21086"
    },
    {
      "name": "CVE-2025-20087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20087"
    },
    {
      "name": "CVE-2025-20625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20625"
    },
    {
      "name": "CVE-2025-24324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24324"
    },
    {
      "name": "CVE-2025-24486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24486"
    },
    {
      "name": "CVE-2025-20023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20023"
    },
    {
      "name": "CVE-2025-24296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24296"
    },
    {
      "name": "CVE-2025-24305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24305"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0684",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01316",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01316.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01296",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01347",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01347.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01335",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01329",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01329.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01280",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01257",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01257.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01342",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01342.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01313",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01192",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01192.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01300",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01300.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01245",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01245.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01310",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01383",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01383.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01318",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01318.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01308",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01321",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01321.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01339",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01339.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01317",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01311",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01292",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01292.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01285",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01367",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01345",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01345.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01266",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01266.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01286",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01286.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01301",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01301.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01338",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01338.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01299",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01352",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01352.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01249",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01298",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01298.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01312",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01326",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html"
    }
  ]
}

CERTFR-2025-AVI-0497

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans les processeurs Intel. Elle permet à un attaquant de provoquer un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A les processeurs Intel sans le dernier correctif de sécurité
References
Bulletin de sécurité Intel INTEL-SA-01209 2025-06-10 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "les processeurs Intel sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-2884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2884"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0497",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les processeurs Intel. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les processeurs Intel",
  "vendor_advisories": [
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01209",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html"
    }
  ]
}

CERTFR-2025-AVI-0402

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A Intel RealSense SDK software versions antérieures à 2.56.2.
Intel N/A Intel Advisor standalone component software software versions antérieures à 2024.2.
Intel N/A Intel Server Board D50DNP et M50FCP UEFI versions antérieures à R01.02.0003.
Intel N/A Intel Ethernet Connections Boot Utility versions antérieures à 29.4.
Intel N/A 9th Gen Intel Core processor family
Intel N/A OpenVINO model server software maintained by Intel versions antérieures à 2024.4.
Intel N/A Intel oneAPI Level Zero software versions antérieures à 1.5.4.
Intel N/A NVM Update Utility for Intel Ethernet Network Adapter E810 Series versions antérieures à 4.6.
Intel N/A Intel Arc Pro graphics versions antérieures à 32.0.101.6303.
Intel N/A Intel Graphics Driver software versions antérieures à 32.0.101.6083_101.5736.
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2024.2.
Intel N/A Intel Atom, Pentium et Celeron processor family
Intel N/A Intel Iris Xe Dedicated Graphics family
Intel N/A Edge Orchestrator software versions antérieures à 24.11 for Intel Tiber Edge Platform.
Intel N/A Endurance Gaming Mode software versions antérieures à 1.5.651.0.
Intel N/A Intel QAT software versions antérieures à 2.3.0.
Intel N/A Intel Network Adapter Driver for Microsoft Windows 11 versions antérieures à 29.4.
Intel N/A 13th Gen Intel Core processor family
Intel N/A 12th Gen Intel Core processor family
Intel N/A FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler software for Windows versions antérieures à 2025.0.0.
Intel N/A 7th-10th Gen Intel Core processor family versions antérieures à 31.0.101.2134.
Intel N/A Intel Atom, Pentium et Celeron processors versions antérieures à 31.0.101.2134.
Intel N/A Intel Arc Graphics family
Intel N/A Intel Data Center GPU Flex Series versions antérieures à 32.0.101.6314.
Intel N/A 10th Gen Intel Core processor family
Intel N/A Intel Graphics Windows DCH driver software versions antérieures à 30.0.100.9955.
Intel N/A Intel 7th-10th Gen Processor Graphics for Windows driver versions antérieures à 31.0.101.2130:
Intel N/A Intel Data Center GPU Flex Series for Windows driver versions antérieures à 31.0.101.4314: Intel Data Center GPU Flex 140 Intel Data Center GPU Flex 170
Intel N/A Administrative Tools for Intel Network Adapters versions antérieures à 29.4.
Intel N/A Intel Arc et Iris Xe Graphics for Windows driver versions antérieures à 32.0.101.6083/32.0.101.5736:
Intel N/A Intel Graphics Drivers pour Intel Arc graphics versions antérieures à 32.0.101.6449/32.0.101.6256.
Intel N/A Intel 6th Gen Processor Graphics driver toutes versions.
Intel N/A Intel Core Ultra processor family
Intel N/A 11th Gen Intel Core processor family
Intel N/A 8th Gen Intel Core processor family
Intel N/A Intel Graphics Windows DCH driver software versions antérieures à 30.0.101.1191.
Intel N/A Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.4.
Intel N/A 7th Gen Intel Core processor family
Intel N/A Intel Gaudi software installer versions antérieures à before 1.18.
Intel N/A Intel oneAPI DPC++/C++ Compiler software versions antérieures à 2025.0.0
Intel N/A Intel Arc™ Pro A-series graphics versions antérieures à 30.0.101.1729.
Intel N/A Intel Core Processor with Intel Hybrid Technology
Intel N/A Intel Simics Package Manager software versions antérieures à 1.12.0.
Intel N/A 14th Gen Intel Core processor family
Intel N/A Intel Pentium et Celeron processor family
Intel N/A Intel Arc™ A-Series graphics versions antérieures à 31.0.101.3277.
Intel N/A Intel Iris Xe graphics versions antérieures à 32.0.101.6449/32.0.101.6256.
References
Bulletin de sécurité Intel INTEL-SA-01268 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01216 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01271 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01290 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01252 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01274 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01293 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01305 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01263 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01244 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01254 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01270 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01272 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01297 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01259 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01278 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01239 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01273 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01180 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01295 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01253 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01243 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01269 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01247 2025-05-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01294 2025-05-13 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel RealSense SDK software versions ant\u00e9rieures \u00e0 2.56.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advisor standalone component software software versions ant\u00e9rieures \u00e0 2024.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board D50DNP et M50FCP UEFI versions ant\u00e9rieures \u00e0 R01.02.0003.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Connections Boot Utility versions ant\u00e9rieures \u00e0 29.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "9th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "OpenVINO model server software maintained by Intel versions ant\u00e9rieures \u00e0 2024.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Level Zero software versions ant\u00e9rieures \u00e0 1.5.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "NVM Update Utility for Intel Ethernet Network Adapter E810 Series versions ant\u00e9rieures \u00e0 4.6.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Pro graphics versions ant\u00e9rieures \u00e0 32.0.101.6303.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Graphics Driver software versions ant\u00e9rieures \u00e0 32.0.101.6083_101.5736.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Atom, Pentium et Celeron processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Iris Xe Dedicated Graphics family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Edge Orchestrator software versions ant\u00e9rieures \u00e0 24.11 for Intel Tiber Edge Platform.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Endurance Gaming Mode software versions ant\u00e9rieures \u00e0 1.5.651.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QAT software versions ant\u00e9rieures \u00e0 2.3.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Network Adapter Driver for Microsoft Windows 11 versions ant\u00e9rieures \u00e0 29.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "13th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "12th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler software for Windows versions ant\u00e9rieures \u00e0 2025.0.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "7th-10th Gen Intel Core processor family versions ant\u00e9rieures \u00e0 31.0.101.2134.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Atom, Pentium et Celeron processors versions ant\u00e9rieures \u00e0 31.0.101.2134.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Graphics family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center GPU Flex Series versions ant\u00e9rieures \u00e0 32.0.101.6314.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "10th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Graphics Windows DCH driver software versions ant\u00e9rieures \u00e0 30.0.100.9955.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 7th-10th Gen Processor Graphics for Windows driver versions ant\u00e9rieures \u00e0 31.0.101.2130:",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center GPU Flex Series for Windows driver versions ant\u00e9rieures \u00e0 31.0.101.4314:\n\nIntel Data Center GPU Flex 140\nIntel Data Center GPU Flex 170\n",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Administrative Tools for Intel Network Adapters versions ant\u00e9rieures \u00e0 29.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc et Iris Xe Graphics for Windows driver versions ant\u00e9rieures \u00e0 32.0.101.6083/32.0.101.5736:",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Graphics Drivers pour Intel Arc graphics versions ant\u00e9rieures \u00e0 32.0.101.6449/32.0.101.6256.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 6th Gen Processor Graphics driver toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Core Ultra processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "11th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "8th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Graphics Windows DCH driver software versions ant\u00e9rieures \u00e0 30.0.101.1191.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "7th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Gaudi software installer versions ant\u00e9rieures \u00e0 before 1.18.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI DPC++/C++ Compiler software versions ant\u00e9rieures \u00e0 2025.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc\u2122 Pro A-series graphics versions ant\u00e9rieures \u00e0 30.0.101.1729.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Core Processor with Intel Hybrid Technology",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Simics Package Manager software versions ant\u00e9rieures \u00e0 1.12.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "14th Gen Intel Core processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Pentium et Celeron processor family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc\u2122 A-Series graphics versions ant\u00e9rieures \u00e0 31.0.101.3277.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Iris Xe graphics versions ant\u00e9rieures \u00e0 32.0.101.6449/32.0.101.6256.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-20618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20618"
    },
    {
      "name": "CVE-2025-20008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20008"
    },
    {
      "name": "CVE-2024-31150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31150"
    },
    {
      "name": "CVE-2025-20041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20041"
    },
    {
      "name": "CVE-2025-20043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20043"
    },
    {
      "name": "CVE-2025-21099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21099"
    },
    {
      "name": "CVE-2025-22892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22892"
    },
    {
      "name": "CVE-2025-20084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20084"
    },
    {
      "name": "CVE-2025-20022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20022"
    },
    {
      "name": "CVE-2025-23233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23233"
    },
    {
      "name": "CVE-2025-20095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20095"
    },
    {
      "name": "CVE-2025-20101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20101"
    },
    {
      "name": "CVE-2024-45067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45067"
    },
    {
      "name": "CVE-2024-43420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43420"
    },
    {
      "name": "CVE-2025-22848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22848"
    },
    {
      "name": "CVE-2025-20039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20039"
    },
    {
      "name": "CVE-2025-20006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20006"
    },
    {
      "name": "CVE-2025-22843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22843"
    },
    {
      "name": "CVE-2025-21094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21094"
    },
    {
      "name": "CVE-2025-20616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20616"
    },
    {
      "name": "CVE-2025-22446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22446"
    },
    {
      "name": "CVE-2024-48869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48869"
    },
    {
      "name": "CVE-2024-28954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28954"
    },
    {
      "name": "CVE-2024-39833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39833"
    },
    {
      "name": "CVE-2025-20003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20003"
    },
    {
      "name": "CVE-2025-20629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20629"
    },
    {
      "name": "CVE-2024-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21829"
    },
    {
      "name": "CVE-2025-20018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20018"
    },
    {
      "name": "CVE-2025-22895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22895"
    },
    {
      "name": "CVE-2024-43101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43101"
    },
    {
      "name": "CVE-2025-20013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20013"
    },
    {
      "name": "CVE-2025-22844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22844"
    },
    {
      "name": "CVE-2025-20057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20057"
    },
    {
      "name": "CVE-2025-21100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21100"
    },
    {
      "name": "CVE-2024-47550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47550"
    },
    {
      "name": "CVE-2024-39758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39758"
    },
    {
      "name": "CVE-2024-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21859"
    },
    {
      "name": "CVE-2025-20612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20612"
    },
    {
      "name": "CVE-2025-20046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20046"
    },
    {
      "name": "CVE-2024-47800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47800"
    },
    {
      "name": "CVE-2025-24308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24308"
    },
    {
      "name": "CVE-2025-20611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20611"
    },
    {
      "name": "CVE-2024-28047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28047"
    },
    {
      "name": "CVE-2025-20082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20082"
    },
    {
      "name": "CVE-2025-20054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20054"
    },
    {
      "name": "CVE-2025-20034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20034"
    },
    {
      "name": "CVE-2025-20047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20047"
    },
    {
      "name": "CVE-2024-31073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31073"
    },
    {
      "name": "CVE-2025-20079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20079"
    },
    {
      "name": "CVE-2025-20052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20052"
    },
    {
      "name": "CVE-2024-29222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29222"
    },
    {
      "name": "CVE-2025-21081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21081"
    },
    {
      "name": "CVE-2025-22448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22448"
    },
    {
      "name": "CVE-2025-20015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20015"
    },
    {
      "name": "CVE-2025-20083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20083"
    },
    {
      "name": "CVE-2025-20026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20026"
    },
    {
      "name": "CVE-2025-20624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20624"
    },
    {
      "name": "CVE-2025-20103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20103"
    },
    {
      "name": "CVE-2024-46895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46895"
    },
    {
      "name": "CVE-2024-36292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36292"
    },
    {
      "name": "CVE-2025-20071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20071"
    },
    {
      "name": "CVE-2025-20031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20031"
    },
    {
      "name": "CVE-2025-20100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20100"
    },
    {
      "name": "CVE-2025-20104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20104"
    },
    {
      "name": "CVE-2024-31157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31157"
    },
    {
      "name": "CVE-2025-20108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20108"
    },
    {
      "name": "CVE-2025-20623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20623"
    },
    {
      "name": "CVE-2025-20076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20076"
    },
    {
      "name": "CVE-2024-28036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28036"
    },
    {
      "name": "CVE-2024-45333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45333"
    },
    {
      "name": "CVE-2024-47795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47795"
    },
    {
      "name": "CVE-2025-20032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20032"
    },
    {
      "name": "CVE-2025-20004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20004"
    },
    {
      "name": "CVE-2025-20009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20009"
    },
    {
      "name": "CVE-2024-31155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31155"
    },
    {
      "name": "CVE-2025-20062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20062"
    },
    {
      "name": "CVE-2024-45332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45332"
    },
    {
      "name": "CVE-2024-45371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45371"
    },
    {
      "name": "CVE-2025-20030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20030"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0402",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01268",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01268.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01216",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01216.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01271",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01271.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01290",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01290.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01252",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01252.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01274",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01274.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01293",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01293.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01305",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01263",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01263.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01244",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01254",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01254.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01270",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01272",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01272.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01297",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01297.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01259",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01278",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01278.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01239",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01273",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01273.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01180",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01180.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01295",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01295.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01253",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01253.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01243",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01243.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01269",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01247",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01294",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01294.html"
    }
  ]
}

CERTFR-2025-AVI-0394

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A les processeurs Intel sans le dernier correctif de sécurité
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "les processeurs Intel sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-20012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20012"
    },
    {
      "name": "CVE-2024-28956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
    },
    {
      "name": "CVE-2025-24495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24495"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0394",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01153",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01322",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html"
    }
  ]
}

CERTFR-2025-AVI-0119

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A Intel Arc Pro Graphics pour pilote Windows versions antérieures à 31.0.101.5978
Intel N/A Intel Battery Life Diagnostic Tool versions antérieures à 2.4.1
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2024.2
Intel N/A Intel DSA versions antérieures à 23.4.39
Intel N/A Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.1
Intel N/A Intel MPI Library pour Windows versions antérieures à 2021.13
Intel N/A Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.3
Intel N/A EPCT versions antérieures à 1.42.8.0
Intel N/A Intel XTU versions antérieures à 7.14.2.14
Intel N/A Intel GPA versions antérieures à 2024.3
Intel N/A Intel 7th-10th Gen Processor Graphics pour pilote Windows versions antérieures à 31.0.101.2130
Intel N/A Intel MLC versions antérieures à v3.11b
Intel N/A Intel Chipset Software Installation Utility version antérieures à 10.1.19867.8574
Intel N/A Intel GPA Framework versions antérieures à 2024.3
Intel N/A Intel Arc Iris Xe graphics pour Windows versions antérieures à 31.0.101.5186_101.5234
Intel N/A Intel Ethernet Connection I219 Series
Intel N/A Intel 7th-10th Gen Processor graphics pour Windows versions antérieures à 31.0.101.2130
Intel N/A Intel DSA versions antérieures à 24.2.19.5
Intel N/A Intel Data Center GPU Flex Series pour pilote Windows versions antérieures à 31.0.101.5768
Intel N/A Intel Arc Iris Xe Graphics pour pilote Windows versions antérieures à 31.0.101.5768
Intel N/A Intel Thread Director Visualizer versions antérieures à 1.0.1
Intel N/A BIOS and System Firmware Update Package for Intel Server M50FCP family versions antérieures à R01.02.0002
Intel N/A Intel Advisor versions antérieures à 2024.2
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2024.2
Intel N/A Intel QuickAssist Technology versions antérieures à 2.2.0
Intel N/A Intel Quartus Prime Standard Edition Design Software versions antérieures à 23.1.1 Patch 1.01std
Intel N/A Intel VPL software pour Windows version 2023.4.0
Intel N/A FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler versions antérieures à 2024.2
Intel N/A Intel 800 Series Ethernet Linux Kernel Mode Driver versions antérieures à 1.15.4
Intel N/A Intel High Level Synthesis Compiler versions antérieures à 24.2
Intel N/A Intel RealSense D400 Series Universal Windows Platform (UWP) Driver pour Windows 10 toutes versions
Intel N/A Intel Quartus Prime Lite Edition Design Software versions antérieures à 23.1.1 Patch 1.01std
Intel N/A Intel Arc Pro graphics pour Windows versions antérieures à 31.0.101.5319
Intel N/A Intel Data Center GPU Flex Series pour Windows versions antérieures à 31.0.101.5333
References
Bulletin de sécurité Intel INTEL-SA-01139 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01215 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01120 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01124 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01237 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01230 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01231 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01144 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01224 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01044 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01213 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01218 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01235 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01214 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01203 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01166 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01236 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01228 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01198 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00990 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01194 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01238 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01240 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01207 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01232 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00590 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01156 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01227 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01184 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01152 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00606 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01233 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01030 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01208 2025-02-10 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Arc Pro Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5978",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 2.4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 23.4.39",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library pour Windows versions ant\u00e9rieures \u00e0 2021.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "EPCT versions ant\u00e9rieures \u00e0 1.42.8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel XTU versions ant\u00e9rieures \u00e0 7.14.2.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel GPA versions ant\u00e9rieures \u00e0 2024.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 7th-10th Gen Processor Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.2130",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MLC versions ant\u00e9rieures \u00e0 v3.11b",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Chipset Software Installation Utility version ant\u00e9rieures \u00e0 10.1.19867.8574",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel GPA Framework versions ant\u00e9rieures \u00e0 2024.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Iris Xe graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5186_101.5234",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Connection I219 Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 7th-10th Gen Processor graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.2130",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 24.2.19.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center GPU Flex Series pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5768",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Iris Xe Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5768",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Thread Director Visualizer versions ant\u00e9rieures \u00e0 1.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "BIOS and System Firmware Update Package for Intel Server M50FCP family versions ant\u00e9rieures \u00e0 R01.02.0002",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advisor versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QuickAssist Technology versions ant\u00e9rieures \u00e0 2.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Standard Edition Design Software versions ant\u00e9rieures \u00e0 23.1.1 Patch 1.01std",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VPL software pour Windows version 2023.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 800 Series Ethernet Linux Kernel Mode Driver versions ant\u00e9rieures \u00e0 1.15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel High Level Synthesis Compiler versions ant\u00e9rieures \u00e0 24.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RealSense D400 Series Universal Windows Platform (UWP) Driver pour Windows 10 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Lite Edition Design Software versions ant\u00e9rieures \u00e0 23.1.1 Patch 1.01std",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Pro graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5319",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center GPU Flex Series pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5333",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-38310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38310"
    },
    {
      "name": "CVE-2024-25571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25571"
    },
    {
      "name": "CVE-2023-34440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34440"
    },
    {
      "name": "CVE-2024-37020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37020"
    },
    {
      "name": "CVE-2024-29214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29214"
    },
    {
      "name": "CVE-2024-36285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36285"
    },
    {
      "name": "CVE-2024-42410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42410"
    },
    {
      "name": "CVE-2024-24582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24582"
    },
    {
      "name": "CVE-2024-31068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31068"
    },
    {
      "name": "CVE-2024-36280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36280"
    },
    {
      "name": "CVE-2024-40887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40887"
    },
    {
      "name": "CVE-2024-39284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39284"
    },
    {
      "name": "CVE-2024-24852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24852"
    },
    {
      "name": "CVE-2023-48366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48366"
    },
    {
      "name": "CVE-2024-39279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39279"
    },
    {
      "name": "CVE-2024-31858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31858"
    },
    {
      "name": "CVE-2024-39813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39813"
    },
    {
      "name": "CVE-2023-29164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29164"
    },
    {
      "name": "CVE-2023-25192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25192"
    },
    {
      "name": "CVE-2024-32941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32941"
    },
    {
      "name": "CVE-2023-31276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31276"
    },
    {
      "name": "CVE-2023-49615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49615"
    },
    {
      "name": "CVE-2024-39805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39805"
    },
    {
      "name": "CVE-2024-41917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41917"
    },
    {
      "name": "CVE-2024-39779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39779"
    },
    {
      "name": "CVE-2024-42405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42405"
    },
    {
      "name": "CVE-2024-30211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30211"
    },
    {
      "name": "CVE-2024-39797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39797"
    },
    {
      "name": "CVE-2024-36283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36283"
    },
    {
      "name": "CVE-2024-38307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38307"
    },
    {
      "name": "CVE-2024-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21859"
    },
    {
      "name": "CVE-2024-39356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39356"
    },
    {
      "name": "CVE-2023-43758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43758"
    },
    {
      "name": "CVE-2024-41168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41168"
    },
    {
      "name": "CVE-2024-37355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37355"
    },
    {
      "name": "CVE-2024-36291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36291"
    },
    {
      "name": "CVE-2023-49618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49618"
    },
    {
      "name": "CVE-2024-39606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39606"
    },
    {
      "name": "CVE-2024-41166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41166"
    },
    {
      "name": "CVE-2025-20097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20097"
    },
    {
      "name": "CVE-2023-49603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49603"
    },
    {
      "name": "CVE-2024-32938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32938"
    },
    {
      "name": "CVE-2024-28047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28047"
    },
    {
      "name": "CVE-2024-39355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39355"
    },
    {
      "name": "CVE-2024-39365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39365"
    },
    {
      "name": "CVE-2024-39271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39271"
    },
    {
      "name": "CVE-2024-36262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36262"
    },
    {
      "name": "CVE-2024-36293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36293"
    },
    {
      "name": "CVE-2024-36274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36274"
    },
    {
      "name": "CVE-2024-39286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
    },
    {
      "name": "CVE-2021-37577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37577"
    },
    {
      "name": "CVE-2023-25191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25191"
    },
    {
      "name": "CVE-2024-42492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42492"
    },
    {
      "name": "CVE-2024-32942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32942"
    },
    {
      "name": "CVE-2024-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21830"
    },
    {
      "name": "CVE-2024-47006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47006"
    },
    {
      "name": "CVE-2024-26021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26021"
    },
    {
      "name": "CVE-2023-32277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32277"
    },
    {
      "name": "CVE-2023-48267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48267"
    },
    {
      "name": "CVE-2024-42419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42419"
    },
    {
      "name": "CVE-2024-28127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28127"
    },
    {
      "name": "CVE-2024-31157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31157"
    },
    {
      "name": "CVE-2024-31153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31153"
    },
    {
      "name": "CVE-2024-41934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41934"
    },
    {
      "name": "CVE-2024-31155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31155"
    },
    {
      "name": "CVE-2024-39372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39372"
    },
    {
      "name": "CVE-2024-29223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29223"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0119",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01139",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01215",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01215.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01120",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01120.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01124",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01237",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01237.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01230",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01230.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01231",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01144",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01224",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01044",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01044.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01213",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01218",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01218.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01235",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01214",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01214.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01203",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01166",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01236",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01236.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01228",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01198",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01198.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00990",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01194",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01238",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01238.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01240",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01240.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01207",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01207.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01232",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01232.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00590",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00590.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01156",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01156.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01227",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01227.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01184",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01184.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01152",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01152.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00606",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00606.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01233",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01233.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01030",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01030.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01208",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01208.html"
    }
  ]
}

