Search criteria
70 vulnerabilities found for N/A by Intel
CERTFR-2025-AVI-0684
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | les processeurs Intel | Processeur Intel Core de 8e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core de 13e génération sans les derniers correctifs de sécurité | ||
| Intel | N/A | AI Playground versions antérieures à v2.3.0 alpha | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel 700 sans les derniers correctifs de sécurité | ||
| Intel | N/A | QuickAssist Technology versions antérieures à 2.5.0 | ||
| Intel | les processeurs Intel | Processeur Intel Xeon W série 2200 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Silver de 5e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel 500 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core i9 14900 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Clock Jitter Tool versions antérieures à 6.0.1 | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Silver de 4e génération sans les derniers correctifs de sécurité | ||
| Intel | N/A | AI pour Enterprise Retrieval-augmented Generation versions antérieures à 1.1.0 | ||
| Intel | les processeurs Intel | Processeur Intel Xeon W série 2100 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core de 11e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel 600 sans les derniers correctifs de sécurité | ||
| Intel | N/A | DSA versions antérieures à 25.2.15.9 | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel C250 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Gold de 4e génération sans les derniers correctifs de sécurité | ||
| Intel | N/A | Pilotes Linux pour Intel 700 Series Ethernet versions antérieures à 2.28.5 | ||
| Intel | N/A | Module Trust Domain Extensions (TDX) pour les processeurs Xeon de 4e et 5e génération et pour les processeurs Xeon avec E-cores versions antérieures à 1.5.13 | ||
| Intel | N/A | Firmware package et LED mode toggle tool pour Intel PCIe Switch toutes versions | ||
| Intel | les processeurs Intel | Jeux de puces Intel 790 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Intel Pentium Gold (G54XXU) sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Xeon E sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeurs Intel Core (Série 1) sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Scalable de 3e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces Intel X299 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel C240 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon W série 10000/1200 sans les derniers correctifs de sécurité | ||
| Intel | N/A | UEFI pour Intel Xeon 6 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Processeurs Intel Xeon sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Celeron sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel C230 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Intel RealSense Dynamic Calibrator versions antérieures à 2.14.2.0 | ||
| Intel | les processeurs Intel | Processeur Intel Core de 10e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Scalable de 4e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Intel Celeron J4000/N4000 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Intel Pentium J4000/N4000 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Out of band management service module (OOB-MSM) pour les processeurs Xeon 6 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Intel Distribution pour Python versions antérieures à 2025.1.0 | ||
| Intel | les processeurs Intel | Processeurs Intel Xeon W2400 et W3400 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core de 13e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Celeron série 4000 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Intel Atom X E3900 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon W séries 2400 et 3400 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Gold de 5e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel C620 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur de la série Intel Xeon CPU Max (mémoire à haute bande passante HBM) sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Bronze de 4e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core série U sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeurs Intel Pentium et Celeron séries N et J sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core de 9e génération sans les derniers correctifs de sécurité | ||
| Intel | N/A | Intel oneAPI Toolkits sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Pentium Gold sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core i9 13900 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Pilotes Linux pour Intel I350 Series Ethernet versions antérieures à 5.19.2 | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Platinum de 4e génération sans les derniers correctifs de sécurité | ||
| Intel | N/A | LMS versions antérieures à 2514.7.16.0 | ||
| Intel | les processeurs Intel | Processeur Intel Core série X sans les derniers correctifs de sécurité | ||
| Intel | N/A | PROSet/Wireless Wi-Fi versions antérieures à 23.110.0.5 | ||
| Intel | les processeurs Intel | Processeur Intel Xeon E sans les derniers correctifs de sécurité | ||
| Intel | N/A | Edge Orchestrator pour Intel Tiber Edge Platform pour AWS versions antérieures à 24.11.1 | ||
| Intel | les processeurs Intel | Intel Core 9 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Pilotes Linux pour Intel 800 Series Ethernet versions antérieures à 1.17.2 | ||
| Intel | les processeurs Intel | Processeur Intel Core i7 14700 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Bibliothèque TinyCBOR versions antérieures à 0.6.1 | ||
| Intel | les processeurs Intel | Processeurs Intel Core Ultra (Série 1) sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Platinum de 5e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Intel Atom P5000 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Intel Driver & Support Assistant versions antérieures à 24.6.49.8 | ||
| Intel | les processeurs Intel | Processeur Celeron série 6000 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Pilotes Graphics pour processeurs Intel Core de générations 7 à 10 et Intel Atom Pentium et Céléron versions antérieures à 31.0.101.2135 | ||
| Intel | N/A | Pilotes Graphics pour Arc et Iris Xe versions antérieures à 32.0.101.6737 | ||
| Intel | les processeurs Intel | Processeurs Intel Core (Série 2) sans les derniers correctifs de sécurité | ||
| Intel | N/A | Micrologiciel pour Intel E810 Ethernet NVM versions antérieures à 4.6 | ||
| Intel | les processeurs Intel | Série Intel Atom x6000E sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Celeron série G sans les derniers correctifs de sécurité | ||
| Intel | N/A | Pilotes Graphics pour Data Center GPU Flex versions antérieures à 32.0.101.6733 | ||
| Intel | N/A | Trace Analyzer and Collector toutes versions | ||