CERTFR-2024-AVI-1059

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A NUC M15 Laptop Kits: LAPBC510, LAPBC710.
Intel N/A NUC P14E Laptop Element: CMCN1CC.
Intel N/A NUC Software Studio Service
References
Bulletin de sécurité Intel INTEL-SA-01185 2024-12-10 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NUC M15 Laptop Kits: LAPBC510, LAPBC710.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "NUC P14E Laptop Element: CMCN1CC.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "NUC Software Studio Service",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-23197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23197"
    },
    {
      "name": "CVE-2024-36297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36297"
    },
    {
      "name": "CVE-2024-34159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34159"
    },
    {
      "name": "CVE-2024-23498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23498"
    },
    {
      "name": "CVE-2024-36483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36483"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-1059",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01185",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01185.html"
    }
  ]
}

CERTFR-2024-AVI-0980

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A Intel Quartus Prime Pro Edition versions antérieures à 24.2
Intel N/A Intel Server Board S2600ST toutes versions
Intel N/A Intel Fortran Compiler Classic versions antérieures à 2021.13
Intel N/A Processeurs 4e génération Intel Xeon Scalable Eagle Stream Server CPU ID 0x806f8
Intel N/A Intel VROC versions antérieures à 8.6.0.3001
Intel N/A Intel Binary Configuration Tool versions antérieures à 3.4.5
Intel N/A Processeurs 5e génération Intel Xeon Scalable Eagle Stream Server CPUID C0F62
Intel N/A Intel Series management versions antérieures à CR_MGMT_02.00.00.4040 et CR_MGMT_03.00.00.0499 pour Optane PMem
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2024.2
Intel N/A Intel Advanced Link Analyzer Standard Edition installer versions antérieures à 23.1.1
Intel N/A Processeurs 4e génération Intel Xeon Scalable avec Intel vRAN Eagle Stream Network et Edge CPU ID 806F8
Intel N/A Pilote Intel Graphics 15.40 4e Gen toutes versions pour Windows 10
Intel N/A Pilote Intel Arc Pro Graphics versions antérieures à 31.0.101.5525 pour Windows
Intel N/A Intel oneMKL versions antérieures à 2024.2 pour Windows
Intel N/A Processeurs 4e génération Intel Xeon Edge Enhanced Eagle Stream Network et Edge CPU ID 806F8
Intel N/A Intel CIP versions antérieures à 2.4.10852
Intel N/A Intel Wireless-AC 9260 (ThP2) et Intel Killer Wi-Fi AX1550x/w2
Intel N/A Intel DSA versions antérieures à 24.3.26.8
Intel N/A Thunderbolt Share versions antérieures à 1.0.49.9
Intel N/A Intel Rendering Toolkit versions antérieures à 2024.1.0
Intel N/A Intel Server Board M10JNP2SB toutes versions
Intel N/A Intel SGX SDK pour Linux versions antérieures à 2.24
Intel N/A Intel Wi-Fi 6E AX210 (TyP2) et Intel Killer Wi-Fi AX1675x/w2
Intel N/A Moteur Intel QAT pour OpenSSL versions antérieures à v1.6.1
Intel N/A Processeurs 4e génération Intel Xeon Gold Eagle Stream Server CPU ID 0x806f8
Intel N/A Intel SDP Tool toutes versions pour Windows
Intel N/A Intel Server Board M20NTP toutes versions
Intel N/A BigDL versions antérieures à 2.5.0
Intel N/A Processeurs 4e génération Intel Xeon Silver Eagle Stream Server CPU ID 0x806f8
Intel N/A Pilote Intel Graphics 15.40 6e Gen toutes versions pour Windows 7 et 8.1
Intel N/A Intel EMA versions antérieures à 1.13.1.0
Intel N/A Intel MAS versions antérieures à 2.5
Intel N/A Processeurs 4e Generation Intel Xeon Bronze Eagle Stream Server CPU ID 0x806f8
Intel N/A Pilote Intel Graphics 15.45 toutes versions pour Windows
Intel N/A JAM STAPL Player versions antérieures à 2.6.1
Intel N/A Intel PROSet/Wireless Intel Killer Wi-Fi et Intel Wireless Bluetooth versions 23.40
Intel N/A Intel Extension pour Transformers versions antérieures à 1.5
Intel N/A Processeurs 4e génération Intel Xeon Platinum Eagle Stream Server CPU ID 0x806f8
Intel N/A Intel Server Board S2600BPBR toutes versions
Intel N/A Intel Media Driver pour VAAPI versions antérieures à 24.1.1
Intel N/A Intel Wi-Fi 6E AX211 (GfP2) et Intel Killer Wi-Fi AX1675i/s2
Intel N/A Intel Distribution pour Python versions antérieures à 2024.2
Intel N/A Processeurs Intel Xeon W2400 et W3400 Fishhawk Falls Workstation CPU ID 806F8
Intel N/A Pilote Intel Arc et Iris Xe Graphics versions antérieures à 30.0.101.5379 pour Windows
Intel N/A Intel CST versions antérieures à 8.7.10803
Intel N/A Intel Quartus Prime Standard Edition versions antérieures à 23.1.1 pour Windows
Intel N/A Processeurs 3e génération Intel Xeon Scalable Whitley Server Workstation CPU ID 606A6
Intel N/A Intel Server Board S2600BP toutes versions
Intel N/A Intel VPL versions antérieures à 24.1.4
Intel N/A Intel Server Board M70KLP toutes versions
Intel N/A OpenVINO Model Server versions antérieures à 2024.0
Intel N/A Intel Wi-Fi 6 AX200 (CcP2) et Intel Killer Wi-Fi AX1650x/w2
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2024.2
Intel N/A Intel IPP versions antérieures à 2021.12.0
Intel N/A Processeurs Intel Xeon 6 Sierra Forest Server CPUID A06F2
Intel N/A Pilotes Intel Data Center GPU Flex Series versions antérieures à 31.0.101.5522 pour Windows
Intel N/A Processeurs Intel Xeon D Idaville Server CPU ID 606C1
Intel N/A Intel Graphics Offline Compiler pour OpenCL Code versions antérieures à 2024.1.0.142, pilotes graphiques 31.0.101.5445.
Intel N/A Intel Granulate versions antérieures à 4.30.1
Intel N/A Intel Fortran Compiler versions antérieures à 2024.2
Intel N/A Intel High Level Synthesis Compiler pour Intel Quartus Prime Pro Edition versions antérieures à 24.1
Intel N/A ACAT versions antérieures à 3.11.0
Intel N/A Pilote Intel 7e à 10e Gen Processor Graphics versions antérieures à 31.0.101.2128 pour Windows
Intel N/A Intel VTune Profiler versions antérieures à 2024.2.0
Intel N/A Intel Neural Compressor versions antérieures v3.0
Intel N/A Pilotes Intel Arc et Iris Xe Graphics versions antérieures à 31.0.101.5518 pour Windows
Intel N/A Processeurs Intel Xeon CPU Max Series Eagle Stream Server CPU ID 806F8
References
Bulletin de sécurité Intel INTEL-SA-01177 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01079 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01085 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01193 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01200 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01182 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01167 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01219 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01190 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01173 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01158 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01111 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01151 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01148 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01108 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01183 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01132 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01163 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01146 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01145 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01179 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01142 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01101 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01189 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01076 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01195 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01197 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01204 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01155 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01187 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01154 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01188 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01176 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01217 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01165 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01161 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01196 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01140 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01024 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01138 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01175 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01191 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01131 2024-11-12 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01201 2024-11-12 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Quartus Prime Pro Edition versions ant\u00e9rieures \u00e0 24.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board S2600ST toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Fortran Compiler Classic versions ant\u00e9rieures \u00e0 2021.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Scalable Eagle Stream Server CPU ID 0x806f8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VROC versions ant\u00e9rieures \u00e0 8.6.0.3001",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Binary Configuration Tool versions ant\u00e9rieures \u00e0 3.4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 5e g\u00e9n\u00e9ration Intel Xeon Scalable Eagle Stream Server CPUID C0F62",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Series management versions ant\u00e9rieures \u00e0 CR_MGMT_02.00.00.4040 et CR_MGMT_03.00.00.0499 pour Optane PMem",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advanced Link Analyzer Standard Edition installer versions ant\u00e9rieures \u00e0 23.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Scalable avec Intel vRAN Eagle Stream Network et Edge CPU ID 806F8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel Graphics 15.40 4e Gen toutes versions pour Windows 10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel Arc Pro Graphics versions ant\u00e9rieures \u00e0 31.0.101.5525 pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneMKL versions ant\u00e9rieures \u00e0 2024.2 pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Edge Enhanced Eagle Stream Network et Edge CPU ID 806F8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CIP versions ant\u00e9rieures \u00e0 2.4.10852",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Wireless-AC 9260 (ThP2) et Intel Killer Wi-Fi AX1550x/w2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 24.3.26.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Thunderbolt Share versions ant\u00e9rieures \u00e0 1.0.49.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Rendering Toolkit versions ant\u00e9rieures \u00e0 2024.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board M10JNP2SB toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX SDK pour Linux versions ant\u00e9rieures \u00e0 2.24",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Wi-Fi 6E AX210 (TyP2) et Intel Killer Wi-Fi AX1675x/w2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Moteur Intel QAT pour OpenSSL versions ant\u00e9rieures \u00e0 v1.6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Gold Eagle Stream Server CPU ID 0x806f8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SDP Tool toutes versions pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board M20NTP toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "BigDL versions ant\u00e9rieures \u00e0 2.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Silver Eagle Stream Server CPU ID 0x806f8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel Graphics 15.40 6e Gen toutes versions pour Windows 7 et 8.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel EMA versions ant\u00e9rieures \u00e0 1.13.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MAS versions ant\u00e9rieures \u00e0 2.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 4e Generation Intel Xeon Bronze Eagle Stream Server CPU ID 0x806f8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel Graphics 15.45 toutes versions pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "JAM STAPL Player versions ant\u00e9rieures \u00e0 2.6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless Intel Killer Wi-Fi et Intel Wireless Bluetooth versions 23.40",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Extension pour Transformers versions ant\u00e9rieures \u00e0 1.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Platinum Eagle Stream Server CPU ID 0x806f8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board S2600BPBR toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Media Driver pour VAAPI versions ant\u00e9rieures \u00e0 24.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Wi-Fi 6E AX211 (GfP2) et Intel Killer Wi-Fi AX1675i/s2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon W2400 et W3400 Fishhawk Falls Workstation CPU ID 806F8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel Arc et Iris Xe Graphics versions ant\u00e9rieures \u00e0 30.0.101.5379 pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CST versions ant\u00e9rieures \u00e0 8.7.10803",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Standard Edition versions ant\u00e9rieures \u00e0 23.1.1 pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs 3e g\u00e9n\u00e9ration  Intel Xeon Scalable Whitley Server Workstation CPU ID 606A6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board S2600BP toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VPL versions ant\u00e9rieures \u00e0 24.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board M70KLP toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "OpenVINO Model Server versions ant\u00e9rieures \u00e0 2024.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Wi-Fi 6 AX200 (CcP2) et Intel Killer Wi-Fi AX1650x/w2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel IPP versions ant\u00e9rieures \u00e0 2021.12.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon 6 Sierra Forest Server CPUID A06F2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Intel Data Center GPU Flex Series versions ant\u00e9rieures \u00e0 31.0.101.5522 pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon D Idaville Server CPU ID 606C1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Graphics Offline Compiler pour OpenCL Code  versions ant\u00e9rieures \u00e0 2024.1.0.142, pilotes graphiques 31.0.101.5445.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Granulate versions ant\u00e9rieures \u00e0 4.30.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Fortran Compiler versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel High Level Synthesis Compiler pour Intel Quartus Prime Pro Edition versions ant\u00e9rieures \u00e0 24.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "ACAT versions ant\u00e9rieures \u00e0 3.11.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel 7e \u00e0 10e Gen Processor Graphics versions ant\u00e9rieures \u00e0 31.0.101.2128 pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2024.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Neural Compressor versions ant\u00e9rieures v3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Intel Arc et Iris Xe Graphics versions ant\u00e9rieures \u00e0 31.0.101.5518 pour Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon CPU Max Series Eagle Stream Server CPU ID 806F8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-32667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32667"
    },
    {
      "name": "CVE-2024-32048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32048"
    },
    {
      "name": "CVE-2024-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21808"
    },
    {
      "name": "CVE-2024-39285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39285"
    },
    {
      "name": "CVE-2024-23918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23918"
    },
    {
      "name": "CVE-2024-28881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28881"
    },
    {
      "name": "CVE-2024-29076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29076"
    },
    {
      "name": "CVE-2024-21820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21820"
    },
    {
      "name": "CVE-2024-41167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41167"
    },
    {
      "name": "CVE-2024-23312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23312"
    },
    {
      "name": "CVE-2024-39609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39609"
    },
    {
      "name": "CVE-2024-28051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28051"
    },
    {
      "name": "CVE-2024-29085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29085"
    },
    {
      "name": "CVE-2024-31407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31407"
    },
    {
      "name": "CVE-2024-34776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34776"
    },
    {
      "name": "CVE-2024-24984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24984"
    },
    {
      "name": "CVE-2024-36242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36242"
    },
    {
      "name": "CVE-2024-36276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36276"
    },
    {
      "name": "CVE-2024-25647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25647"
    },
    {
      "name": "CVE-2024-28049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28049"
    },
    {
      "name": "CVE-2024-36282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36282"
    },
    {
      "name": "CVE-2024-35245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35245"
    },
    {
      "name": "CVE-2024-40885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40885"
    },
    {
      "name": "CVE-2024-23919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23919"
    },
    {
      "name": "CVE-2024-21783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21783"
    },
    {
      "name": "CVE-2024-36275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36275"
    },
    {
      "name": "CVE-2024-36488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36488"
    },
    {
      "name": "CVE-2024-36294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36294"
    },
    {
      "name": "CVE-2024-25563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25563"
    },
    {
      "name": "CVE-2024-37025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37025"
    },
    {
      "name": "CVE-2024-34165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34165"
    },
    {
      "name": "CVE-2024-31158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31158"
    },
    {
      "name": "CVE-2024-28030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28030"
    },
    {
      "name": "CVE-2024-23198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23198"
    },
    {
      "name": "CVE-2024-39811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39811"
    },
    {
      "name": "CVE-2024-28950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28950"
    },
    {
      "name": "CVE-2024-36253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36253"
    },
    {
      "name": "CVE-2022-34301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34301"
    },
    {
      "name": "CVE-2024-34167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34167"
    },
    {
      "name": "CVE-2024-33611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33611"
    },
    {
      "name": "CVE-2024-31154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31154"
    },
    {
      "name": "CVE-2024-34164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34164"
    },
    {
      "name": "CVE-2024-28952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28952"
    },
    {
      "name": "CVE-2024-38383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38383"
    },
    {
      "name": "CVE-2024-34170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34170"
    },
    {
      "name": "CVE-2024-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21853"
    },
    {
      "name": "CVE-2024-34028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34028"
    },
    {
      "name": "CVE-2024-38387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38387"
    },
    {
      "name": "CVE-2024-35201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35201"
    },
    {
      "name": "CVE-2024-34023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34023"
    },
    {
      "name": "CVE-2024-38660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38660"
    },
    {
      "name": "CVE-2024-34022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34022"
    },
    {
      "name": "CVE-2024-25565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25565"
    },
    {
      "name": "CVE-2024-28169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28169"
    },
    {
      "name": "CVE-2024-29083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29083"
    },
    {
      "name": "CVE-2024-36245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36245"
    },
    {
      "name": "CVE-2024-38665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38665"
    },
    {
      "name": "CVE-2024-32483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32483"
    },
    {
      "name": "CVE-2024-33624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33624"
    },
    {
      "name": "CVE-2024-38668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38668"
    },
    {
      "name": "CVE-2024-37027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37027"
    },
    {
      "name": "CVE-2024-36482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36482"
    },
    {
      "name": "CVE-2024-32044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32044"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0980",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01177",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01177.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01079",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01085",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01085.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01193",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01193.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01200",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01200.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01182",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01182.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01167",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01167.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01219",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01219.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01190",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01190.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01173",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01173.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01158",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01158.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01111",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01111.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01151",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01151.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01148",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01148.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01108",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01108.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01183",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01183.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01132",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01132.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01163",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01163.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01146",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01146.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01145",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01145.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01179",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01179.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01142",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01142.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01101",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01189",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01189.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01076",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01076.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01195",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01195.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01197",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01197.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01204",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01204.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01155",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01155.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01187",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01187.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01154",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01154.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01188",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01188.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01176",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01176.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01217",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01217.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01165",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01165.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01161",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01161.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01196",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01196.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01140",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01140.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01024.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01138",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01138.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01175",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01191",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01191.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01131",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01201",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01201.html"
    }
  ]
}

CERTFR-2024-AVI-0852

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans Intel TDX Module. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A TDX Module versions antérieures à 1.5.06
References
Bulletin de sécurité Intel intel-sa-01099 2024-10-08 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "TDX Module versions ant\u00e9rieures \u00e0 1.5.06",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-27457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27457"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0852",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Intel TDX Module. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Intel TDX Module",
  "vendor_advisories": [
    {
      "published_at": "2024-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01099",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01099.html"
    }
  ]
}

CERTFR-2024-AVI-0768

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Se référer aux bulletins de l'éditeur pour la liste des processeurs vulnérables.

L'éditeur indique que le produit RAID Web Console n'est plus supporté et recommande de migrer vers un produit plus récent.

Impacted products
Vendor Product Description
Intel N/A Intel RAID Web Console Software toutes versions
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel RAID Web Console Software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "Se r\u00e9f\u00e9rer aux bulletins de l\u0027\u00e9diteur pour la liste des processeurs vuln\u00e9rables.\n\nL\u0027\u00e9diteur indique que le produit RAID Web Console n\u0027est plus support\u00e9 et recommande de migrer vers un produit plus r\u00e9cent. ",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-32666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32666"
    },
    {
      "name": "CVE-2023-4342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4342"
    },
    {
      "name": "CVE-2023-4328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4328"
    },
    {
      "name": "CVE-2023-4332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4332"
    },
    {
      "name": "CVE-2023-4338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4338"
    },
    {
      "name": "CVE-2023-41833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41833"
    },
    {
      "name": "CVE-2023-43753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43753"
    },
    {
      "name": "CVE-2023-23904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23904"
    },
    {
      "name": "CVE-2024-23984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23984"
    },
    {
      "name": "CVE-2023-4339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4339"
    },
    {
      "name": "CVE-2024-33848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33848"
    },
    {
      "name": "CVE-2024-23599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23599"
    },
    {
      "name": "CVE-2023-4324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4324"
    },
    {
      "name": "CVE-2024-21781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21781"
    },
    {
      "name": "CVE-2023-4333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4333"
    },
    {
      "name": "CVE-2023-4344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4344"
    },
    {
      "name": "CVE-2024-36261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36261"
    },
    {
      "name": "CVE-2024-21829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21829"
    },
    {
      "name": "CVE-2024-32940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32940"
    },
    {
      "name": "CVE-2024-34153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34153"
    },
    {
      "name": "CVE-2023-4334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4334"
    },
    {
      "name": "CVE-2023-4323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4323"
    },
    {
      "name": "CVE-2023-4325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4325"
    },
    {
      "name": "CVE-2023-42772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42772"
    },
    {
      "name": "CVE-2023-4327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4327"
    },
    {
      "name": "CVE-2023-4326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4326"
    },
    {
      "name": "CVE-2023-4329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4329"
    },
    {
      "name": "CVE-2024-34545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34545"
    },
    {
      "name": "CVE-2023-4336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4336"
    },
    {
      "name": "CVE-2023-25546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25546"
    },
    {
      "name": "CVE-2023-4341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4341"
    },
    {
      "name": "CVE-2023-4343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4343"
    },
    {
      "name": "CVE-2024-28170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28170"
    },
    {
      "name": "CVE-2023-4340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4340"
    },
    {
      "name": "CVE-2024-24968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24968"
    },
    {
      "name": "CVE-2023-4345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4345"
    },
    {
      "name": "CVE-2023-22351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22351"
    },
    {
      "name": "CVE-2024-34543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34543"
    },
    {
      "name": "CVE-2023-4331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4331"
    },
    {
      "name": "CVE-2024-36247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36247"
    },
    {
      "name": "CVE-2023-43626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43626"
    },
    {
      "name": "CVE-2023-4337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4337"
    },
    {
      "name": "CVE-2024-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21871"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0768",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01071",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01103",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00926",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01097",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html"
    }
  ]
}

CERTFR-2024-AVI-0679

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A Intel Arc Iris Xe Graphics versions antérieures à 31.0.101.4824
Intel N/A Intel NUC M15 Laptop Kits: LAPBC710, LAPBC510, LAPRC710, LAPRC510
Intel N/A Intel NUC M15 Laptop Kits: LAPRC710, LAPRC510
Intel N/A Intel NUC X15 Laptop
Intel N/A Intel oneAPI Base Toolkit software versions antérieures à 2024.1
Intel N/A Intel oneAPI Base Toolkits versions antérieures à 2024.1
Intel N/A Intel Quartus Prime Pro Edition Design software versions antérieures à 23.4
Intel N/A Intel Quartus Prime Pro Edition Design Software versions antérieures à 24.1
Intel N/A Intel(R) Ethernet Complete Driver Pack versions antérieures à 28.3
Intel N/A Intel(R) Ethernet Controllers E800 Series with NVM image versions 4.4
Intel N/A Intel(R) Ethernet Controllers E800 Series avec des versions antérieures à NIC1.3 PV, NVM avec versions d'images avant 3.36 et Intel(R) Ethernet Complete Driver Pack 28.3.
Intel N/A Intel TDX module software versions 1.5.05.46.698
Intel N/A Intel TDX module software versions antérieures à TDX 1.5.01.00.592
Intel N/A Intel Trace Analyzer and Collector versions antérieures à 2022.1
Intel N/A Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEdit-Win software versions antérieures à 5.27.03.0006
Intel N/A Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEditLnx software versions antérieures à 5.27.06.0019
Intel N/A Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVLnx software versions antérieures à 5.13.00.2106
Intel N/A Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVWin software versions antérieures à 5.13.00.2109
Intel N/A Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgLnx software versions antérieures à 5.05.04.0008
Intel N/A Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgWin software versions antérieures à 5.05.04.0008
Intel N/A Intel NUC X15 Laptop Kits: LAPAC71G, LAPAC71H, LAPKC71F, LAPKC71E, LAPKC51E.
Intel N/A Intel Simics Package Manager software versions antérieures à 1.8.3.
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2024.1
Intel N/A Intel oneAPI DPC++/C++ Compiler versions antérieures à 2024.1.
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2024.1
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2024.1.0.
Intel N/A Intel oneAPI Math Kernel Library versions antérieures à 2024.1
Intel N/A BMRA software versions antérieures à 22.08
Intel N/A Flexlm License Daemons for Intel FPGA Software version v11.19.5.0
Intel N/A Intel Advisor software versions antérieures à 2024.1
Intel N/A Intel Agilex FPGA 7 FPGA firmware versions antérieures à 24.1
Intel N/A Intel CIP software versions antérieures à 2.4.10717
Intel N/A Intel Connectivity Performance Suite software versions antérieures à 2.0
Intel N/A Intel DPC++ C++ Compiler software versions antérieures à 2024.1
Intel N/A Intel Ethernet Adapter Complete Driver Pack software versions antérieures à 28.3
Intel N/A Intel Fortran Compiler versions antérieures à 2024.1
Intel N/A Intel FPGA SDK for OpenCL software technology, toutes versions
Intel N/A Intel GPA software versions antérieures à 2024.1
Intel N/A Intel Graphics Performance Analyzers (Intel GPA) software versions antérieures à 2023.4
Intel N/A Intel HID Event Filter software versions antérieures à 2.2.2.1
Intel N/A Intel High Level Synthesis Compiler software versions antérieures à 23.4
Intel N/A Intel Integrated Performance Primitive versions antérieures à 2021.11
Intel N/A Intel IPP Cryptography software versions antérieures à 2021.11
Intel N/A Intel ISH software for Intel NUC M15 Laptop Kits LAPBC710 and LAPBC510 versions antérieures à 5.4.1.4479
Intel N/A Intel ISH software for Intel NUC M15 Laptop Kits LAPRC710 and LAPRC510 versions antérieures à 5.4.2.4594
Intel N/A Intel License Manager for FLEXlm product versions antérieures à 11.19.5.0
Intel N/A Intel MAS (GUI) versions antérieures à 2.5.0
Intel N/A Processeurs Intel Xeon Scalable de 4ème et 5ème génération
Intel N/A Intel Data Center GPU Max Series 1100 et 1550
Intel N/A Intel Distribution pour GDB software versions antérieures à 2024.0.1
Intel N/A Intel Distribution pour Python pour Windows versions antérieures à 2024.1
Intel N/A Intel ISH software for 11th Generation Intel Core Processor Family versions antérieures à 5.4.1.4479
Intel N/A Intel ISH software for 12th Generation Intel Core Processor Family versions antérieures à 5.4.2.4594
Intel N/A Intel MPI Library versions antérieures à 2021.12
Intel N/A Intel Unite Client Extended Display Plugin software installer, toutes versions
Intel N/A Intel VROC versions antérieures à 8.6.0.1191
Intel N/A Intel VTune Profiler software versions antérieures à 2024.1
Intel N/A LAPAC71G and LAPAC71H versions antérieures à 0065
Intel N/A LAPBC510 and LAPBC710 versions antérieures à 0083
Intel N/A LAPKC51E, LAPKC71E, LAPKC71F versions antérieures à 0048
Intel N/A LAPRC510, LAPRC710 versions antérieures à 0066
Intel N/A VTune Profiler versions antérieures à VTune 2024.1
References
Bulletin de sécurité Intel INTEL-SA-01102 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01172 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01116 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01129 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00790 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01070 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01106 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01089 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01121 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01038 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01113 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01057 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01046 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01088 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01122 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01164 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01130 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01107 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01127 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01112 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01075 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01095 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01115 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01010 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01126 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01128 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01087 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01114 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01094 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00999 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01083 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01022 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01117 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01073 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00918 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01105 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01078 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01125 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01072 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01104 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01100 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01118 2024-08-13 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01110 2024-08-13 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Arc Iris Xe Graphics versions ant\u00e9rieures \u00e0 31.0.101.4824",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC M15 Laptop Kits: LAPBC710, LAPBC510, LAPRC710, LAPRC510",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC M15 Laptop Kits: LAPRC710, LAPRC510",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC X15 Laptop",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit software versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkits versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Pro Edition Design software versions ant\u00e9rieures \u00e0 23.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Pro Edition Design Software versions ant\u00e9rieures \u00e0 24.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel(R) Ethernet Complete Driver Pack versions ant\u00e9rieures \u00e0 28.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel(R) Ethernet Controllers E800 Series with NVM image versions 4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel(R) Ethernet Controllers E800 Series avec des versions ant\u00e9rieures \u00e0 NIC1.3 PV, NVM avec versions d\u0027images avant 3.36 et Intel(R) Ethernet Complete Driver Pack 28.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel TDX module software versions 1.5.05.46.698",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel TDX module software versions ant\u00e9rieures \u00e0 TDX 1.5.01.00.592",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Trace Analyzer and Collector versions ant\u00e9rieures \u00e0 2022.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEdit-Win software versions ant\u00e9rieures \u00e0 5.27.03.0006",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEditLnx software versions ant\u00e9rieures \u00e0 5.27.06.0019",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVLnx software versions ant\u00e9rieures \u00e0 5.13.00.2106",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVWin software versions ant\u00e9rieures \u00e0 5.13.00.2109",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgLnx software versions ant\u00e9rieures \u00e0 5.05.04.0008",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgWin software versions ant\u00e9rieures \u00e0 5.05.04.0008",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC X15 Laptop Kits: LAPAC71G, LAPAC71H, LAPKC71F, LAPKC71E, LAPKC51E.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Simics Package Manager software versions ant\u00e9rieures \u00e0 1.8.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2024.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.1.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "BMRA software versions ant\u00e9rieures \u00e0 22.08",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Flexlm License Daemons for Intel FPGA Software version v11.19.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advisor software versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Agilex FPGA 7 FPGA firmware versions ant\u00e9rieures \u00e0 24.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CIP software versions ant\u00e9rieures \u00e0 2.4.10717",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Connectivity Performance Suite software versions ant\u00e9rieures \u00e0 2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DPC++ C++ Compiler software versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Adapter Complete Driver Pack software versions ant\u00e9rieures \u00e0 28.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Fortran Compiler versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel FPGA SDK for OpenCL software technology, toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel GPA software versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Graphics Performance Analyzers (Intel GPA) software versions ant\u00e9rieures \u00e0 2023.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel HID Event Filter software versions ant\u00e9rieures \u00e0 2.2.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel High Level Synthesis Compiler software versions ant\u00e9rieures \u00e0 23.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Integrated Performance Primitive versions ant\u00e9rieures \u00e0 2021.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel IPP Cryptography software versions ant\u00e9rieures \u00e0 2021.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel ISH software for Intel NUC M15 Laptop Kits LAPBC710 and LAPBC510 versions ant\u00e9rieures \u00e0 5.4.1.4479",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel ISH software for Intel NUC M15 Laptop Kits LAPRC710 and LAPRC510 versions ant\u00e9rieures \u00e0 5.4.2.4594",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel License Manager for FLEXlm product versions ant\u00e9rieures \u00e0 11.19.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MAS (GUI) versions ant\u00e9rieures \u00e0 2.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Xeon Scalable de 4\u00e8me et 5\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center GPU Max Series 1100 et 1550",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour GDB software versions ant\u00e9rieures \u00e0 2024.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python pour Windows versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel ISH software for 11th Generation Intel Core Processor Family versions ant\u00e9rieures \u00e0 5.4.1.4479",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel ISH software for 12th Generation Intel Core Processor Family versions ant\u00e9rieures \u00e0 5.4.2.4594",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library versions ant\u00e9rieures \u00e0 2021.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Unite Client Extended Display Plugin software installer, toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VROC versions ant\u00e9rieures \u00e0 8.6.0.1191",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune Profiler software versions ant\u00e9rieures \u00e0 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "LAPAC71G and LAPAC71H versions ant\u00e9rieures \u00e0 0065",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "LAPBC510 and LAPBC710 versions ant\u00e9rieures \u00e0 0083",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "LAPKC51E, LAPKC71E, LAPKC71F versions ant\u00e9rieures \u00e0 0048",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "LAPRC510, LAPRC710 versions ant\u00e9rieures \u00e0 0066",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "VTune Profiler versions ant\u00e9rieures \u00e0 VTune 2024.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-23495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23495"
    },
    {
      "name": "CVE-2024-21801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21801"
    },
    {
      "name": "CVE-2024-21844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21844"
    },
    {
      "name": "CVE-2024-23497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23497"
    },
    {
      "name": "CVE-2023-45230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45230"
    },
    {
      "name": "CVE-2024-21784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21784"
    },
    {
      "name": "CVE-2022-36763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36763"
    },
    {
      "name": "CVE-2023-39539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39539"
    },
    {
      "name": "CVE-2024-21857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21857"
    },
    {
      "name": "CVE-2024-24980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24980"
    },
    {
      "name": "CVE-2024-21787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21787"
    },
    {
      "name": "CVE-2024-26027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26027"
    },
    {
      "name": "CVE-2024-27461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27461"
    },
    {
      "name": "CVE-2023-34424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34424"
    },
    {
      "name": "CVE-2023-38655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38655"
    },
    {
      "name": "CVE-2024-23491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23491"
    },
    {
      "name": "CVE-2024-23499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23499"
    },
    {
      "name": "CVE-2023-45229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45229"
    },
    {
      "name": "CVE-2023-45234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45234"
    },
    {
      "name": "CVE-2023-45236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45236"
    },
    {
      "name": "CVE-2024-24983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24983"
    },
    {
      "name": "CVE-2024-28947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28947"
    },
    {
      "name": "CVE-2024-28887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28887"
    },
    {
      "name": "CVE-2024-25939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25939"
    },
    {
      "name": "CVE-2024-29015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29015"
    },
    {
      "name": "CVE-2024-25576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25576"
    },
    {
      "name": "CVE-2024-21769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21769"
    },
    {
      "name": "CVE-2024-24986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24986"
    },
    {
      "name": "CVE-2024-28046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28046"
    },
    {
      "name": "CVE-2023-35061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
    },
    {
      "name": "CVE-2024-34163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34163"
    },
    {
      "name": "CVE-2024-24973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24973"
    },
    {
      "name": "CVE-2024-26025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26025"
    },
    {
      "name": "CVE-2023-45231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45231"
    },
    {
      "name": "CVE-2022-29871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29871"
    },
    {
      "name": "CVE-2023-43747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43747"
    },
    {
      "name": "CVE-2023-45237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45237"
    },
    {
      "name": "CVE-2023-40067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40067"
    },
    {
      "name": "CVE-2024-28050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28050"
    },
    {
      "name": "CVE-2024-21810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21810"
    },
    {
      "name": "CVE-2023-49141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49141"
    },
    {
      "name": "CVE-2023-45233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45233"
    },
    {
      "name": "CVE-2023-45232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45232"
    },
    {
      "name": "CVE-2024-25562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25562"
    },
    {
      "name": "CVE-2024-23907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23907"
    },
    {
      "name": "CVE-2024-23908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23908"
    },
    {
      "name": "CVE-2024-21807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21807"
    },
    {
      "name": "CVE-2023-35123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35123"
    },
    {
      "name": "CVE-2024-24977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24977"
    },
    {
      "name": "CVE-2024-21806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21806"
    },
    {
      "name": "CVE-2024-24580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24580"
    },
    {
      "name": "CVE-2024-22184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22184"
    },
    {
      "name": "CVE-2024-23909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23909"
    },
    {
      "name": "CVE-2023-49144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49144"
    },
    {
      "name": "CVE-2023-48361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48361"
    },
    {
      "name": "CVE-2024-39283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39283"
    },
    {
      "name": "CVE-2024-23489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23489"
    },
    {
      "name": "CVE-2023-43489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43489"
    },
    {
      "name": "CVE-2024-25561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25561"
    },
    {
      "name": "CVE-2024-22374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22374"
    },
    {
      "name": "CVE-2023-42667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42667"
    },
    {
      "name": "CVE-2024-21766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21766"
    },
    {
      "name": "CVE-2024-23974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23974"
    },
    {
      "name": "CVE-2024-26022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26022"
    },
    {
      "name": "CVE-2024-28172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28172"
    },
    {
      "name": "CVE-2024-28876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28876"
    },
    {
      "name": "CVE-2024-24853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24853"
    },
    {
      "name": "CVE-2023-45235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45235"
    },
    {
      "name": "CVE-2024-22378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22378"
    },
    {
      "name": "CVE-2024-23981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23981"
    },
    {
      "name": "CVE-2024-28953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28953"
    },
    {
      "name": "CVE-2024-22376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22376"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0679",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-08-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01102",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01102.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01172",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01172.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01116",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01116.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01129",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01129.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00790",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00790.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01070",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01070.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01106",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01106.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01089",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01089.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01121",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01121.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01038",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01113",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01113.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01057",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01057.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01046",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01088",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01088.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01122",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01122.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01164",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01164.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01130",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01130.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01107",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01107.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01127",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01127.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01112",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01112.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01075",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01095",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01095.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01115",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01115.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01010",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01010.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01126",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01126.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01128",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01128.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01087",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01087.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01114",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01114.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01094",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01094.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00999",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01083",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01117",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01117.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01073",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01073.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00918",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01105",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01105.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01078",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01125",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01125.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01072",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01072.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01104",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01104.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01100",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01118",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01110",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01110.html"
    }
  ]
}

CERTFR-2024-AVI-0213

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une élévation de privilèges et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel Local Manageability Service versions antérieures à 2316.5.1.2.
Intel N/A Intel Xeon D
Intel N/A Processor Bus Lock
Intel N/A Intel CSME software installer versions antérieures à 2328.5.5.0.
Intel N/A Bios
Intel N/A Intel Xeon de 3ème et 4ème génération
Intel N/A Intel SPS versions antérieures à SPS_E5_04.04.04.500.0 ou SPS_E5_06.01.02.048.0.