| Intel | les processeurs Intel | Série de processeurs Intel Pentium Gold sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel C620A sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon W série 1300 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon de 5e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core i9 13900E sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core i7 14701E sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon de 5e générationJeu de puces Intel C420 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core de 12e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeurs Intel Core i9 de 13e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Celeron série G sans les derniers correctifs de sécurité | ||
| Intel | N/A | Edger8r pour Intel Software Guard Extensions SDK (Intel SGX SDK) toutes versions | ||
| Intel | les processeurs Intel | Série de processeurs Intel Celeron J3000/N3000 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel C740 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Module Trust Domain Extensions (TDX) pour les processeurs Xeon 6 versions antérieures à 2.0.8 | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel 100 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Scalable de 5e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeurs Intel Xeon Scalable de 4e génération avec Intel vRAN sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel 300 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel 200 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core de 7e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core de 14e génération sans les derniers correctifs de sécurité | ||
| Intel | N/A | Device Plugins for Kubernetes versions antérieures à 0.32.0 | ||
| Intel | N/A | Connectivity Performance Suite versions antérieures à 40.24.11210 | ||
| Intel | les processeurs Intel | Jeux de puces Intel C420 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core i9 14901E sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core i9 14900HX sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Core de 6e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Jeux de puces de la série Intel 400 sans les derniers correctifs de sécurité | ||
| Intel | N/A | Trust Domain Extensions (TDX) versions antérieures à 1.5.07.00.774 | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Bronze de 5e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Intel Pentium J5000/N5000 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel série N sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Famille de processeurs Intel Core de 12e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Pentium Silver sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Celeron série N sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeurs Intel Core Ultra (Série 2) sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Processeur Intel Xeon Edge Enhanced de 4e génération sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de jeux de puces Intel C240 sans les derniers correctifs de sécurité | ||
| Intel | les processeurs Intel | Série de processeurs Pentium Gold sans les derniers correctifs de sécurité | ||
| Intel | N/A | Rapid Storage Technology versions antérieures à 20.2.1.1016 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeur Intel Core de 8e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 13e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "AI Playground versions ant\u00e9rieures \u00e0 v2.3.0 alpha",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel 700 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "QuickAssist Technology versions ant\u00e9rieures \u00e0 2.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon W s\u00e9rie 2200 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Silver de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel 500 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core i9 14900 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Clock Jitter Tool versions ant\u00e9rieures \u00e0 6.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Silver de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "AI pour Enterprise Retrieval-augmented Generation versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon W s\u00e9rie 2100 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 11e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel 600 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "DSA versions ant\u00e9rieures \u00e0 25.2.15.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel C250 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Gold de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Linux pour Intel 700 Series Ethernet versions ant\u00e9rieures \u00e0 2.28.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Module Trust Domain Extensions (TDX) pour les processeurs Xeon de 4e et 5e g\u00e9n\u00e9ration et pour les processeurs Xeon avec E-cores versions ant\u00e9rieures \u00e0 1.5.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Firmware package et LED mode toggle tool pour Intel PCIe Switch toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces Intel 790 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Pentium Gold (G54XXU) sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon E sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Core (S\u00e9rie 1) sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Scalable de 3e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces Intel X299 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel C240 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon W s\u00e9rie 10000/1200 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "UEFI pour Intel Xeon 6 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Celeron sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel C230 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RealSense Dynamic Calibrator versions ant\u00e9rieures \u00e0 2.14.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 10e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Scalable de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Celeron J4000/N4000 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Pentium J4000/N4000 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Out of band management service module (OOB-MSM) pour les processeurs Xeon 6 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2025.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon W2400 et W3400 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core de 13e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron s\u00e9rie 4000 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Atom X E3900 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon W s\u00e9ries 2400 et 3400 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Gold de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel C620 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur de la s\u00e9rie Intel Xeon CPU Max (m\u00e9moire \u00e0 haute bande passante HBM) sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Bronze de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core s\u00e9rie U sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Pentium et Celeron s\u00e9ries N et J sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 9e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Toolkits sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Pentium Gold sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core i9 13900 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Linux pour Intel I350 Series Ethernet versions ant\u00e9rieures \u00e0 5.19.