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Local Manageability Service versions ant\u00e9rieures \u00e0 2316.5.1.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Xeon D",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processor Bus Lock",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME software installer versions ant\u00e9rieures \u00e0 2328.5.5.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Bios",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Xeon de 3\u00e8me et 4\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E5_04.04.04.500.0 ou SPS_E5_06.01.02.048.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-32666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32666"
    },
    {
      "name": "CVE-2023-27502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27502"
    },
    {
      "name": "CVE-2023-35191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35191"
    },
    {
      "name": "CVE-2023-32633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32633"
    },
    {
      "name": "CVE-2023-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38575"
    },
    {
      "name": "CVE-2023-32282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32282"
    },
    {
      "name": "CVE-2023-43490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43490"
    },
    {
      "name": "CVE-2023-22655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22655"
    },
    {
      "name": "CVE-2023-39368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39368"
    },
    {
      "name": "CVE-2023-28389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28389"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0213",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-03-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Intel\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00923 du 12 mars 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00982 du 12 mars 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01045 du 12 mars 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00986 du 12 mars 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00960 du 12 mars 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00972 du 12 mars 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00929 du 12 mars 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00929.html"
    }
  ]
}

CERTFR-2024-AVI-0124

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une élévation de privilèges et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A ACAT software maintenu par Intel versions antérieures à 2.0.0
Intel N/A Arm DS software pour Intel SoC FPGA versions antérieures à 2022.2
Intel N/A Tous les processeurs Intel Core de 6e, 7e, 8e ou 9e génération avec le pilote Intel Thunderbolt DCH toutes versions
Intel N/A Installation software pour Administrative Tools pour Intel Network Adapters versions antérieures à 28.2
Intel N/A Installation software pour Intel Ethernet Adapter Complete Driver Pack versions antérieures à 28.2
Intel N/A Installation software pour Intel Ethernet Connections Boot Utility, Preboot Images et pilotes EFI s versions antérieures à 28.2
Intel N/A Intel Advisor pour oneAPI versions antérieures à 2023.2.0
Intel N/A Intel Battery Life Diagnostic Tool software versions antérieures à 2.3.1
Intel N/A Intel Binary Configuration Tool software versions antérieures à 3.4.4
Intel N/A Intel CIP software versions antérieures à 2.4.10577
Intel N/A Intel Chipset Driver Software versions antérieures à 10.1.19444.8378
Intel N/A Intel Cluster Checker 2021.7.3
Intel N/A Intel DSA software versions antérieures à 23.4.33
Intel N/A Intel Distribution pour Python 2023.1
Intel N/A Intel IPP Cryptography versions antérieures à 2021.8.0
Intel N/A Intel ISPC versions antérieures à 1.21.0
Intel N/A Intel Inspector pour oneAPI versions antérieures à 2023.2.0
Intel N/A Intel Integrated Performance Primitives 2021.9.0
Intel N/A Micrologiciel du contrôleur Intel JHL8440 Thunderbolt 4 versions antérieures à 41
Intel N/A Intel MAS software versions antérieures à 2.3
Intel N/A Intel MPI Library software versions antérieures à 2021.11
Intel N/A Intel MPI Library versions antérieures à 2021.10.0
Intel N/A Intel OFU software versions antérieures à 14.1.31
Intel N/A Intel Optane PMem 100 Series management software versions antérieures à 01.00.00.3547
Intel N/A Intel Optane PMem 200 Series management software versions antérieures à 02.00.00.3915
Intel N/A Intel Optane PMem 300 Series management software versions antérieures à 03.00.00.0483
Intel N/A Intel Optimization pour TensorFlow versions antérieures à 2.13.0
Intel N/A Intel PCM software versions antérieures à 202307
Intel N/A Intel PM software toutes versions
Intel N/A Intel PROSet/Wireless Wi-Fi software versions antérieures à 22.240
Intel N/A Intel Killer Wi-Fi software version antérieures à 3.1423.712
Intel N/A Pilotes Intel QAT software pour Windows versions antérieures à QAT1.7-W-1.11.0
Intel N/A Intel QSFP+ Configuration Utility software toutes versions
Intel N/A Intel SDK pour OpenCL Applications software toutes versions
Intel N/A Intel SGX DCAP software pour Windows versions antérieures à 1.19.100.3
Intel N/A Intel SPS versions antérieures à SPS_E5_06.01.04.002.0
Intel N/A Intel SSU software versions antérieures à 3.0.0.2
Intel N/A Intel SUR software versions antérieures à 2.4.10587
Intel N/A Intel System Usage Report pour Gameplay Software version 2.0.1901
Intel N/A Pilote Intel Thunderbolt DCH pour Windows versions antérieures à 88
Intel N/A Intel Trace Analyzer and Collector 2021.10.0
Intel N/A Intel Unison software versions antérieures à C15
Intel N/A Intel Unite Client software versions antérieures à 4.2.35041
Intel N/A Intel VROC software versions antérieures à 8.0.8.1001
Intel N/A Intel VTune Profiler pour oneAPI versions antérieures à 2023.2.0
Intel N/A Intel XTU software versions antérieures à 7.12.0.29
Intel N/A Intel oneAPI AI Analytics Toolkit 2023.2
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2023.2.0
Intel N/A Intel oneAPI Deep Neural Network Library versions antérieures à 2023.2.0
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2023.2.0
Intel N/A Intel oneAPI IoT Toolkit versions antérieures à 2023.2.0.
Intel N/A Intel oneAPI Math Kernel Library versions antérieures à 2023.2.0.
Intel N/A Intel oneAPI Threading Building Blocks versions antérieures à 2021.10.0.
Intel N/A Intel oneAPI Toolkit et du programme d'installation des composants versions antérieures à 4.3.2
Intel N/A Sapphire Rapids Eagle Stream avec les processeurs Intel Xeon Scalable de 4e génération versions antérieures à PLR4 Release
References
Bulletin de sécurité Intel INTEL-SA-01004 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00947 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00992 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00956 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00969 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00993 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00981 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01003 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00987 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01006 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00959 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01014 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00967 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00954 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00913 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01005 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00998 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00994 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00927 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00851 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00948 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00988 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01011 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00958 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00903 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01000 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00973 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00974 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00928 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00953 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00955 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00930 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00895 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00922 du 13 février 2024 None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ACAT software maintenu par Intel versions ant\u00e9rieures \u00e0 2.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Arm DS software pour Intel SoC FPGA versions ant\u00e9rieures \u00e0 2022.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Tous les processeurs Intel Core de 6e, 7e, 8e ou 9e g\u00e9n\u00e9ration avec le pilote Intel Thunderbolt DCH toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Installation software pour Administrative Tools pour Intel Network Adapters versions ant\u00e9rieures \u00e0 28.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Installation software pour Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 28.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Installation software pour Intel Ethernet Connections Boot Utility, Preboot Images et pilotes EFI s versions ant\u00e9rieures \u00e0 28.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advisor pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Battery Life Diagnostic Tool software versions ant\u00e9rieures \u00e0 2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Binary Configuration Tool software versions ant\u00e9rieures \u00e0 3.4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CIP software versions ant\u00e9rieures \u00e0 2.4.10577",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Chipset Driver Software versions ant\u00e9rieures \u00e0 10.1.19444.8378",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Cluster Checker 2021.7.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA software versions ant\u00e9rieures \u00e0 23.4.33",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python 2023.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel ISPC versions ant\u00e9rieures \u00e0 1.21.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Inspector pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Integrated Performance Primitives 2021.9.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel du contr\u00f4leur Intel JHL8440 Thunderbolt 4 versions ant\u00e9rieures \u00e0 41",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MAS software versions ant\u00e9rieures \u00e0 2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library software versions ant\u00e9rieures \u00e0 2021.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library versions ant\u00e9rieures \u00e0 2021.10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OFU software versions ant\u00e9rieures \u00e0 14.1.31",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optane PMem 100 Series management software versions ant\u00e9rieures \u00e0 01.00.00.3547",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optane PMem 200 Series management software versions ant\u00e9rieures \u00e0 02.00.00.3915",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optane PMem 300 Series management software versions ant\u00e9rieures \u00e0 03.00.00.0483",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optimization pour TensorFlow versions ant\u00e9rieures \u00e0 2.13.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PCM software versions ant\u00e9rieures \u00e0 202307",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PM software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless Wi-Fi software versions ant\u00e9rieures \u00e0 22.240",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Killer Wi-Fi software version ant\u00e9rieures \u00e0 3.1423.712",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Intel QAT software pour Windows versions ant\u00e9rieures \u00e0 QAT1.7-W-1.11.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QSFP+ Configuration Utility software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SDK pour OpenCL Applications software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX DCAP software pour Windows versions ant\u00e9rieures \u00e0 1.19.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E5_06.01.04.002.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSU software versions ant\u00e9rieures \u00e0 3.0.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SUR software versions ant\u00e9rieures \u00e0 2.4.10587",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel System Usage Report pour Gameplay Software version 2.0.1901",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel Thunderbolt DCH pour Windows versions ant\u00e9rieures \u00e0 88",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Trace Analyzer and Collector 2021.10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Unison software versions ant\u00e9rieures \u00e0 C15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Unite Client software versions ant\u00e9rieures \u00e0 4.2.35041",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VROC software versions ant\u00e9rieures \u00e0 8.0.8.1001",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune Profiler pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel XTU software versions ant\u00e9rieures \u00e0 7.12.0.29",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI AI Analytics Toolkit 2023.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Deep Neural Network Library versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI IoT Toolkit versions ant\u00e9rieures \u00e0 2023.2.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2023.2.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Threading Building Blocks versions ant\u00e9rieures \u00e0 2021.10.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Toolkit et du programme d\u0027installation des composants versions ant\u00e9rieures \u00e0 4.3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Sapphire Rapids Eagle Stream avec les processeurs Intel Xeon Scalable de 4e g\u00e9n\u00e9ration versions ant\u00e9rieures \u00e0 PLR4 Release",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-27307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27307"
    },
    {
      "name": "CVE-2023-25174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25174"
    },
    {
      "name": "CVE-2023-33875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
    },
    {
      "name": "CVE-2023-28374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
    },
    {
      "name": "CVE-2023-34315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34315"
    },
    {
      "name": "CVE-2023-38135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38135"
    },
    {
      "name": "CVE-2023-40161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40161"
    },
    {
      "name": "CVE-2023-32280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32280"
    },
    {
      "name": "CVE-2022-43703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43703"
    },
    {
      "name": "CVE-2023-39432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39432"
    },
    {
      "name": "CVE-2023-22293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22293"
    },
    {
      "name": "CVE-2023-35121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35121"
    },
    {
      "name": "CVE-2023-35062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35062"
    },
    {
      "name": "CVE-2023-33870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33870"
    },
    {
      "name": "CVE-2023-31189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31189"
    },
    {
      "name": "CVE-2023-28396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28396"
    },
    {
      "name": "CVE-2023-25073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25073"
    },
    {
      "name": "CVE-2023-26596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26596"
    },
    {
      "name": "CVE-2023-26592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26592"
    },
    {
      "name": "CVE-2023-28715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28715"
    },
    {
      "name": "CVE-2023-34983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
    },
    {
      "name": "CVE-2023-38561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38561"
    },
    {
      "name": "CVE-2023-38566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38566"
    },
    {
      "name": "CVE-2023-32647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32647"
    },
    {
      "name": "CVE-2023-35769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35769"
    },
    {
      "name": "CVE-2023-28739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28739"
    },
    {
      "name": "CVE-2023-39425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39425"
    },
    {
      "name": "CVE-2023-28407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28407"
    },
    {
      "name": "CVE-2023-35060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35060"
    },
    {
      "name": "CVE-2023-29153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29153"
    },
    {
      "name": "CVE-2023-22390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22390"
    },
    {
      "name": "CVE-2023-24542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24542"
    },
    {
      "name": "CVE-2022-43701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43701"
    },
    {
      "name": "CVE-2023-41252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41252"
    },
    {
      "name": "CVE-2023-27517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27517"
    },
    {
      "name": "CVE-2023-26591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26591"
    },
    {
      "name": "CVE-2023-28745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28745"
    },
    {
      "name": "CVE-2023-2804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
    },
    {
      "name": "CVE-2023-27300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27300"
    },
    {
      "name": "CVE-2023-24463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24463"
    },
    {
      "name": "CVE-2023-35003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35003"
    },
    {
      "name": "CVE-2023-35061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
    },
    {
      "name": "CVE-2023-32644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
    },
    {
      "name": "CVE-2023-25779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25779"
    },
    {
      "name": "CVE-2023-39941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39941"
    },
    {
      "name": "CVE-2023-26585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26585"
    },
    {
      "name": "CVE-2023-27308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27308"
    },
    {
      "name": "CVE-2023-29162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29162"
    },
    {
      "name": "CVE-2023-24591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24591"
    },
    {
      "name": "CVE-2023-34351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34351"
    },
    {
      "name": "CVE-2023-22342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22342"
    },
    {
      "name": "CVE-2023-26586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
    },
    {
      "name": "CVE-2023-36490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36490"
    },
    {
      "name": "CVE-2023-25769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25769"
    },
    {
      "name": "CVE-2023-41231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41231"
    },
    {
      "name": "CVE-2022-43702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43702"
    },
    {
      "name": "CVE-2023-41091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41091"
    },
    {
      "name": "CVE-2023-36493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36493"
    },
    {
      "name": "CVE-2023-27301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27301"
    },
    {
      "name": "CVE-2023-32651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
    },
    {
      "name": "CVE-2023-41090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41090"
    },
    {
      "name": "CVE-2023-32642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
    },
    {
      "name": "CVE-2023-25951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
    },
    {
      "name": "CVE-2023-30767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30767"
    },
    {
      "name": "CVE-2023-31271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31271"
    },
    {
      "name": "CVE-2023-22311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22311"
    },
    {
      "name": "CVE-2023-32646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32646"
    },
    {
      "name": "CVE-2023-42776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42776"
    },
    {
      "name": "CVE-2023-39932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39932"
    },
    {
      "name": "CVE-2023-25777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25777"
    },
    {
      "name": "CVE-2023-22848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22848"
    },
    {
      "name": "CVE-2023-25945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25945"
    },
    {
      "name": "CVE-2023-24589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24589"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2023-40154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40154"
    },
    {
      "name": "CVE-2023-32618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32618"
    },
    {
      "name": "CVE-2023-27303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27303"
    },
    {
      "name": "CVE-2023-40156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40156"
    },
    {
      "name": "CVE-2023-24481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24481"
    },
    {
      "name": "CVE-2023-28720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0124",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Intel\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01004 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01004.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00947 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00992 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00992.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00956 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00969 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00993 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00993.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00981 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00981.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01003 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01003.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00987 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00987.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01006 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00959 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00959.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01014 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01014.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00967 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00954 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00954.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00913 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00913.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01005 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01005.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00998 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00998.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00994 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00994.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00927 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00927.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00851 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00948 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00988 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01011 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00958 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00958.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00903 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00903.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01000 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01000.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00973 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00973.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00974 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00974.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00928 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00928.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00953 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00955 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00930 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00930.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00895 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00895.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00922 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html"
    }
  ]
}

CERTFR-2024-AVI-0017

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel HotKey Services for Windows 10 for Intel NUC P14E Laptop Element versions antérieures à 1.1.45
Intel N/A Intel NUC sans les derniers correctifs de sécurité (se référer aux bulletins de sécurité de l'éditeur pour la liste complète des systèmes affectés)
Intel N/A Intel ISH driver for Windows 10 pour Intel NUC P14E Laptop Element versions antérieures à 5.4.1.4479
Intel N/A les pilotes Intel HID Event Filter pour Windows 10 pour certains portables Intel NUC versions antérieures à 2.2.2.1

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel HotKey Services for Windows 10 for Intel NUC P14E Laptop Element versions ant\u00e9rieures \u00e0 1.1.45",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC sans les derniers correctifs de s\u00e9curit\u00e9 (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour la liste compl\u00e8te des syst\u00e8mes affect\u00e9s)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel ISH driver for Windows 10 pour Intel NUC P14E Laptop Element versions ant\u00e9rieures \u00e0 5.4.1.4479",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les pilotes Intel HID Event Filter pour Windows 10 pour certains portables Intel NUC versions ant\u00e9rieures \u00e0 2.2.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-32272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32272"
    },
    {
      "name": "CVE-2023-42429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42429"
    },
    {
      "name": "CVE-2023-28722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28722"
    },
    {
      "name": "CVE-2023-28738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28738"
    },
    {
      "name": "CVE-2023-29244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29244"
    },
    {
      "name": "CVE-2023-38587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38587"
    },
    {
      "name": "CVE-2023-42766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42766"
    },
    {
      "name": "CVE-2023-29495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29495"
    },
    {
      "name": "CVE-2023-28743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28743"
    },
    {
      "name": "CVE-2023-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38541"
    },
    {
      "name": "CVE-2023-32544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32544"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0017",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00964 du 09 janvier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00964.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01028 du 09 janvier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01028.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01009 du 09 janvier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01009.html"
    }
  ]
}