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Platinum de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "LMS versions ant\u00e9rieures \u00e0 2514.7.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core s\u00e9rie X sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "PROSet/Wireless Wi-Fi versions ant\u00e9rieures \u00e0 23.110.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon E sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Edge Orchestrator pour Intel Tiber Edge Platform pour AWS versions ant\u00e9rieures \u00e0 24.11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Core 9 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Linux pour Intel 800 Series Ethernet versions ant\u00e9rieures \u00e0 1.17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core i7 14700 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Biblioth\u00e8que TinyCBOR versions ant\u00e9rieures \u00e0 0.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Core Ultra (S\u00e9rie 1) sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Platinum de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Atom P5000 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Driver \u0026 Support Assistant versions ant\u00e9rieures \u00e0 24.6.49.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Celeron s\u00e9rie 6000 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Graphics pour processeurs Intel Core de g\u00e9n\u00e9rations 7 \u00e0 10 et Intel Atom Pentium et C\u00e9l\u00e9ron versions ant\u00e9rieures \u00e0 31.0.101.2135",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Graphics pour Arc et Iris Xe versions ant\u00e9rieures \u00e0 32.0.101.6737",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Core (S\u00e9rie 2) sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel pour Intel E810 Ethernet NVM versions ant\u00e9rieures \u00e0 4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie Intel Atom x6000E sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Celeron s\u00e9rie G sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Graphics pour Data Center GPU Flex versions ant\u00e9rieures \u00e0 32.0.101.6733",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Trace Analyzer and Collector toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Pentium Gold sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel C620A sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon W s\u00e9rie 1300 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core i9 13900E sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core i7 14701E sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon de 5e g\u00e9n\u00e9rationJeu de puces Intel C420 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 12e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Core i9 de 13e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron s\u00e9rie G sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Edger8r pour Intel Software Guard Extensions SDK (Intel SGX SDK) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Celeron J3000/N3000 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel C740 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Module Trust Domain Extensions (TDX) pour les processeurs Xeon 6 versions ant\u00e9rieures \u00e0 2.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel 100 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Scalable de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon Scalable de 4e g\u00e9n\u00e9ration avec Intel vRAN sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel 300 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel 200 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 7e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core de 14e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Device Plugins for Kubernetes versions ant\u00e9rieures \u00e0 0.32.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Connectivity Performance Suite versions ant\u00e9rieures \u00e0 40.24.11210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces Intel C420 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core i9 14901E sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core i9 14900HX sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 6e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Jeux de puces de la s\u00e9rie Intel 400 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Trust Domain Extensions (TDX) versions ant\u00e9rieures \u00e0 1.5.07.00.774",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Bronze de 5e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Intel Pentium J5000/N5000 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel s\u00e9rie N sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core de 12e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Pentium Silver sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Celeron s\u00e9rie N sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Core Ultra (S\u00e9rie 2) sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon Edge Enhanced de 4e g\u00e9n\u00e9ration sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de jeux de puces Intel C240 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9rie de processeurs Pentium Gold sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "les processeurs Intel",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Rapid Storage Technology versions ant\u00e9rieures \u00e0 20.2.1.1016",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20627",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20627"
},
{
"name": "CVE-2025-24523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24523"
},
{
"name": "CVE-2025-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24515"
},
{
"name": "CVE-2025-20109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20109"
},
{
"name": "CVE-2025-20099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20099"
},
{
"name": "CVE-2025-25273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25273"
},
{
"name": "CVE-2025-24840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24840"
},
{
"name": "CVE-2024-33607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33607"
},
{
"name": "CVE-2025-26472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26472"
},
{
"name": "CVE-2025-20037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20037"
},
{
"name": "CVE-2025-26403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26403"
},
{
"name": "CVE-2025-26404",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26404"
},
{
"name": "CVE-2025-22392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22392"
},
{
"name": "CVE-2025-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20093"
},
{
"name": "CVE-2025-24923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24923"
},
{
"name": "CVE-2025-21090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21090"
},
{
"name": "CVE-2025-24835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24835"