CERTFR-2023-AVI-0953

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2023.1
Intel N/A Utilitaire Intel Server Information Retrieval versions antérieures à 16.0.9
Intel N/A Intel In-Band Manageability versions antérieures à 3.0.14
Intel N/A Micrologiciels Intel Optane SSD et Intel Optane SSD DC
Intel N/A 8ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Intel OpenVINO Model Server versions antérieures à 2022.3
Intel N/A Micrologiciel Intel NUC, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Intel MPI Library versions antérieures à 2021.9
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2023.1
Intel N/A 11ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Intel OFU versions antérieures à 14.1.31
Intel N/A Intel Unison sans le dernier correctif de sécurité
Intel N/A Micrologiciel Intel FPGA versions antérieures à 2.8.1
Intel N/A Pilote Intel QAT pour Windows HW versions 2.x antérieures à 2.04
Intel N/A Intel Arc RGB Controller versions antérieures à 1.06
Intel N/A Pilotes Intel Arc & Iris Xe Graphics WHQL pour Windows versions antérieures à 31.0.101.4255
Intel N/A Outil Intel Battery Life Diagnostic versions antérieures à 2.2.1
Intel N/A Application Intel Support pour Android toutes versions
Intel N/A Application Intel Smart Campus pour Android versions antérieures à 9.4
Intel N/A Intel Simics Simulator versions antérieures à 1.7.2
Intel N/A Processeur Intel Atom, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Pilote pour Radeon RX Vega M (intégré dans les processeurs Intel Core) versions antérieures à 23.10.01.46
Intel N/A 13ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A 12ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Logiciels pour Intel NUC
Intel N/A Processeur Intel Xeon D, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Intel RealSense Dynamic Calibration versions antérieures à 2.13.1.0
Intel N/A Intel OpenVINO toolkit versions antérieures à 2023.0.0
Intel N/A Intel Server Configuration Utility versions antérieures à 16.0.9
Intel N/A Bibliothèque Intel QAT Library (QATlib) versions antérieures à 22.07.1
Intel N/A Intel XTU versions antérieures à 7.12.0.15
Intel N/A Intel Connectivity Performance Suite sans le dernier correctif de sécurité
Intel N/A Intel QAT pour Linux versions antérieures à QAT20.L.1.0.40-00004
Intel N/A Intel Inspector versions antérieures à 2023.1
Intel N/A Processeur Intel Celeron, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A 10ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Intel On Demand Agent sans le dernier correctif de sécurité
Intel N/A Micrologiciels Intel Ethernet Adapters
Intel N/A Intel Chipset Device versions antérieures à 10.1.19444.8378
Intel N/A Micrologiciels Intel Server Board et Server System
Intel N/A Pilote Intel QAT pour Windows HW versions 1.x antérieures à 1.10
Intel N/A Intel DCM versions antérieures à 5.2
Intel N/A Processeur Intel Pentium, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A Intel Advisor versions antérieures à 2023.1
Intel N/A Intel Rapid Storage Technology versions antérieures à 16.8.5.1014.9
Intel N/A Micrologiciels Intel Ethernet Controllers
Intel N/A Processeur Intel Server, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
Intel N/A 9ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2023.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Utilitaire Intel Server Information Retrieval versions ant\u00e9rieures \u00e0 16.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel In-Band Manageability versions ant\u00e9rieures \u00e0 3.0.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciels Intel Optane SSD et Intel Optane SSD DC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "8\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OpenVINO Model Server versions ant\u00e9rieures \u00e0 2022.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel Intel NUC, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library versions ant\u00e9rieures \u00e0 2021.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2023.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "11\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OFU versions ant\u00e9rieures \u00e0 14.1.31",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Unison sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel Intel FPGA versions ant\u00e9rieures \u00e0 2.8.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel QAT pour Windows HW versions 2.x ant\u00e9rieures \u00e0 2.04",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc RGB Controller versions ant\u00e9rieures \u00e0 1.06",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Intel Arc \u0026 Iris Xe Graphics WHQL pour Windows versions ant\u00e9rieures \u00e0 31.0.101.4255",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Outil Intel Battery Life Diagnostic versions ant\u00e9rieures \u00e0 2.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Application Intel Support pour Android toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Application Intel Smart Campus pour Android versions ant\u00e9rieures \u00e0 9.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Simics Simulator versions ant\u00e9rieures \u00e0 1.7.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Atom, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote pour Radeon RX Vega M (int\u00e9gr\u00e9 dans les processeurs Intel Core) versions ant\u00e9rieures \u00e0 23.10.01.46",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "13\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "12\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Logiciels pour Intel NUC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Xeon D, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RealSense Dynamic Calibration versions ant\u00e9rieures \u00e0 2.13.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OpenVINO toolkit versions ant\u00e9rieures \u00e0 2023.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Configuration Utility versions ant\u00e9rieures \u00e0 16.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Biblioth\u00e8que Intel QAT Library (QATlib) versions ant\u00e9rieures \u00e0 22.07.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel XTU versions ant\u00e9rieures \u00e0 7.12.0.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Connectivity Performance Suite sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QAT pour Linux versions ant\u00e9rieures \u00e0 QAT20.L.1.0.40-00004",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Inspector versions ant\u00e9rieures \u00e0 2023.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Celeron, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "10\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel On Demand Agent sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciels Intel Ethernet Adapters",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Chipset Device versions ant\u00e9rieures \u00e0 10.1.19444.8378",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciels Intel Server Board et Server System",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel QAT pour Windows HW versions 1.x ant\u00e9rieures \u00e0 1.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DCM versions ant\u00e9rieures \u00e0 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Pentium, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advisor versions ant\u00e9rieures \u00e0 2023.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Rapid Storage Technology versions ant\u00e9rieures \u00e0 16.8.5.1014.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciels Intel Ethernet Controllers",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Server, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "9\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-28388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28388"
    },
    {
      "name": "CVE-2023-25756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25756"
    },
    {
      "name": "CVE-2023-29504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29504"
    },
    {
      "name": "CVE-2023-32661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32661"
    },
    {
      "name": "CVE-2022-41700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41700"
    },
    {
      "name": "CVE-2022-43477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43477"
    },
    {
      "name": "CVE-2023-39230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39230"
    },
    {
      "name": "CVE-2023-33878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33878"
    },
    {
      "name": "CVE-2022-24379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24379"
    },
    {
      "name": "CVE-2023-32204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32204"
    },
    {
      "name": "CVE-2023-28401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28401"
    },
    {
      "name": "CVE-2023-27513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27513"
    },
    {
      "name": "CVE-2023-38411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38411"
    },
    {
      "name": "CVE-2023-28740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28740"
    },
    {
      "name": "CVE-2023-27519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27519"
    },
    {
      "name": "CVE-2023-36860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36860"
    },
    {
      "name": "CVE-2023-39221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39221"
    },
    {
      "name": "CVE-2023-32655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32655"
    },
    {
      "name": "CVE-2023-27879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27879"
    },
    {
      "name": "CVE-2023-24587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24587"
    },
    {
      "name": "CVE-2022-46298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46298"
    },
    {
      "name": "CVE-2023-28378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28378"
    },
    {
      "name": "CVE-2023-22663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22663"
    },
    {
      "name": "CVE-2023-22327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22327"
    },
    {
      "name": "CVE-2022-43666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43666"
    },
    {
      "name": "CVE-2023-22292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22292"
    },
    {
      "name": "CVE-2023-22337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22337"
    },
    {
      "name": "CVE-2022-34302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34302"
    },
    {
      "name": "CVE-2022-27229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27229"
    },
    {
      "name": "CVE-2023-25075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25075"
    },
    {
      "name": "CVE-2023-28377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28377"
    },
    {
      "name": "CVE-2023-28737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28737"
    },
    {
      "name": "CVE-2023-32279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32279"
    },
    {
      "name": "CVE-2023-22290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22290"
    },
    {
      "name": "CVE-2023-39411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39411"
    },
    {
      "name": "CVE-2023-39228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39228"
    },
    {
      "name": "CVE-2023-34350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34350"
    },
    {
      "name": "CVE-2023-33874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33874"
    },
    {
      "name": "CVE-2023-28723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28723"
    },
    {
      "name": "CVE-2023-28404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28404"
    },
    {
      "name": "CVE-2023-20568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20568"
    },
    {
      "name": "CVE-2021-46748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46748"
    },
    {
      "name": "CVE-2023-28397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28397"
    },
    {
      "name": "CVE-2023-22310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22310"
    },
    {
      "name": "CVE-2023-29157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29157"
    },
    {
      "name": "CVE-2023-22448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22448"
    },
    {
      "name": "CVE-2023-27306",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27306"
    },
    {
      "name": "CVE-2023-26589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26589"
    },
    {
      "name": "CVE-2022-34301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34301"
    },
    {
      "name": "CVE-2023-40540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40540"
    },
    {
      "name": "CVE-2023-25071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25071"
    },
    {
      "name": "CVE-2023-22285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22285"
    },
    {
      "name": "CVE-2023-24588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24588"
    },
    {
      "name": "CVE-2023-34997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34997"
    },
    {
      "name": "CVE-2023-28376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28376"
    },
    {
      "name": "CVE-2023-29165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29165"
    },
    {
      "name": "CVE-2022-29262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29262"
    },
    {
      "name": "CVE-2022-41689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41689"
    },
    {
      "name": "CVE-2023-40220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40220"
    },
    {
      "name": "CVE-2022-36396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36396"
    },
    {
      "name": "CVE-2022-36377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36377"
    },
    {
      "name": "CVE-2023-20567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20567"
    },
    {
      "name": "CVE-2023-38570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38570"
    },
    {
      "name": "CVE-2022-36374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36374"
    },
    {
      "name": "CVE-2022-33945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33945"
    },
    {
      "name": "CVE-2022-46301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46301"
    },
    {
      "name": "CVE-2023-38131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38131"
    },
    {
      "name": "CVE-2022-46299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46299"
    },
    {
      "name": "CVE-2023-31203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31203"
    },
    {
      "name": "CVE-2022-41659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41659"
    },
    {
      "name": "CVE-2023-23583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23583"
    },
    {
      "name": "CVE-2023-27305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27305"
    },
    {
      "name": "CVE-2023-32660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32660"
    },
    {
      "name": "CVE-2023-32638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32638"
    },
    {
      "name": "CVE-2023-34431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34431"
    },
    {
      "name": "CVE-2023-32278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32278"
    },
    {
      "name": "CVE-2023-22329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22329"
    },
    {
      "name": "CVE-2023-33872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33872"
    },
    {
      "name": "CVE-2022-33898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33898"
    },
    {
      "name": "CVE-2023-29161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29161"
    },
    {
      "name": "CVE-2023-32658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32658"
    },
    {
      "name": "CVE-2022-46646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46646"
    },
    {
      "name": "CVE-2023-32283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32283"
    },
    {
      "name": "CVE-2023-31273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31273"
    },
    {
      "name": "CVE-2022-46647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46647"
    },
    {
      "name": "CVE-2022-29510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29510"
    },
    {
      "name": "CVE-2023-25080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25080"
    },
    {
      "name": "CVE-2023-22305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22305"
    },
    {
      "name": "CVE-2023-28741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28741"
    },
    {
      "name": "CVE-2023-25952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25952"
    },
    {
      "name": "CVE-2023-25949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25949"
    },
    {
      "name": "CVE-2023-32641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32641"
    },
    {
      "name": "CVE-2023-22313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22313"
    },
    {
      "name": "CVE-2022-45469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45469"
    },
    {
      "name": "CVE-2023-34314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34314"
    },
    {
      "name": "CVE-2022-34303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34303"
    },
    {
      "name": "CVE-2023-39412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39412"
    },
    {
      "name": "CVE-2022-42879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42879"
    },
    {
      "name": "CVE-2022-45109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45109"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0953",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel du 14 novembre 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/default.html"
    }
  ]
}

CERTFR-2023-AVI-0422

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Intel HDMI Firmware Update Tool. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel HDMI Firmware Update Tool pour NUC versions antérieures à 1.79.1.1
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel HDMI Firmware Update Tool pour NUC versions ant\u00e9rieures \u00e0 1.79.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-40971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40971"
    },
    {
      "name": "CVE-2022-21162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21162"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0422",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-31T00:00:00.000000"
    },
    {
      "description": "Clarification du produit affect\u00e9",
      "revision_date": "2023-06-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eIntel HDMI Firmware Update Tool\u003c/span\u003e. Elles permettent\n\u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel HDMI Firmware Update Tool",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00833 du 09 mai 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00833.html"
    }
  ]
}

CERTFR-2023-AVI-0127

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans Intel. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une élévation de privilèges, un déni de service et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel Distribution pour le langage de programmation Python versions antérieures à 2022.1
Intel N/A Intel SUR versions antérieures à 2.4.8902
Intel N/A Intel Trace Analyzer and Collector versions antérieures à 2021.5
Intel N/A Intel DSA versions antérieures à 22.4.26
Intel N/A Intel oneAPI DPC++/C++ Compiler Runtime versions antérieures à 2022.0
Intel N/A Les processeurs Intel dont la liste est mentionnée dans les liens des fabriquants de la section Documentation.
Intel N/A Intel OpenBMC versions antérieures à 0.72
Intel N/A Micrologiciel Intel BMC versions antérieures à 2.86
Intel N/A Intel CVAT versions antérieures à 2.0.1
Intel N/A Les pilotes Intel Ethernet 500 Series Controller pour VMWare versions antérieures à 1.10.0.13
Intel N/A Intel FPGA Add-on pour Intel oneAPI Toolkits versions antérieures à 2022.2
Intel N/A Intel oneAPI Collective Communications Library (oneCCL) versions antérieures à 2021.6
Intel N/A Intel oneAPI Data Analytics Library versions antérieures à 2021.5
Intel N/A Intel Integrated Sensor Solution versions antérieures à 5.4.1.4479
Intel N/A Intel C++ Compiler Classic versions antérieures à 2021.6
Intel N/A Intel oneAPI Toolkits versions antérieures à 2022.2
Intel N/A Intel Media SDK versions antérieures à 22.2.2
Intel N/A Micrologiciel Intel BMC versions antérieures à 2.78
Intel N/A Intel FCS server versions antérieures à 1.1.79.3
Intel N/A Intel oneAPI DPC++/C++ Compiler versions antérieures à 2022.1
Intel N/A Intel oneAPI Deep Neural Network (oneDNN) versions antérieures à 2022.1
Intel N/A Intel Integrated Sensor Solution versions antérieures à 5.4.2.4579v3
Intel N/A Intel Battery Life Diagnostic Tool versions antérieures à 2.2.0
Intel N/A Les pilotes Intel Iris Xe MAX pour Windows versions antérieures à 100.0.5.1474
Intel N/A Intel OpenBMC versions antérieures à egs-0.91-179
Intel N/A Intel OFU versions antérieures à 14.1.28
Intel N/A Intel MPI Library pour Intel oneAPI HPC Toolkit versions antérieures à 2021.6
Intel N/A Intel Quartus Prime Pro edition versions antérieures à 22.2
Intel N/A Intel Integrated Sensor Solution versions antérieures à 5.0.0.4143
Intel N/A Intel E810 Ethernet Controllers and Adapters versions antérieures à 1.7.0.8
Intel N/A Intel OpenBMC versions antérieures à wht-1.01-61
Intel N/A Les pilotes Intel QAT pour Linux versions antérieures à 4.17
Intel N/A Intel QATzip versions antérieures à 1.0.9
Intel N/A Intel Administrative Tools pour Intel Network Adapters versions antérieures à 27.3
Intel N/A Intel Quartus Prime Standard Edition versions antérieures à 21.1
Intel N/A Intel SGX SDK software pour Linux versions antérieures à 2.16.100.1
Intel N/A Intel Open CAS versions antérieures à 22.3.1
Intel N/A Intel Quartus Prime Pro Edition versions antérieures à 21.3
Intel N/A Intel EMA versions antérieures à 1.8.1.0
Intel N/A Micrologiciel Intel BMC versions antérieures à 2.09
Intel N/A Les applications Android Intel ON Event Series versions antérieures à 2.0
Intel N/A Intel SGX SDK software pour Windows versions antérieures à 2.15.100.1
Intel N/A Intel Quartus Prime Standard edition versions antérieures à 22.1STD
Intel N/A Intel 700 Series Ethernet Controllers and Adapters versions antérieures à 9.101
Intel N/A Intel Non-Volatile Memory (NVM) Update Utility pour Intel Ethernet Network Adapter E810 Series versions antérieures à 4.01
Intel N/A Intel SPS firmware versions antérieures à SPS_E3_06.00.03.300.0
Intel N/A Intel oneapi-cli pour Intel oneAPI Toolkits versions antérieures à 0.2.0
Intel N/A Intel Crypto API Toolkit pour Intel SGX versions antérieures à 2.0 ID commit 91ee496
Intel N/A Les pilotes Intel QAT pour Windows versions antérieures à 1.6
Intel N/A Intel SPS firmware versions antérieures à SPS_E5_04.04.04.300.0
Intel N/A Intel FPGA SDK pour OpenCL Pro Edition versions antérieures à 22.1
Intel N/A Les pilotes Intel Ethernet Controller Administrative Tools pour Windows versions antérieures à 1.5.0.2
References
Bulletin de sécurité Intel intel-sa-00674 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00714 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00700 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00767 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00770 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00751 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00776 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00728 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00731 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00738 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00726 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00717 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00733 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00764 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00762 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00737 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00761 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00736 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00718 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00725 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00754 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00765 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00677 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00730 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00739 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00769 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00727 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00746 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00729 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00750 du 14 février 2023 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00721 du 14 février 2023 None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Distribution pour le langage de programmation Python versions ant\u00e9rieures \u00e0 2022.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SUR versions ant\u00e9rieures \u00e0 2.4.8902",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Trace Analyzer and Collector versions ant\u00e9rieures \u00e0 2021.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 22.4.26",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI DPC++/C++ Compiler Runtime versions ant\u00e9rieures \u00e0 2022.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les processeurs Intel dont la liste est mentionn\u00e9e dans les liens des fabriquants de la section Documentation.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OpenBMC versions ant\u00e9rieures \u00e0 0.72",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel Intel BMC versions ant\u00e9rieures \u00e0 2.86",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CVAT versions ant\u00e9rieures \u00e0 2.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les pilotes Intel Ethernet 500 Series Controller pour VMWare versions ant\u00e9rieures \u00e0 1.10.0.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel FPGA Add-on pour Intel oneAPI Toolkits versions ant\u00e9rieures \u00e0 2022.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Collective Communications Library (oneCCL) versions ant\u00e9rieures \u00e0 2021.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Data Analytics Library versions ant\u00e9rieures \u00e0 2021.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Integrated Sensor Solution versions ant\u00e9rieures \u00e0 5.4.1.4479",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel C++ Compiler Classic versions ant\u00e9rieures \u00e0 2021.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Toolkits versions ant\u00e9rieures \u00e0 2022.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Media SDK versions ant\u00e9rieures \u00e0 22.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel Intel BMC versions ant\u00e9rieures \u00e0 2.78",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel FCS server versions ant\u00e9rieures \u00e0 1.1.79.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2022.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Deep Neural Network (oneDNN) versions ant\u00e9rieures \u00e0 2022.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Integrated Sensor Solution versions ant\u00e9rieures \u00e0 5.4.2.4579v3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 2.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les pilotes Intel Iris Xe MAX pour Windows versions ant\u00e9rieures \u00e0 100.0.5.1474",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OpenBMC versions ant\u00e9rieures \u00e0 egs-0.91-179",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OFU versions ant\u00e9rieures \u00e0 14.1.28",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library pour Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2021.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Pro edition versions ant\u00e9rieures \u00e0 22.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Integrated Sensor Solution versions ant\u00e9rieures \u00e0 5.0.0.4143",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel E810 Ethernet Controllers and Adapters versions ant\u00e9rieures \u00e0 1.7.0.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OpenBMC versions ant\u00e9rieures \u00e0 wht-1.01-61",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les pilotes Intel QAT pour Linux versions ant\u00e9rieures \u00e0 4.17",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QATzip versions ant\u00e9rieures \u00e0 1.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Administrative Tools pour Intel Network Adapters versions ant\u00e9rieures \u00e0 27.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Standard Edition versions ant\u00e9rieures \u00e0 21.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX SDK software pour Linux versions ant\u00e9rieures \u00e0 2.16.100.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Open CAS versions ant\u00e9rieures \u00e0 22.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Pro Edition versions ant\u00e9rieures \u00e0 21.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel EMA versions ant\u00e9rieures \u00e0 1.8.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel Intel BMC versions ant\u00e9rieures \u00e0 2.09",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les applications Android Intel ON Event Series versions ant\u00e9rieures \u00e0 2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX SDK software pour Windows versions ant\u00e9rieures \u00e0 2.15.100.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Standard edition versions ant\u00e9rieures \u00e0 22.1STD",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 700 Series Ethernet Controllers and Adapters versions ant\u00e9rieures \u00e0 9.101",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Non-Volatile Memory (NVM) Update Utility pour Intel Ethernet Network Adapter E810 Series versions ant\u00e9rieures \u00e0 4.01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS firmware versions ant\u00e9rieures \u00e0 SPS_E3_06.00.03.300.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneapi-cli pour Intel oneAPI Toolkits versions ant\u00e9rieures \u00e0 0.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Crypto API Toolkit pour Intel SGX versions ant\u00e9rieures \u00e0 2.0 ID commit 91ee496",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les pilotes Intel QAT pour Windows versions ant\u00e9rieures \u00e0 1.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS firmware versions ant\u00e9rieures \u00e0 SPS_E5_04.04.04.300.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel FPGA SDK pour OpenCL Pro Edition versions ant\u00e9rieures \u00e0 22.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les pilotes Intel Ethernet Controller Administrative Tools pour Windows versions ant\u00e9rieures \u00e0 1.5.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-34346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34346"
    },
    {
      "name": "CVE-2022-26840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26840"
    },
    {
      "name": "CVE-2022-29514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29514"
    },
    {
      "name": "CVE-2022-32971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32971"
    },
    {
      "name": "CVE-2021-33104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33104"
    },
    {
      "name": "CVE-2022-33972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33972"
    },
    {
      "name": "CVE-2022-21163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21163"
    },
    {
      "name": "CVE-2022-32575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32575"
    },
    {
      "name": "CVE-2022-26421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26421"
    },
    {
      "name": "CVE-2022-30539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30539"
    },
    {
      "name": "CVE-2022-33964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33964"
    },
    {
      "name": "CVE-2022-29523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29523"
    },
    {
      "name": "CVE-2022-36348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36348"
    },
    {
      "name": "CVE-2022-36369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36369"
    },
    {
      "name": "CVE-2022-34157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34157"
    },
    {
      "name": "CVE-2022-26345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26345"
    },
    {
      "name": "CVE-2022-25992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25992"
    },
    {
      "name": "CVE-2022-26888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26888"
    },
    {
      "name": "CVE-2022-30339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30339"
    },
    {
      "name": "CVE-2022-34864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34864"
    },
    {
      "name": "CVE-2022-26032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26032"
    },
    {
      "name": "CVE-2021-39295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39295"
    },
    {
      "name": "CVE-2022-30692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30692"
    },
    {
      "name": "CVE-2022-36398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36398"
    },
    {
      "name": "CVE-2022-30704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30704"
    },
    {
      "name": "CVE-2022-35729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35729"
    },
    {
      "name": "CVE-2022-26425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26425"
    },
    {
      "name": "CVE-2022-41314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41314"
    },
    {
      "name": "CVE-2022-36397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36397"
    },
    {
      "name": "CVE-2022-34849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34849"
    },
    {
      "name": "CVE-2022-25987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25987"
    },
    {
      "name": "CVE-2022-31476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31476"
    },
    {
      "name": "CVE-2022-36287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36287"
    },
    {
      "name": "CVE-2022-32231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32231"
    },
    {
      "name": "CVE-2022-26052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26052"
    },
    {
      "name": "CVE-2022-21216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21216"
    },
    {
      "name": "CVE-2022-36289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36289"
    },
    {
      "name": "CVE-2022-30530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30530"
    },
    {
      "name": "CVE-2022-26837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26837"
    },
    {
      "name": "CVE-2022-29493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29493"
    },
    {
      "name": "CVE-2022-35883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35883"
    },
    {
      "name": "CVE-2022-25905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25905"
    },
    {
      "name": "CVE-2022-34854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34854"
    },
    {
      "name": "CVE-2022-33190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33190"
    },
    {
      "name": "CVE-2022-36794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36794"
    },
    {
      "name": "CVE-2022-33902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33902"
    },
    {
      "name": "CVE-2022-37329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37329"
    },
    {
      "name": "CVE-2022-37340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37340"
    },
    {
      "name": "CVE-2022-26509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26509"
    },
    {
      "name": "CVE-2022-32764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32764"
    },
    {
      "name": "CVE-2022-33196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33196"
    },
    {
      "name": "CVE-2022-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27170"
    },
    {
      "name": "CVE-2022-26076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26076"
    },
    {
      "name": "CVE-2021-39296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39296"
    },
    {
      "name": "CVE-2022-34841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34841"
    },
    {
      "name": "CVE-2022-36797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36797"
    },
    {
      "name": "CVE-2022-38056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38056"
    },
    {
      "name": "CVE-2022-36416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36416"
    },
    {
      "name": "CVE-2022-34153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34153"
    },
    {
      "name": "CVE-2022-32570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32570"
    },
    {
      "name": "CVE-2022-27808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27808"
    },
    {
      "name": "CVE-2022-30531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30531"
    },
    {
      "name": "CVE-2022-26062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26062"
    },
    {
      "name": "CVE-2022-38090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38090"
    },
    {
      "name": "CVE-2022-41614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41614"
    },
    {
      "name": "CVE-2022-29494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29494"
    },
    {
      "name": "CVE-2022-33892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33892"
    },
    {
      "name": "CVE-2022-36278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36278"
    },
    {
      "name": "CVE-2022-26512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26512"
    },
    {
      "name": "CVE-2022-34843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34843"
    },
    {
      "name": "CVE-2021-0187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0187"
    },
    {
      "name": "CVE-2022-36382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36382"
    },
    {
      "name": "CVE-2022-27234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27234"
    },
    {
      "name": "CVE-2022-26343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26343"
    },
    {
      "name": "CVE-2022-33946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33946"
    },
    {
      "name": "CVE-2022-26841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26841"
    },
    {
      "name": "CVE-2022-26843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26843"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0127",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-02-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eIntel\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\ncontournement de la politique de s\u00e9curit\u00e9, une \u00e9l\u00e9vation de privil\u00e8ges,\nun d\u00e9ni de service et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00674 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00714 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00700 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00767 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00770 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00751 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00776 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00776.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00728 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00728.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00731 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00731.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00738 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00726 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00717 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00733 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00733.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00764 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00764.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00762 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00762.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00737 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00761 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00761.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00736 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00736.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00718 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00725 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00754 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00754.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00765 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00677 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00677.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00730 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00739 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00739.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00769 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00769.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00727 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00727.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00746 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00729 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00750 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00750.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00721 du 14 f\u00e9vrier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00721.html"
    }
  ]
}