},
{
"name": "CVE-2025-24302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24302"
},
{
"name": "CVE-2025-20613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20613"
},
{
"name": "CVE-2025-22839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22839"
},
{
"name": "CVE-2025-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24511"
},
{
"name": "CVE-2025-20092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20092"
},
{
"name": "CVE-2025-24303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24303"
},
{
"name": "CVE-2025-21093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21093"
},
{
"name": "CVE-2025-22853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22853"
},
{
"name": "CVE-2025-22889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22889"
},
{
"name": "CVE-2025-26470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26470"
},
{
"name": "CVE-2025-20067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20067"
},
{
"name": "CVE-2025-22840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22840"
},
{
"name": "CVE-2025-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32004"
},
{
"name": "CVE-2025-24484",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24484"
},
{
"name": "CVE-2025-20017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20017"
},
{
"name": "CVE-2025-24323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24323"
},
{
"name": "CVE-2025-27250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27250"
},
{
"name": "CVE-2025-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27537"
},
{
"name": "CVE-2025-20090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20090"
},
{
"name": "CVE-2025-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21096"
},
{
"name": "CVE-2025-20053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20053"
},
{
"name": "CVE-2025-27717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27717"
},
{
"name": "CVE-2025-27576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27576"
},
{
"name": "CVE-2025-20077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20077"
},
{
"name": "CVE-2025-32086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32086"
},
{
"name": "CVE-2025-27559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27559"
},
{
"name": "CVE-2025-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24921"
},
{
"name": "CVE-2025-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26697"
},
{
"name": "CVE-2025-22838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22838"
},
{
"name": "CVE-2025-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26863"
},
{
"name": "CVE-2025-24520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24520"
},
{
"name": "CVE-2025-20025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20025"
},
{
"name": "CVE-2025-20048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20048"
},
{
"name": "CVE-2025-22836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22836"
},
{
"name": "CVE-2025-20074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20074"
},
{
"name": "CVE-2025-27707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27707"
},
{
"name": "CVE-2025-24313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24313"
},
{
"name": "CVE-2025-22893",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22893"
},
{
"name": "CVE-2025-20044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20044"
},
{
"name": "CVE-2025-23241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23241"
},
{
"name": "CVE-2025-24325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24325"
},
{
"name": "CVE-2025-21086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21086"
},
{
"name": "CVE-2025-20087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20087"
},
{
"name": "CVE-2025-20625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20625"
},
{
"name": "CVE-2025-24324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24324"
},
{
"name": "CVE-2025-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24486"
},
{
"name": "CVE-2025-20023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20023"
},
{
"name": "CVE-2025-24296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24296"
},
{
"name": "CVE-2025-24305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24305"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0684",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01316",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01316.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01296",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01347",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01347.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01335",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01329",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01329.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01280",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01257",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01257.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01342",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01342.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01313",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01192",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01192.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01300",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01300.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01245",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01245.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01310",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01383",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01383.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01318",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01318.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01308",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01321",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01321.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01339",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01339.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01317",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01311",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01292",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01292.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01285",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01367",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01345",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01345.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01266",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01266.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01286",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01286.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01301",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01301.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01338",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01338.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01299",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01352",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01352.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01249",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01298",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01298.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01312",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01326",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html"