CERTFR-2023-AVI-0017

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Intel oneAPI Toolkit. Elles permettent à un attaquant de provoquer une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel C++ Compiler Classic versions antérieures à 2021.8
Intel N/A Intel oneAPI DPC++/C++ Compiler versions antérieures à 2022.2.1
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel C++ Compiler Classic versions ant\u00e9rieures \u00e0 2021.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2022.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-41342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41342"
    },
    {
      "name": "CVE-2022-38136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38136"
    },
    {
      "name": "CVE-2022-40196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40196"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0017",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Intel oneAPI\nToolkit. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel oneAPI Toolkit",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00773 du 10 janvier 2023",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00773.html"
    }
  ]
}

CERTFR-2022-AVI-1087

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Intel OpenIPC. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel OpenIPC binaries pour At-Scale Debug (ASD) sans le dernier correctif
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel OpenIPC binaries pour At-Scale Debug (ASD) sans le dernier correctif",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    }
  ],
  "links": [],
  "reference": "CERTFR-2022-AVI-1087",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-12-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Intel OpenIPC.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel OpenIPC",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00789 du 12 d\u00e9cembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html"
    }
  ]
}

CERTFR-2022-AVI-1078

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les micrologiciels Baseboard Management Controller (BMC) Intel. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Micrologiciel BMC pour la famille de cartes M70KLP2SB versions antérieures à 4.15
Intel N/A Micrologiciel BMC pour la famille de cartes M10JNP2SB versions antérieures à 1.11
Intel N/A Micrologiciel BMC pour la famille de cartes M20NTP versions antérieures à v0027
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Micrologiciel BMC pour la famille de cartes M70KLP2SB versions ant\u00e9rieures \u00e0 4.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel BMC pour la famille de cartes M10JNP2SB versions ant\u00e9rieures \u00e0 1.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel BMC pour la famille de cartes M20NTP versions ant\u00e9rieures \u00e0 v0027",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-40242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40242"
    },
    {
      "name": "CVE-2022-2827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2827"
    }
  ],
  "links": [],
  "reference": "CERTFR-2022-AVI-1078",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-12-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les micrologiciels\nBaseboard Management Controller (BMC) Intel. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel du 05 d\u00e9cembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00801.html"
    }
  ]
}

CERTFR-2022-AVI-1009

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel MC versions antérieures à 2.3.2
Intel N/A Intel EMA versions antérieures à 1.7.1
Intel N/A Intel Quartus Prime Pro edition software versions antérieures à 22.1
Intel N/A Intel CSME versions antérieures à 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25
Intel N/A Intel PROSet/Wireless WiFi UEFI drivers versions antérieures à 2.2.14.22176
Intel N/A Intel SPS versions antérieures à SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0
Intel N/A Intel SDP Tool versions antérieures à 3.0.0
Intel N/A Intel NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN et NUC7i7DN versions antérieures à 1.78.2.0.7.
Intel N/A Intel Advanced Link Analyzer Pro versions antérieures à 22.2
Intel N/A PresentMon versions antérieures à 1.7.1
Intel N/A Intel NUC Kit Wireless Adapter driver installer software versions antérieures à 22.40.0
Intel N/A Intel SGX SDK software pour Linux versions antérieures à 2.18.100.1
Intel N/A Intel Glorp gaming particle physics demonstration software version 1.0.0
Intel N/A Les produits Intel vPRO CSME WiFi sans la dernière mise à jour
Intel N/A Intel Advanced Link Analyzer Standrad versions antérieures à 22.1.1 STD
Intel N/A Intel XMM 7560 Modem M.2 sans la dernière mise à jour
Intel N/A Intel Server System R1000WF, R200WF et Intel Server Board S2600WF sans la dernière mise à jour
Intel N/A Intel EMA versions antérieures à 1.8.0
Intel N/A Intel Server Board M50CYP sans la dernière mise à jour
Intel N/A Intel PROSet/Wireless WiFi versions antérieures à 22.140
Intel N/A Intel Processors sans la dernière mise à jour
Intel N/A Intel VTune Profiler software versions antérieures à 2022.2.0
Intel N/A Intel NUC BIOS Firmware sans la dernière mise à jour
Intel N/A Intel Quartus Prime Standard edition software versions antérieures à 21.1 Patch 0.02std
Intel N/A Intel Server Board M10JNP sans la dernière mise à jour
Intel N/A Intel AMT versions antérieures à 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0
Intel N/A Killer WiFi versions antérieures à 3.1122.3158
Intel N/A Intel Distribution of OpenVINO Toolkit versions antérieures à 2021.4.2
Intel N/A Intel SGX SDK software pour Windows versions antérieures à 2.17.100.1
Intel N/A Intel AMT SDK versions antérieures à 16.0.4.1
Intel N/A Hyperscan library versions antérieures à 5.4.0
Intel N/A Intel System Studio toutes versions
Intel N/A Intel WAPI Security sans la dernière mise à jour
Intel N/A Intel DCM versions antérieures à 5.0
Intel N/A Intel Support Android application versions antérieures à 22.02.28
References
Bulletin de sécurité Intel intel-sa-00752 du 08 novembre 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00676 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00715 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00687 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00691 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00695 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00713 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00558 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00711 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00720 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00642 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00716 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00747 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00680 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00699 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00659 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00683 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00708 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00688 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00710 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00689 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00673 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00740 du 08 novembre 2022 - other
Bulletin de sécurité Intel intel-sa-00610 du 08 novembre 2022 - other

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel MC versions ant\u00e9rieures \u00e0 2.3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel EMA versions ant\u00e9rieures \u00e0 1.7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Pro edition software versions ant\u00e9rieures \u00e0 22.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless WiFi UEFI drivers versions ant\u00e9rieures \u00e0 2.2.14.22176",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SDP Tool versions ant\u00e9rieures \u00e0 3.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN et NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advanced Link Analyzer Pro versions ant\u00e9rieures \u00e0 22.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "PresentMon versions ant\u00e9rieures \u00e0 1.7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC Kit Wireless Adapter driver installer software versions ant\u00e9rieures \u00e0 22.40.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX SDK software pour Linux versions ant\u00e9rieures \u00e0 2.18.100.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Glorp gaming particle physics demonstration software version 1.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Les produits Intel vPRO CSME WiFi sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advanced Link Analyzer Standrad versions ant\u00e9rieures \u00e0 22.1.1 STD",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel XMM 7560 Modem M.2 sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server System R1000WF, R200WF et Intel Server Board S2600WF sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel EMA versions ant\u00e9rieures \u00e0 1.8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board M50CYP sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieures \u00e0 22.140",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Processors sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune Profiler software versions ant\u00e9rieures \u00e0 2022.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC BIOS Firmware sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Standard edition software versions ant\u00e9rieures \u00e0 21.1 Patch 0.02std",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board M10JNP sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel AMT versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer WiFi versions ant\u00e9rieures \u00e0 3.1122.3158",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2021.4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX SDK software pour Windows versions ant\u00e9rieures \u00e0 2.17.100.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel AMT SDK versions ant\u00e9rieures \u00e0 16.0.4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Hyperscan library versions ant\u00e9rieures \u00e0 5.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel System Studio toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel WAPI Security sans la derni\u00e8re mise \u00e0 jour",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DCM versions ant\u00e9rieures \u00e0 5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Support Android application versions ant\u00e9rieures \u00e0 22.02.28",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-27233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27233"
    },
    {
      "name": "CVE-2022-27874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27874"
    },
    {
      "name": "CVE-2022-36789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36789"
    },
    {
      "name": "CVE-2022-36380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36380"
    },
    {
      "name": "CVE-2022-33942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33942"
    },
    {
      "name": "CVE-2022-37334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37334"
    },
    {
      "name": "CVE-2022-36349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36349"
    },
    {
      "name": "CVE-2022-38099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38099"
    },
    {
      "name": "CVE-2022-27187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27187"
    },
    {
      "name": "CVE-2022-30548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30548"
    },
    {
      "name": "CVE-2022-26513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26513"
    },
    {
      "name": "CVE-2022-27497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27497"
    },
    {
      "name": "CVE-2021-0185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0185"
    },
    {
      "name": "CVE-2021-33064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33064"
    },
    {
      "name": "CVE-2022-21198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21198"
    },
    {
      "name": "CVE-2022-30691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30691"
    },
    {
      "name": "CVE-2022-36384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36384"
    },
    {
      "name": "CVE-2022-26028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26028"
    },
    {
      "name": "CVE-2022-32569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32569"
    },
    {
      "name": "CVE-2022-25917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25917"
    },
    {
      "name": "CVE-2022-26086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26086"
    },
    {
      "name": "CVE-2022-28126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28126"
    },
    {
      "name": "CVE-2022-34152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34152"
    },
    {
      "name": "CVE-2022-26341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26341"
    },
    {
      "name": "CVE-2022-26367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26367"
    },
    {
      "name": "CVE-2022-26006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26006"
    },
    {
      "name": "CVE-2022-21794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21794"
    },
    {
      "name": "CVE-2022-26508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26508"
    },
    {
      "name": "CVE-2022-33176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33176"
    },
    {
      "name": "CVE-2022-26369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26369"
    },
    {
      "name": "CVE-2022-33973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33973"
    },
    {
      "name": "CVE-2022-26845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26845"
    },
    {
      "name": "CVE-2021-33164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33164"
    },
    {
      "name": "CVE-2021-33159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33159"
    },
    {
      "name": "CVE-2022-37345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37345"
    },
    {
      "name": "CVE-2022-27638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27638"
    },
    {
      "name": "CVE-2022-36367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36367"
    },
    {
      "name": "CVE-2022-36370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36370"
    },
    {
      "name": "CVE-2022-26045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26045"
    },
    {
      "name": "CVE-2022-26124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26124"
    },
    {
      "name": "CVE-2022-36400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36400"
    },
    {
      "name": "CVE-2022-28611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28611"
    },
    {
      "name": "CVE-2022-35276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35276"
    },
    {
      "name": "CVE-2022-36377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36377"
    },
    {
      "name": "CVE-2022-28667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
    },
    {
      "name": "CVE-2022-26079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26079"
    },
    {
      "name": "CVE-2021-26251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26251"
    },
    {
      "name": "CVE-2022-29486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29486"
    },
    {
      "name": "CVE-2022-26047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
    },
    {
      "name": "CVE-2022-27639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27639"
    },
    {
      "name": "CVE-2022-29515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29515"
    },
    {
      "name": "CVE-2022-29893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29893"
    },
    {
      "name": "CVE-2022-27499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27499"
    },
    {
      "name": "CVE-2022-30297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30297"
    },
    {
      "name": "CVE-2022-30542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30542"
    },
    {
      "name": "CVE-2022-29466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29466"
    },
    {
      "name": "CVE-2022-26024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26024"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00676 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00676.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00715 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00715.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00687 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00687.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00691 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00691.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00695 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00695.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00713 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00713.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00558 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00558.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00711 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00711.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00720 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00720.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00642 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00642.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00716 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00716.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00747 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00680 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00680.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00699 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00659 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00659.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00683 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00683.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00708 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00688 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00710 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00710.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00689 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00689.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00673 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00673.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00740 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00740.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00610 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html"
    }
  ],
  "reference": "CERTFR-2022-AVI-1009",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-11-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00752 du 08 novembre 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
    }
  ]
}

CERTFR-2022-AVI-727

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel 722 Series Ethernet contrôleurs et adaptateurs versions antérieures à 1.5.5
Intel N/A Intel Killer™ WiFi versions antérieures à 3.1122.1105
Intel N/A Open AMT Cloud Toolkit versions antérieures à 2.0.2 et 2.2.2
Intel N/A Intel E810 Ethernet contrôleurs et adaptateurs versions antérieures à 1.6.1.9
Intel N/A Intel Support Android versions antérieures à 21.7.40
Intel N/A Intel Team Blue toutes versions
Intel N/A Intel IPP Cryptography versions antérieures à 2021.5
Intel N/A Intel VTune™ Profiler versions antérieures à 2022.2.0
Intel N/A Intel Processors (veuillez vous référer aux avis de l'éditeur : intel-sa-00706 et intel-sa-00657)
Intel N/A Intel Edge Insights pour les versions Industrial antérieures à 2.6.1
Intel N/A Intel Standard Manageability toutes versions
Intel N/A Intel Data Center Manager versions antérieures à 4.1
Intel N/A Intel PROSet/Wireless WiFi versions antérieure à 22.120
Intel N/A Intel Datacenter Group Event Android toutes versions
Intel N/A Intel SPS versions antérieures à SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0
Intel N/A Intel Ethernet 700 Series Controller drivers pour les versions VMware antérieures à 2.1.5.0
Intel N/A Intel 700 Series Ethernet contrôleurs et adaptateurs versions antérieures à 8.5
Intel N/A Intel DSA versions antérieures 22.2.14
Intel N/A Intel NUC9 Extreme Laptop kits versions antérieures à 2.2.0.22
Intel N/A Intel Connect M Android versions antérieures à 1.7.4
Intel N/A Intel HAXM versions antérieures à 7.7.1
Intel N/A Intel Distribution pour Python versions antérieures à 2022.0.3
Intel N/A Intel Killer™ Bluetooth versions antérieures à 22.120
Intel N/A Intel NUCs versions antérieures à BC0076
Intel N/A Intel RST versions antérieures à 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003
Intel N/A Intel SEAPI toutes versions
Intel N/A Intel Ethernet 500 Series Controller drivers pour les versions VMware antérieures à 1.11.4.0
Intel N/A Intel Wireless Bluetooth versions antérieures à 22.120
Intel N/A Intel AMT toutes versions
Intel N/A Intel Enpirion Digital Power Configurator GUI toutes versions
Intel N/A Intel Datacenter Group Event Advisory iOS toutes versions
References
Bulletin de sécurité Intel intel-sa-00701.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00703.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00669.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00686.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00679.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00668.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00657.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00660.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00593.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00684.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00653.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00658.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00709.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00621.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00672.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00628.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00596.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00665.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00655.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00712.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00678.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00667.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00705.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00706.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00694.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00650.html du 09 août 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00662.html du 09 août 2022 None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Team Blue toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur : intel-sa-00706 et intel-sa-00657)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Standard Manageability toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Datacenter Group Event Android toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures 22.2.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUCs versions ant\u00e9rieures \u00e0 BC0076",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SEAPI toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel AMT toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Enpirion Digital Power Configurator GUI toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Datacenter Group Event Advisory iOS toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28696"
    },
    {
      "name": "CVE-2022-33209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33209"
    },
    {
      "name": "CVE-2022-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21197"
    },
    {
      "name": "CVE-2022-29507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29507"
    },
    {
      "name": "CVE-2022-28709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28709"
    },
    {
      "name": "CVE-2022-21233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
    },
    {
      "name": "CVE-2022-21139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21139"
    },
    {
      "name": "CVE-2022-27500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27500"
    },
    {
      "name": "CVE-2022-34345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34345"
    },
    {
      "name": "CVE-2022-30944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
    },
    {
      "name": "CVE-2022-30601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
    },
    {
      "name": "CVE-2022-23182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23182"
    },
    {
      "name": "CVE-2021-23179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23179"
    },
    {
      "name": "CVE-2022-21172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21172"
    },
    {
      "name": "CVE-2022-26344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26344"
    },
    {
      "name": "CVE-2022-21160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21160"
    },
    {
      "name": "CVE-2022-34488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34488"
    },
    {
      "name": "CVE-2022-21152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21152"
    },
    {
      "name": "CVE-2021-33126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33126"
    },
    {
      "name": "CVE-2022-26374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26374"
    },
    {
      "name": "CVE-2022-21793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21793"
    },
    {
      "name": "CVE-2021-23168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23168"
    },
    {
      "name": "CVE-2022-27493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27493"
    },
    {
      "name": "CVE-2022-21225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21225"
    },
    {
      "name": "CVE-2021-26950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26950"
    },
    {
      "name": "CVE-2022-26017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26017"
    },
    {
      "name": "CVE-2022-30296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30296"
    },
    {
      "name": "CVE-2022-22730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22730"
    },
    {
      "name": "CVE-2021-33847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33847"
    },
    {
      "name": "CVE-2022-25999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25999"
    },
    {
      "name": "CVE-2022-21812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21812"
    },
    {
      "name": "CVE-2022-26083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26083"
    },
    {
      "name": "CVE-2022-25841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25841"
    },
    {
      "name": "CVE-2021-33060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33060"
    },
    {
      "name": "CVE-2022-21181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21181"
    },
    {
      "name": "CVE-2021-26254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26254"
    },
    {
      "name": "CVE-2022-25899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25899"
    },
    {
      "name": "CVE-2021-44545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44545"
    },
    {
      "name": "CVE-2018-1285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1285"
    },
    {
      "name": "CVE-2022-26373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
    },
    {
      "name": "CVE-2021-44470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44470"
    },
    {
      "name": "CVE-2022-25966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25966"
    },
    {
      "name": "CVE-2022-28858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28858"
    },
    {
      "name": "CVE-2022-21140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21140"
    },
    {
      "name": "CVE-2022-26844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26844"
    },
    {
      "name": "CVE-2022-21212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21212"
    },
    {
      "name": "CVE-2021-33128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33128"
    },
    {
      "name": "CVE-2022-23403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23403"
    },
    {
      "name": "CVE-2022-21229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21229"
    },
    {
      "name": "CVE-2021-26257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26257"
    },
    {
      "name": "CVE-2022-28697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
    },
    {
      "name": "CVE-2021-23188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23188"
    },
    {
      "name": "CVE-2022-21807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21807"
    },
    {
      "name": "CVE-2022-32579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32579"
    },
    {
      "name": "CVE-2022-21148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21148"
    },
    {
      "name": "CVE-2022-26074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26074"
    },
    {
      "name": "CVE-2021-37409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37409"
    },
    {
      "name": "CVE-2021-23223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23223"
    },
    {
      "name": "CVE-2022-21240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21240"
    },
    {
      "name": "CVE-2022-24378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24378"
    }
  ],
  "links": [],
  "reference": "CERTFR-2022-AVI-727",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"
    }
  ]
}

CERTFR-2022-AVI-552

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel SGX DCAP pour Linux versions antérieures à 1.14.100.3
Intel N/A Intel SGX PSW pour Windows versions antérieures à 2.16.100.3
Intel N/A Intel SGX SDK pour Linux versions antérieures à 2.17.100.3
Intel N/A Toutes les processeurs Intel
Intel N/A Intel SGX DCAP pour Windows versions antérieures à 1.14.100.3
Intel N/A Intel SGX SDK pour Windows versions antérieures à 2.16.100.3
Intel N/A Intel SGX PSW pour Linux versions antérieures à 2.17.100.3

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel SGX DCAP pour Linux versions ant\u00e9rieures \u00e0 1.14.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX PSW pour Windows versions ant\u00e9rieures \u00e0 2.16.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX SDK pour Linux versions ant\u00e9rieures \u00e0 2.17.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Toutes les processeurs Intel",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX DCAP pour Windows versions ant\u00e9rieures \u00e0 1.14.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX SDK pour Windows versions ant\u00e9rieures \u00e0 2.16.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX PSW pour Linux versions ant\u00e9rieures \u00e0 2.17.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-21127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
    },
    {
      "name": "CVE-2022-21166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
    },
    {
      "name": "CVE-2022-24436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24436"
    },
    {
      "name": "CVE-2022-21125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
    },
    {
      "name": "CVE-2022-21123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
    },
    {
      "name": "CVE-2022-21180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
    }
  ],
  "links": [],
  "reference": "CERTFR-2022-AVI-552",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-06-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00615 du 14 juin 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00698 du 14 juin 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00698.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00645 du 14 juin 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00645.html"
    }
  ]
}

CERTFR-2022-AVI-222

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Famille de processeurs Intel Xeon W-1300
Intel N/A Processeurs Intel Celeron Séries N
Intel N/A Famille de processeurs Intel Xeon W
Intel N/A Séries de processeurs Intel Pentium Gold (44XX et 65XX)
Intel N/A Séries de processeurs Intel Pentium Gold
Intel N/A Séries de processeurs Intel Atom C3000
Intel N/A Famille de processeurs Intel Xeon D
Intel N/A Séries de chipsets Intel 300
Intel N/A Séries de chipsets Intel C240
Intel N/A Séries de processeurs Intel Celeron J4000/N4000
Intel N/A Processeurs Intel Celeron séries J
Intel N/A Famille de processeurs Intel Celeron
Intel N/A Famille de processeurs Intel Core
Intel N/A Famille de processeurs Intel Xeon Scalable 2nde génération
Intel N/A Famille de processeurs Intel Core 8ème génération
Intel N/A Séries de chipsets Intel 200
Intel N/A Famille de processeurs Intel Core 9ème génération
Intel N/A Famille de processeurs Intel Core 10ème génération
Intel N/A Famille de processeurs Intel Core 12ème génération
Intel N/A Processeurs Intel Atom C3000 Automated Driving series
Intel N/A Séries de processeurs Intel Celeron 4000 (42XX et 43XX)
Intel N/A Séries de processeurs Intel Pentium J5000/N5000
Intel N/A Famille de processeurs Intel Core 6ème génération
Intel N/A Séries de chipsets Intel C230
Intel N/A Séries de chipsets Intel C620
Intel N/A Séries de processeurs Intel Xeon D 2000
Intel N/A Famille de processeurs Intel Core 7ème génération
Intel N/A Séries de processeurs Intel Pentium Gold (54XX)
Intel N/A Séries de processeurs Intel Celeron 3000 (38XX et 39XX)
Intel N/A Séries de processeurs Intel Pentium 4000 (44XX)
Intel N/A Séries de processeurs Intel Atom X E3900
Intel N/A Famille de processeurs Intel Core X
Intel N/A Séries de processeurs Intel X299
Intel N/A Processeurs Intel Core avec technologie Intel Hybrid
Intel N/A Séries A Intel Atom
Intel N/A Processeurs Intel Atom
Intel N/A Séries de processeurs Intel Celeron J3000/N3000
Intel N/A Famille de processeurs Intel Xeon Scalable 3ème génération
Intel N/A Famille de processeurs Intel Core 11ème génération
Intel N/A Famille de processeurs Intel Xeon E-2300
Intel N/A Séries de processeurs Intel Celeron 5000
Intel N/A Séries de chipsets Intel C420
Intel N/A Famille de processeurs Intel Xeon
Intel N/A Famille de processeurs Intel Xeon E 9ème génération
Intel N/A Séries de chipsets Intel 100
Intel N/A Processeurs Intel Pentium séries Silver
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Famille de processeurs Intel Xeon W-1300",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Celeron S\u00e9ries N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon W",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Pentium Gold (44XX et 65XX)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Pentium Gold",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Atom C3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon D",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de chipsets Intel 300",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de chipsets Intel C240",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Celeron J4000/N4000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Celeron s\u00e9ries J",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Celeron",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon Scalable 2nde g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core 8\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de chipsets Intel 200",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core 9\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core 10\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core 12\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Atom C3000 Automated Driving series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Celeron 4000 (42XX et 43XX)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Pentium J5000/N5000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core 6\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de chipsets Intel C230",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de chipsets Intel C620",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Xeon D 2000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core 7\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Pentium Gold (54XX)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Celeron 3000 (38XX et 39XX)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Pentium 4000 (44XX)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Atom X E3900",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core X",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel X299",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Core avec technologie Intel Hybrid",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries A Intel Atom",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Atom",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Celeron J3000/N3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon Scalable 3\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Core 11\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon E-2300",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de processeurs Intel Celeron 5000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de chipsets Intel C420",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Famille de processeurs Intel Xeon E 9\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "S\u00e9ries de chipsets Intel 100",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeurs Intel Pentium s\u00e9ries Silver",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-33150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33150"
    },
    {
      "name": "CVE-2022-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
    },
    {
      "name": "CVE-2022-0001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
    }
  ],
  "links": [],
  "reference": "CERTFR-2022-AVI-222",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-03-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel sa-00609 du 08 mars 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel sa-00598 du 08 mars 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
    }
  ]
}

CERTFR-2022-AVI-127

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Se référer aux avis de l'éditeur pour la liste complète des produits affectés
References
Bulletin de sécurité Intel intel-sa-00589 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00607 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00581 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00527 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00591 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00539 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00532 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00639 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00582 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00588 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00594 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00470 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00561 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00622 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00575 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00632 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00599 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00574 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00571 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00604 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00608 du 08 février 2022 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00600 du 08 février 2022 None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Se r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur pour la liste compl\u00e8te des produits affect\u00e9s",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-21218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21218"
    },
    {
      "name": "CVE-2021-0119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0119"
    },
    {
      "name": "CVE-2022-21133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21133"
    },
    {
      "name": "CVE-2021-0076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
    },
    {
      "name": "CVE-2021-0125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0125"
    },
    {
      "name": "CVE-2021-33096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
    },
    {
      "name": "CVE-2021-33114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
    },
    {
      "name": "CVE-2021-0091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0091"
    },
    {
      "name": "CVE-2022-21205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21205"
    },
    {
      "name": "CVE-2021-33113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
    },
    {
      "name": "CVE-2021-0156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0156"
    },
    {
      "name": "CVE-2021-0161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
    },
    {
      "name": "CVE-2022-21204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21204"
    },
    {
      "name": "CVE-2021-33147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33147"
    },
    {
      "name": "CVE-2021-0107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0107"
    },
    {
      "name": "CVE-2021-0072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
    },
    {
      "name": "CVE-2021-0124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0124"
    },
    {
      "name": "CVE-2021-0169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0169"
    },
    {
      "name": "CVE-2021-33110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
    },
    {
      "name": "CVE-2021-33129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33129"
    },
    {
      "name": "CVE-2021-0168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
    },
    {
      "name": "CVE-2021-0093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0093"
    },
    {
      "name": "CVE-2022-21174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21174"
    },
    {
      "name": "CVE-2021-33137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33137"
    },
    {
      "name": "CVE-2021-33115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
    },
    {
      "name": "CVE-2021-0144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0144"
    },
    {
      "name": "CVE-2022-21226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21226"
    },
    {
      "name": "CVE-2021-0117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0117"
    },
    {
      "name": "CVE-2021-0103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0103"
    },
    {
      "name": "CVE-2021-0116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0116"
    },
    {
      "name": "CVE-2021-0179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0179"
    },
    {
      "name": "CVE-2021-0164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
    },
    {
      "name": "CVE-2021-33061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
    },
    {
      "name": "CVE-2021-0172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
    },
    {
      "name": "CVE-2021-0092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0092"
    },
    {
      "name": "CVE-2021-0115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0115"
    },
    {
      "name": "CVE-2021-0099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0099"
    },
    {
      "name": "CVE-2021-33166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33166"
    },
    {
      "name": "CVE-2021-0066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
    },
    {
      "name": "CVE-2021-44454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44454"
    },
    {
      "name": "CVE-2021-0060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0060"
    },
    {
      "name": "CVE-2021-33119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33119"
    },
    {
      "name": "CVE-2021-0147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0147"
    },
    {
      "name": "CVE-2021-33139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
    },
    {
      "name": "CVE-2021-0127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0127"
    },
    {
      "name": "CVE-2021-33155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
    },
    {
      "name": "CVE-2021-0163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0163"
    },
    {
      "name": "CVE-2021-0170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
    },
    {
      "name": "CVE-2021-33101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33101"
    },
    {
      "name": "CVE-2021-0173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
    },
    {
      "name": "CVE-2021-33107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33107"
    },
    {
      "name": "CVE-2021-0174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
    },
    {
      "name": "CVE-2021-0162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0162"
    },
    {
      "name": "CVE-2022-21157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21157"
    },
    {
      "name": "CVE-2021-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0167"
    },
    {
      "name": "CVE-2021-0183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
    },
    {
      "name": "CVE-2022-21153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21153"
    },
    {
      "name": "CVE-2021-0118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0118"
    },
    {
      "name": "CVE-2021-0178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0178"
    },
    {
      "name": "CVE-2021-0145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0145"
    },
    {
      "name": "CVE-2021-0165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
    },
    {
      "name": "CVE-2021-0166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
    },
    {
      "name": "CVE-2021-0111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0111"
    },
    {
      "name": "CVE-2022-21220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21220"
    },
    {
      "name": "CVE-2021-33068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33068"
    },
    {
      "name": "CVE-2021-0171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0171"
    },
    {
      "name": "CVE-2021-0176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
    },
    {
      "name": "CVE-2022-21156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21156"
    },
    {
      "name": "CVE-2021-33120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33120"
    },
    {
      "name": "CVE-2021-0177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0177"
    },
    {
      "name": "CVE-2022-21203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21203"
    },
    {
      "name": "CVE-2021-0114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0114"
    },
    {
      "name": "CVE-2021-0175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
    },
    {
      "name": "CVE-2021-23152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23152"
    }
  ],
  "links": [],
  "reference": "CERTFR-2022-AVI-127",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-02-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00589 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00607 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00607.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00581 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00527 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00591 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00591.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00539 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00532 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00639 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00639.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00582 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00588 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00588.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00594 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00594.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00470 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00561 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00622 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00622.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00575 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00632 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00599 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00599.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00574 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00574.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00571 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00604 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00608 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00608.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00600 du 08 f\u00e9vrier 2022",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00600.html"
    }
  ]
}

CERTFR-2021-AVI-858

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A 10th Generation Intel® Core™ Processors
Intel N/A 11th Generation Intel® Core™ Processors
Intel N/A 3rd Generation Intel® Xeon® Scalable Processors
Intel N/A 700-series Ethernet Adapters
Intel N/A 7th Generation Intel® Core™ Processors
Intel N/A 810-series Ethernet Adapters
Intel N/A All Intel® oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions antérieures à 2021.1 Beta 10.
Intel N/A Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 août 2021.
Intel N/A Intel® Administrative Tools pour Intel® Network Adapters driver pour Windows versions antérieures à 1.4.0.15.
Intel N/A Intel® Administrative Tools pour Intel® Network Adapters driver installer pour Windows versions antérieures à 1.4.0.21.
Intel N/A Intel® Atom® Processor A Series
Intel N/A Intel® Atom® Processor C3000
Intel N/A Intel® Atom® Processor E3900 Series
Intel N/A Intel® Battery Life Diagnostic Tool versions antérieures à 1.2.
Intel N/A Intel® Celeron® Processor J Series, N Series
Intel N/A Intel® Celeron® Processor N Series
Intel N/A Intel® Core™ i5-8305G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10.
Intel N/A Intel® Core™ i7-8706G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10.
Intel N/A Intel® Core™ X-series Processors
Intel N/A Intel® Distribution of OpenVINO™ Toolkit versions antérieures à 2021.4.
Intel N/A Intel® Dual Band Wireless-AC 3165
Intel N/A Intel® Dual Band Wireless-AC 3168
Intel N/A Intel® Dual Band Wireless-AC 8260
Intel N/A Intel® Dual Band Wireless-AC 8265
Intel N/A Intel® EMA versions antérieures à 1.5.0.
Intel N/A Intel® Ethernet 500 Series Controllers driver pour Linux versions antérieures à 3.17.3.
Intel N/A Intel® Ethernet Diagnostic Driver pour Windows versions antérieures à 1.4.0.10.
Intel N/A Intel® Graphics DCH Drivers pour Windows 10 versions antérieures à 27.20.100.9316.
Intel N/A Intel® Graphics Driver pour Windows® 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions antérieures à 21.10.
Intel N/A Intel® Graphics non DCH Drivers pour Windows 10 versions antérieures à 100.9416.
Intel N/A Intel® Iris® Xe MAX Dedicated Graphics Drivers pour Windows 10 versions antérieures à 27.20.100.9466.
Intel N/A Intel® NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA
Intel N/A Intel® NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W
Intel N/A Intel® NUC 11 Enthusiast Kit - NUC11PHKi7C
Intel N/A Intel® NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA
Intel N/A Intel® NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7
Intel N/A Intel® NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA
Intel N/A Intel® NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7
Intel N/A Intel® NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7
Intel N/A Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNHNC
Intel N/A Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNKTC
Intel N/A Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE
Intel N/A Intel® NUC 7 Essential, a Mini PC avec Windows® 10 - NUC7CJYSAL
Intel N/A Intel® NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC
Intel N/A Intel® NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB
Intel N/A Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA
Intel N/A Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW
Intel N/A Intel® NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA
Intel N/A Intel® NUC 8 Home, a Mini PC avec Windows® 10: NUC8i3CYSM, NUC8i3CYSN
Intel N/A Intel® NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH
Intel N/A Intel® NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH
Intel N/A Intel® NUC 8 Pro Board NUC8i3PNB
Intel N/A Intel® NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK
Intel N/A Intel® NUC 8 Rugged Kit NUC8CCHKR
Intel N/A Intel® NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB
Intel N/A Intel® NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX
Intel N/A Intel® NUC Board NUC7i3DNBE
Intel N/A Intel® NUC Board NUC8CCHB
Intel N/A Intel® NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions antérieures à 1.78.2.0.7.
Intel N/A Intel® NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions antérieures à 1.78.1.1.
Intel N/A Intel® NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions antérieures à 1.78.4.0.4.
Intel N/A Intel® NUC Kit: NUC6CAYH, NUC6CAYS
Intel N/A Intel® NUC Kit: NUC7CJYH, NUC7PJYH
Intel N/A Intel® NUC Kit NUC7i3DNHE, NUC7i3DNKE
Intel N/A Intel® NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK
Intel N/A Intel® NUC Kit: NUC8i7HNK, NUC8i7HVK
Intel N/A Intel® NUC M15 Laptop Kit - LAPBC510.
Intel N/A Intel® NUC M15 Laptop Kit: LAPBC510, LAPBC710
Intel N/A Intel® NUC M15 Laptop Kit - LAPBC710.
Intel N/A Intel® oneAPI Base Toolkit versions antérieures à 2021.4.0.
Intel N/A Intel® oneAPI Rendering Toolkit versions antérieures à 2021.2.
Intel N/A Intel® P4510 series (EDSFF) versions antérieures à VDV10284.
Intel N/A Intel® P4510 series (U.2) versions antérieures à VDV10182.
Intel N/A Intel® P4511 series (EDSFF) versions antérieures à VDV10284.
Intel N/A Intel® P4511 series (M.2) versions antérieures à VDV10384.
Intel N/A Intel® P4610 series (U.2) versions antérieures à VDV10182.
Intel N/A Intel® P4618 series versions antérieures à VDV10182.
Intel N/A Intel® Pentium® Processor J Series, N Series
Intel N/A Intel® Pentium® Processor N Series
Intel N/A Intel® Pentium® Processor Silver Series/ J&N Series​
Intel N/A Intel® Pentium® Processor Silver Series/ J&N Series​ - Refresh
Intel N/A Intel® Pentium® Silver Processor Series
Intel N/A Intel® RealSense™ D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.22.
Intel N/A Intel® Serial IO driver pour Intel® NUC 11 Gen versions antérieures à 30.100.2104.1.
Intel N/A Intel® SSD D3-S4510 Series (SFF, M.2) versions antérieures à XCV10140.
Intel N/A Intel SSD D5-P4320 Series toutes versions.
Intel N/A Intel SSD D5-P4326 Series toutes versions.
Intel N/A Intel SSD D5-P4420 Series toutes versions.
Intel N/A Intel SSD D7-P5500 Series versions antérieures à 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029.
Intel N/A Intel SSD D7-P5600 Series versions antérieures à 1.2.0, 2CV1L029 and 2CV1C030.
Intel N/A Intel SSD D7-P5608 Series versions antérieures à 2CV1R106.
Intel N/A Intel® SSD DC D4512 versions antérieures à ET10.
Intel N/A Intel SSD DC P4500 Series toutes versions.
Intel N/A Intel SSD DC P4501 Series toutes versions.
Intel N/A Intel SSD DC P4600 Series toutes versions.
Intel N/A Intel SSD DC P4608 Series toutes versions.
Intel N/A Intel® Thunderbolt™ 3 and 4 Windows DCH Drivers versions antérieures à 1.41.1054.0
Intel N/A Intel® Thunderbolt™ non-DCH Driver toutes versions pour Windows.
Intel N/A Intel® VTune™ Profiler versions antérieures à 2021.3.0.
Intel N/A Intel® Wi-Fi 6 AX200
Intel N/A Intel® Wi-Fi 6 AX201
Intel N/A Intel® Wi-Fi 6 AX210
Intel N/A Intel® Wi-Fi 6E AX210
Intel N/A Intel® Wireless 7265 (Rev D) Family
Intel N/A Intel® Wireless-AC 9260
Intel N/A Intel® Wireless-AC 9461
Intel N/A Intel® Wireless-AC 9462
Intel N/A Intel® Wireless-AC 9560
Intel N/A Intel® Xeon® Processor E3 v6 Family
Intel N/A Intel® Xeon® Processor E Family
Intel N/A Intel® Xeon® Processor W Family
Intel N/A Killer™ Wi-Fi 6 AX1650
Intel N/A Killer™ Wi-Fi 6E AX1675
Intel N/A Killer™ Wireless-AC 1550
Intel N/A Safestring library maintained by Intel® avant le commit avec l'id efbd4066ea215f03342c1f0e5888102badf14477
References
Bulletin de sécurité Intel intel-sa-00393 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00560 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00481 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00551 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00535 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00565 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00524 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00567 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00528 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00547 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00562 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00584 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00556 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00569 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00557 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00540 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00533 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00555 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00509 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00564 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00538 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00554 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00568 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00566 du 09 novembre 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00482 du 09 novembre 2021 None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "10th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "11th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "3rd Generation Intel\u00ae Xeon\u00ae Scalable Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "700-series Ethernet Adapters",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "7th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "810-series Ethernet Adapters",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "All Intel\u00ae oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions ant\u00e9rieures \u00e0 2021.1 Beta 10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 ao\u00fbt 2021.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.15.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver installer pour Windows versions ant\u00e9rieures \u00e0 1.4.0.21.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor A Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor C3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor E3900 Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 1.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Celeron\u00ae Processor J Series, N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Celeron\u00ae Processor N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 i5-8305G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 i7-8706G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 X-series Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Distribution of OpenVINO\u2122 Toolkit versions ant\u00e9rieures \u00e0 2021.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 3165",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 3168",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 8260",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 8265",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae EMA versions ant\u00e9rieures \u00e0 1.5.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Ethernet 500 Series Controllers driver pour Linux versions ant\u00e9rieures \u00e0 3.17.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Ethernet Diagnostic Driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9316.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics Driver pour Windows\u00ae 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics non DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 100.9416.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Iris\u00ae Xe MAX Dedicated Graphics Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9466.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Enthusiast Kit - NUC11PHKi7C",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNHNC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNKTC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Essential, a Mini PC avec Windows\u00ae 10 - NUC7CJYSAL",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Home, a Mini PC avec Windows\u00ae 10: NUC8i3CYSM, NUC8i3CYSN",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Pro Board NUC8i3PNB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Rugged Kit NUC8CCHKR",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Board NUC7i3DNBE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Board NUC8CCHB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.1.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions ant\u00e9rieures \u00e0 1.78.4.0.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC6CAYH, NUC6CAYS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC7CJYH, NUC7PJYH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit NUC7i3DNHE, NUC7i3DNKE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC8i7HNK, NUC8i7HVK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC510.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit: LAPBC510, LAPBC710",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC710.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2021.4.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae oneAPI Rendering Toolkit versions ant\u00e9rieures \u00e0 2021.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4510 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4510 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4511 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4511 series (M.2) versions ant\u00e9rieures \u00e0 VDV10384.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4610 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4618 series versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor J Series, N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b - Refresh",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Silver Processor Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae RealSense\u2122 D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.22.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Serial IO driver pour Intel\u00ae NUC 11 Gen versions ant\u00e9rieures \u00e0 30.100.2104.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae SSD D3-S4510 Series (SFF, M.2) versions ant\u00e9rieures \u00e0 XCV10140.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4320 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4326 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4420 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5500 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5600 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1L029 and 2CV1C030.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5608 Series versions ant\u00e9rieures \u00e0 2CV1R106.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae SSD DC D4512 versions ant\u00e9rieures \u00e0 ET10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4500 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4501 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4600 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4608 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Thunderbolt\u2122 3 and 4 Windows DCH Drivers versions ant\u00e9rieures \u00e0 1.41.1054.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Thunderbolt\u2122 non-DCH Driver toutes versions pour Windows.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2021.3.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX200",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX201",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6E AX210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless 7265 (Rev D) Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9260",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9461",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9462",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9560",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor E3 v6 Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor E Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor W Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wi-Fi 6 AX1650",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wi-Fi 6E AX1675",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wireless-AC 1550",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Safestring library maintained by Intel\u00ae avant le commit avec l\u0027id efbd4066ea215f03342c1f0e5888102badf14477",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0063"
    },
    {
      "name": "CVE-2020-12981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12981"
    },
    {
      "name": "CVE-2020-12987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12987"
    },
    {
      "name": "CVE-2021-0157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0157"
    },
    {
      "name": "CVE-2020-12899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12899"
    },
    {
      "name": "CVE-2021-33062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33062"
    },
    {
      "name": "CVE-2021-0199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0199"
    },
    {
      "name": "CVE-2021-33089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33089"
    },
    {
      "name": "CVE-2020-12986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12986"
    },
    {
      "name": "CVE-2021-0135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0135"
    },
    {
      "name": "CVE-2021-0065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0065"
    },
    {
      "name": "CVE-2021-0078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0078"
    },
    {
      "name": "CVE-2020-8741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8741"
    },
    {
      "name": "CVE-2021-0053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0053"
    },
    {
      "name": "CVE-2021-33106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33106"
    },
    {
      "name": "CVE-2021-0198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0198"
    },
    {
      "name": "CVE-2021-0096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0096"
    },
    {
      "name": "CVE-2021-0158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0158"
    },
    {
      "name": "CVE-2021-33092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33092"
    },
    {
      "name": "CVE-2020-12983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12983"
    },
    {
      "name": "CVE-2021-0082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0082"
    },
    {
      "name": "CVE-2021-0079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0079"
    },
    {
      "name": "CVE-2021-33094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33094"
    },
    {
      "name": "CVE-2021-33090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33090"
    },
    {
      "name": "CVE-2020-12893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12893"
    },
    {
      "name": "CVE-2020-12982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12982"
    },
    {
      "name": "CVE-2021-0071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0071"
    },
    {
      "name": "CVE-2020-12980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12980"
    },
    {
      "name": "CVE-2021-33095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33095"
    },
    {
      "name": "CVE-2020-12963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12963"
    },
    {
      "name": "CVE-2021-0151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0151"
    },
    {
      "name": "CVE-2020-12902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12902"
    },
    {
      "name": "CVE-2021-33098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
    },
    {
      "name": "CVE-2021-33118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33118"
    },
    {
      "name": "CVE-2021-0148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0148"
    },
    {
      "name": "CVE-2021-0121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0121"
    },
    {
      "name": "CVE-2021-33071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33071"
    },
    {
      "name": "CVE-2021-33105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33105"
    },
    {
      "name": "CVE-2021-33058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33058"
    },
    {
      "name": "CVE-2021-0200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0200"
    },
    {
      "name": "CVE-2021-33097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33097"
    },
    {
      "name": "CVE-2020-12898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12898"
    },
    {
      "name": "CVE-2021-0152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0152"
    },
    {
      "name": "CVE-2021-0069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0069"
    },
    {
      "name": "CVE-2021-0197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0197"
    },
    {
      "name": "CVE-2020-12901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12901"
    },
    {
      "name": "CVE-2021-0013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0013"
    },
    {
      "name": "CVE-2020-12985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12985"
    },
    {
      "name": "CVE-2020-12892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12892"
    },
    {
      "name": "CVE-2021-0075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0075"
    },
    {
      "name": "CVE-2021-0120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0120"
    },
    {
      "name": "CVE-2021-0146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0146"
    },
    {
      "name": "CVE-2020-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12900"
    },
    {
      "name": "CVE-2021-33087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33087"
    },
    {
      "name": "CVE-2021-33086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33086"
    },
    {
      "name": "CVE-2020-12904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12904"
    },
    {
      "name": "CVE-2021-33091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33091"
    },
    {
      "name": "CVE-2021-33059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33059"
    },
    {
      "name": "CVE-2021-33088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33088"
    },
    {
      "name": "CVE-2021-0064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0064"
    },
    {
      "name": "CVE-2020-12897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12897"
    },
    {
      "name": "CVE-2020-12894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12894"
    },
    {
      "name": "CVE-2020-12905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12905"
    },
    {
      "name": "CVE-2021-33063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33063"
    },
    {
      "name": "CVE-2020-12903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12903"
    },
    {
      "name": "CVE-2021-33073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33073"
    },
    {
      "name": "CVE-2021-33093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33093"
    },
    {
      "name": "CVE-2021-0110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0110"
    },
    {
      "name": "CVE-2020-12964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12964"
    },
    {
      "name": "CVE-2020-12895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12895"
    }
  ],
  "links": [],
  "reference": "CERTFR-2021-AVI-858",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-11-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00393 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00393.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00560 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00481 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00551 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00551.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00535 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00535.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00565 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00565.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00524 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00567 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00528 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00547 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00562 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00584 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00584.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00556 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00569 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00569.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00557 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00540 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00540.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00533 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00555 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00509 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00564 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00564.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00538 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00538.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00554 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00568 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00568.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00566 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00482 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html"
    }
  ]
}

CERTFR-2021-AVI-778

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Intel HAXM. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel HAXM versions antérieures à 7.6.6
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.6.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0180"
    },
    {
      "name": "CVE-2021-0182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0182"
    }
  ],
  "links": [],
  "reference": "CERTFR-2021-AVI-778",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-10-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Intel HAXM. Elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel HAXM",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00544 du 12 octobre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00544.html"
    }
  ]
}

CERTFR-2021-AVI-616

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A les processeurs Xeon (se référer à intel-sa-00512 pour les versions affectées)
Intel N/A les adaptateurs et contrôleurs Ethernet Intel séries 800 versions antérieures à 1.5.1.0, 1.5.3.0 et 1.5.4.0
Intel N/A les pilotes graphiques pour Windows (se référer à intel-sa-00508 pour les versions affectées)
Intel N/A Intel NUC (se référer à intel-sa-00543 et intel-sa-00553 pour les versions affectées)
Intel N/A les contrôleurs Ethernet Intel séries 800 avec des pilotes Linux versions antérieures à 1.4.11
Intel N/A les contrôleurs Ethernet Intel séries X722 et 800 avec des pilotes Linux RMDA versions antérieures à 1.3.19

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "les processeurs Xeon (se r\u00e9f\u00e9rer \u00e0 intel-sa-00512 pour les versions affect\u00e9es)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les adaptateurs et contr\u00f4leurs Ethernet Intel s\u00e9ries 800 versions ant\u00e9rieures \u00e0 1.5.1.0, 1.5.3.0 et 1.5.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les pilotes graphiques pour Windows (se r\u00e9f\u00e9rer \u00e0 intel-sa-00508 pour les versions affect\u00e9es)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC (se r\u00e9f\u00e9rer \u00e0 intel-sa-00543 et intel-sa-00553 pour les versions affect\u00e9es)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les contr\u00f4leurs Ethernet Intel s\u00e9ries 800 avec des pilotes Linux versions ant\u00e9rieures \u00e0 1.4.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les contr\u00f4leurs Ethernet Intel s\u00e9ries X722 et 800 avec des pilotes Linux RMDA versions ant\u00e9rieures \u00e0 1.3.19",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0005"
    },
    {
      "name": "CVE-2021-0012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0012"
    },
    {
      "name": "CVE-2021-0062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0062"
    },
    {
      "name": "CVE-2021-0007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0007"
    },
    {
      "name": "CVE-2021-0004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0004"
    },
    {
      "name": "CVE-2021-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0002"
    },
    {
      "name": "CVE-2021-0003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0003"
    },
    {
      "name": "CVE-2021-0009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0009"
    },
    {
      "name": "CVE-2021-0083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0083"
    },
    {
      "name": "CVE-2021-0008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0008"
    },
    {
      "name": "CVE-2021-0006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0006"
    },
    {
      "name": "CVE-2021-0061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0061"
    },
    {
      "name": "CVE-2021-0196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0196"
    },
    {
      "name": "CVE-2021-0084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0084"
    },
    {
      "name": "CVE-2021-0160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0160"
    }
  ],
  "links": [],
  "reference": "CERTFR-2021-AVI-616",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-08-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00543 du 10 ao\u00fbt 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00543.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00515 du 10 ao\u00fbt 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00515.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00512 du 10 ao\u00fbt 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00508 du 10 ao\u00fbt 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00553 du 10 ao\u00fbt 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00479 du 10 ao\u00fbt 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00479.html"
    }
  ]
}

CERTFR-2021-AVI-530

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans les produits Intel. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel Xeon Processor E5 v4 Family
Intel N/A 2nd Generation Intel Xeon Scalable Processors
Intel N/A Intel Xeon Scalable Processors
Intel N/A Intel Core X-series Processors
Intel N/A Intel Xeon Processor E5 v3 Family
Intel N/A Intel Xeon Processor D Family
Intel N/A Intel Xeon Processor W Family
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Xeon Processor E5 v4 Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "2nd Generation Intel Xeon Scalable Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Xeon Scalable Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Core X-series Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Xeon Processor E5 v3 Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Xeon Processor D Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Xeon Processor W Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0144"
    }
  ],
  "links": [],
  "reference": "CERTFR-2021-AVI-530",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-07-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Intel. Elle permet\n\u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00525 du 13 juillet 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00525.html"
    }
  ]
}

CERTFR-2021-AVI-446

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel RealSense ID F450 et F455 sans le dernier correctif de sécurité
Intel N/A Intel Optane DC Persistent Memory for Windows versions antérieures à 2.00.00.3842 et 1.00.00.3515
Intel N/A Intel VTune Profiler versions antérieures à 2021.1.1
Intel N/A Intel SGX (se référer au bulletin de sécurité intel-sa-00477 de l'éditeur, cf. section Documentation)
Intel N/A les produits Intel Wireless Bluetooth et Killer Bluetooth (se référer au bulletin de sécurité intel-sa-00520 de l'éditeur, cf. section Documentation)
Intel N/A Intel SSD Data Center Tool versions téléchargées avant le 31 décembre 2020, Intel recommande de remplacer cet outil par Intel Memory and Storage Tool (MAS) for SSD
Intel N/A Intel NUC M15 Laptop Kit Driver Pack versions antérieures à 1.1
Intel N/A Intel Rapid Storage Technology versions antérieures à 17.9.1.1009.5, 18.0.3.1148.4 et 18.1.0.1028.2
Intel N/A les processeurs Intel (se référer aux bulletins de sécurité intel-sa-00442, intel-sa-00463, intel-sa-00521, intel-sa-00459, intel-sa-00464, intel-sa-00465, intel-sa-00500 et intel-sa-00516 de l'éditeur, cf. section Documentation)
Intel N/A les versions du noyau Linux antérieures à 5.13 qui supportent BlueZ
Intel N/A Intel Processor Diagnostic Tool versions antérieures à 4.1.5.37
Intel N/A les pilotes WiFi Intel ProSet/Wireless versions antérieures à 22.0
Intel N/A Intel Computing Improvement Program versions antérieures à 2.4.6522
Intel N/A Intel DSA versions antérieures à 20.11.50.9
Intel N/A les pilotes Intel NUC 9 Extreme Laptop Kit LAN versions antérieures à 10.45
Intel N/A Intel Server Board M10JNP2SB sans la mise à jour comprenant EFI BIOS 7215 et BMC 8100.01.08
Intel N/A Intel Unite Client pour Windows versions antérieures à 4.2.25031
Intel N/A Intel Thunderbolt (se référer au bulletin de sécurité intel-sa-00401 de l'éditeur, cf. section Documentation)
Intel N/A Intel Brand Verification Tool versions antérieures à 11.0.0.1225
Intel N/A Intel Server System gammes R1000WF et R2000WF, Server Board gamme S2600WF, Server Board gamme S2600ST, Compute Module gamme HNS2600BP et Server Board gamme S2600BP versions antérieures à 2.48.ce3e3bd2
Intel N/A Intel NUC (se référer au bulletin de sécurité intel-sa-00511 de l'éditeur, cf. section Documentation)
Intel N/A les pilotes FPGA OPAE pour Linux (se référer au bulletin de sécurité intel-sa-00440 de l'éditeur, cf. section Documentation)
Intel N/A Intel IPP versions antérieures à 2020 update 1
References
Bulletin de sécurité Intel intel-sa-00516 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00463 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00510 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00506 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00505 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00545 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00520 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00442 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00477 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00476 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00472 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00530 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00458 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00521 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00401 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00440 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00507 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00459 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00541 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00474 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00500 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00518 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00546 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00517 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00511 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00537 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00465 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00460 du 08 juin 2021 None vendor-advisory
Bulletin de sécurité Intel intel-sa-00464 du 08 juin 2021 None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel RealSense ID F450 et F455 sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optane DC Persistent Memory for Windows versions ant\u00e9rieures \u00e0 2.00.00.3842 et 1.00.00.3515",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2021.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00477 de l\u0027\u00e9diteur, cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les produits Intel Wireless Bluetooth et Killer Bluetooth (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00520 de l\u0027\u00e9diteur, cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD Data Center Tool versions t\u00e9l\u00e9charg\u00e9es avant le 31 d\u00e9cembre 2020, Intel recommande de remplacer cet outil par Intel Memory and Storage Tool (MAS) for SSD",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC M15 Laptop Kit Driver Pack versions ant\u00e9rieures \u00e0 1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Rapid Storage Technology versions ant\u00e9rieures \u00e0 17.9.1.1009.5, 18.0.3.1148.4 et 18.1.0.1028.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les processeurs Intel (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 intel-sa-00442, intel-sa-00463, intel-sa-00521, intel-sa-00459, intel-sa-00464, intel-sa-00465, intel-sa-00500 et intel-sa-00516 de l\u0027\u00e9diteur, cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les versions du noyau Linux ant\u00e9rieures \u00e0 5.13 qui supportent BlueZ",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Processor Diagnostic Tool versions ant\u00e9rieures \u00e0 4.1.5.37",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les pilotes WiFi Intel ProSet/Wireless versions ant\u00e9rieures \u00e0 22.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.6522",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 20.11.50.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les pilotes Intel NUC 9 Extreme Laptop Kit LAN versions ant\u00e9rieures \u00e0 10.45",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board M10JNP2SB sans la mise \u00e0 jour comprenant EFI BIOS 7215 et BMC 8100.01.08",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Unite Client pour Windows versions ant\u00e9rieures \u00e0 4.2.25031",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Thunderbolt (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00401 de l\u0027\u00e9diteur, cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Brand Verification Tool versions ant\u00e9rieures \u00e0 11.0.0.1225",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server System gammes R1000WF et R2000WF, Server Board gamme S2600WF, Server Board gamme S2600ST, Compute Module gamme HNS2600BP et Server Board gamme S2600BP versions ant\u00e9rieures \u00e0 2.48.ce3e3bd2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00511 de l\u0027\u00e9diteur, cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les pilotes FPGA OPAE pour Linux (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00440 de l\u0027\u00e9diteur, cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel IPP versions ant\u00e9rieures \u00e0 2020 update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0090"
    },
    {
      "name": "CVE-2020-24516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24516"
    },
    {
      "name": "CVE-2020-12288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12288"
    },
    {
      "name": "CVE-2020-8700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8700"
    },
    {
      "name": "CVE-2020-24474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24474"
    },
    {
      "name": "CVE-2021-0134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0134"
    },
    {
      "name": "CVE-2021-0094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0094"
    },
    {
      "name": "CVE-2021-0086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0086"
    },
    {
      "name": "CVE-2020-12289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12289"
    },
    {
      "name": "CVE-2020-12293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12293"
    },
    {
      "name": "CVE-2021-0089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0089"
    },
    {
      "name": "CVE-2021-0051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0051"
    },
    {
      "name": "CVE-2020-12292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12292"
    },
    {
      "name": "CVE-2021-0098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0098"
    },
    {
      "name": "CVE-2021-0095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0095"
    },
    {
      "name": "CVE-2021-0052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0052"
    },
    {
      "name": "CVE-2020-12291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12291"
    },
    {
      "name": "CVE-2020-12360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
    },
    {
      "name": "CVE-2021-0073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0073"
    },
    {
      "name": "CVE-2021-0056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0056"
    },
    {
      "name": "CVE-2021-0132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0132"
    },
    {
      "name": "CVE-2021-0001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0001"
    },
    {
      "name": "CVE-2020-8703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
    },
    {
      "name": "CVE-2021-0100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0100"
    },
    {
      "name": "CVE-2020-12357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
    },
    {
      "name": "CVE-2021-0129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
    },
    {
      "name": "CVE-2020-24475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24475"
    },
    {
      "name": "CVE-2020-8702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8702"
    },
    {
      "name": "CVE-2021-0058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0058"
    },
    {
      "name": "CVE-2021-0097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0097"
    },
    {
      "name": "CVE-2020-24513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
    },
    {
      "name": "CVE-2020-24514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24514"
    },
    {
      "name": "CVE-2021-0104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0104"
    },
    {
      "name": "CVE-2021-0108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0108"
    },
    {
      "name": "CVE-2020-24473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24473"
    },
    {
      "name": "CVE-2020-24507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
    },
    {
      "name": "CVE-2021-0070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0070"
    },
    {
      "name": "CVE-2020-12358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
    },
    {
      "name": "CVE-2020-24509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24509"
    },
    {
      "name": "CVE-2020-26558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
    },
    {
      "name": "CVE-2021-0106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0106"
    },
    {
      "name": "CVE-2020-12290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12290"
    },
    {
      "name": "CVE-2021-0057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0057"
    },
    {
      "name": "CVE-2020-24485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24485"
    },
    {
      "name": "CVE-2021-0113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0113"
    },
    {
      "name": "CVE-2020-8670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
    },
    {
      "name": "CVE-2020-24515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24515"
    },
    {
      "name": "CVE-2020-8704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
    },
    {
      "name": "CVE-2020-12296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12296"
    },
    {
      "name": "CVE-2021-0102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0102"
    },
    {
      "name": "CVE-2020-12294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12294"
    },
    {
      "name": "CVE-2020-12295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12295"
    },
    {
      "name": "CVE-2021-0101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0101"
    },
    {
      "name": "CVE-2020-12359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12359"
    },
    {
      "name": "CVE-2021-0077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0077"
    },
    {
      "name": "CVE-2021-0105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0105"
    },
    {
      "name": "CVE-2020-24486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
    },
    {
      "name": "CVE-2021-0131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0131"
    },
    {
      "name": "CVE-2021-0067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0067"
    },
    {
      "name": "CVE-2020-24506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
    },
    {
      "name": "CVE-2020-24512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
    },
    {
      "name": "CVE-2021-0074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0074"
    },
    {
      "name": "CVE-2020-26555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
    },
    {
      "name": "CVE-2021-24489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-24489"
    },
    {
      "name": "CVE-2020-24511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
    },
    {
      "name": "CVE-2021-0055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0055"
    },
    {
      "name": "CVE-2021-0133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0133"
    },
    {
      "name": "CVE-2021-0112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0112"
    },
    {
      "name": "CVE-2021-0054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0054"
    }
  ],
  "links": [],
  "reference": "CERTFR-2021-AVI-446",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-06-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00516 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00463 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00510 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00510.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00506 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00506.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00505 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00545 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00545.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00520 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00442 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00477 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00476 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00472 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00472.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00530 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00530.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00458 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00458.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00521 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00401 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00401.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00440 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00440.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00507 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00507.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00459 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00541 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00541.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00474 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00474.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00500 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00500.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00518 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00518.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00546 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00546.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00517 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00511 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00537 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00537.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00465 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00460 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00460.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00464 du 08 juin 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
    }
  ]
}

CERTFR-2021-AVI-375

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Wifi Intel. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A les processeurs Intel (se référer au bulletin de l'éditeur pour la liste des processeurs vulnérables)
Intel N/A Intel PROSet/Wireless WiFi versions antérieures à 22.30
Intel N/A les pilotes Wifi pour UEFI versions antérieures à 1.2.3-2121
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "les processeurs Intel (se r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur pour la liste des processeurs vuln\u00e9rables)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieures \u00e0 22.30",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les pilotes Wifi pour UEFI versions ant\u00e9rieures \u00e0 1.2.3-2121",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-24587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
    },
    {
      "name": "CVE-2020-24588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
    },
    {
      "name": "CVE-2020-24586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
    }
  ],
  "links": [],
  "reference": "CERTFR-2021-AVI-375",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-05-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Wifi\nIntel. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Wifi Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00473 du 11 mai 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
    }
  ]
}