}
]
}
CERTFR-2025-AVI-0497
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les processeurs Intel. Elle permet à un attaquant de provoquer un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "les processeurs Intel sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-2884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2884"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0497",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les processeurs Intel. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service.",
"title": "Vuln\u00e9rabilit\u00e9 dans les processeurs Intel",
"vendor_advisories": [
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01209",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html"
}
]
}
CERTFR-2025-AVI-0402
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel RealSense SDK software versions antérieures à 2.56.2. | ||
| Intel | N/A | Intel Advisor standalone component software software versions antérieures à 2024.2. | ||
| Intel | N/A | Intel Server Board D50DNP et M50FCP UEFI versions antérieures à R01.02.0003. | ||
| Intel | N/A | Intel Ethernet Connections Boot Utility versions antérieures à 29.4. | ||
| Intel | N/A | 9th Gen Intel Core processor family | ||
| Intel | N/A | OpenVINO model server software maintained by Intel versions antérieures à 2024.4. | ||
| Intel | N/A | Intel oneAPI Level Zero software versions antérieures à 1.5.4. | ||
| Intel | N/A | NVM Update Utility for Intel Ethernet Network Adapter E810 Series versions antérieures à 4.6. | ||
| Intel | N/A | Intel Arc Pro graphics versions antérieures à 32.0.101.6303. | ||
| Intel | N/A | Intel Graphics Driver software versions antérieures à 32.0.101.6083_101.5736. | ||
| Intel | N/A | Intel oneAPI Base Toolkit versions antérieures à 2024.2. | ||
| Intel | N/A | Intel Atom, Pentium et Celeron processor family | ||
| Intel | N/A | Intel Iris Xe Dedicated Graphics family | ||
| Intel | N/A | Edge Orchestrator software versions antérieures à 24.11 for Intel Tiber Edge Platform. | ||
| Intel | N/A | Endurance Gaming Mode software versions antérieures à 1.5.651.0. | ||
| Intel | N/A | Intel QAT software versions antérieures à 2.3.0. | ||
| Intel | N/A | Intel Network Adapter Driver for Microsoft Windows 11 versions antérieures à 29.4. | ||
| Intel | N/A | 13th Gen Intel Core processor family | ||
| Intel | N/A | 12th Gen Intel Core processor family | ||
| Intel | N/A | FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler software for Windows versions antérieures à 2025.0.0. | ||
| Intel | N/A | 7th-10th Gen Intel Core processor family versions antérieures à 31.0.101.2134. | ||
| Intel | N/A | Intel Atom, Pentium et Celeron processors versions antérieures à 31.0.101.2134. | ||
| Intel | N/A | Intel Arc Graphics family | ||
| Intel | N/A | Intel Data Center GPU Flex Series versions antérieures à 32.0.101.6314. | ||
| Intel | N/A | 10th Gen Intel Core processor family | ||
| Intel | N/A | Intel Graphics Windows DCH driver software versions antérieures à 30.0.100.9955. | ||
| Intel | N/A | Intel 7th-10th Gen Processor Graphics for Windows driver versions antérieures à 31.0.101.2130: | ||
| Intel | N/A | Intel Data Center GPU Flex Series for Windows driver versions antérieures à 31.0.101.4314: Intel Data Center GPU Flex 140 Intel Data Center GPU Flex 170 | ||
| Intel | N/A | Administrative Tools for Intel Network Adapters versions antérieures à 29.4. | ||
| Intel | N/A | Intel Arc et Iris Xe Graphics for Windows driver versions antérieures à 32.0.101.6083/32.0.101.5736: | ||
| Intel | N/A | Intel Graphics Drivers pour Intel Arc graphics versions antérieures à 32.0.101.6449/32.0.101.6256. | ||
| Intel | N/A | Intel 6th Gen Processor Graphics driver toutes versions. | ||
| Intel | N/A | Intel Core Ultra processor family | ||
| Intel | N/A | 11th Gen Intel Core processor family | ||
| Intel | N/A | 8th Gen Intel Core processor family | ||
| Intel | N/A | Intel Graphics Windows DCH driver software versions antérieures à 30.0.101.1191. | ||
| Intel | N/A | Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.4. | ||
| Intel | N/A | 7th Gen Intel Core processor family | ||
| Intel | N/A | Intel Gaudi software installer versions antérieures à before 1.18. | ||
| Intel | N/A | Intel oneAPI DPC++/C++ Compiler software versions antérieures à 2025.0.0 | ||
| Intel | N/A | Intel Arc™ Pro A-series graphics versions antérieures à 30.0.101.1729. | ||
| Intel | N/A | Intel Core Processor with Intel Hybrid Technology | ||
| Intel | N/A | Intel Simics Package Manager software versions antérieures à 1.12.0. | ||
| Intel | N/A | 14th Gen Intel Core processor family | ||
| Intel | N/A | Intel Pentium et Celeron processor family | ||
| Intel | N/A | Intel Arc™ A-Series graphics versions antérieures à 31.0.101.3277. | ||
| Intel | N/A | Intel Iris Xe graphics versions antérieures à 32.0.101.6449/32.0.101.6256. |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel RealSense SDK software versions ant\u00e9rieures \u00e0 2.56.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advisor standalone component software software versions ant\u00e9rieures \u00e0 2024.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board D50DNP et M50FCP UEFI versions ant\u00e9rieures \u00e0 R01.02.0003.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet Connections Boot Utility versions ant\u00e9rieures \u00e0 29.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "9th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "OpenVINO model server software maintained by Intel versions ant\u00e9rieures \u00e0 2024.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Level Zero software versions ant\u00e9rieures \u00e0 1.5.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "NVM Update Utility for Intel Ethernet Network Adapter E810 Series versions ant\u00e9rieures \u00e0 4.6.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc Pro graphics versions ant\u00e9rieures \u00e0 32.0.101.6303.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Graphics Driver software versions ant\u00e9rieures \u00e0 32.0.101.6083_101.5736.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Atom, Pentium et Celeron processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Iris Xe Dedicated Graphics family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Edge Orchestrator software versions ant\u00e9rieures \u00e0 24.11 for Intel Tiber Edge Platform.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Endurance Gaming Mode software versions ant\u00e9rieures \u00e0 1.5.651.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QAT software versions ant\u00e9rieures \u00e0 2.3.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Network Adapter Driver for Microsoft Windows 11 versions ant\u00e9rieures \u00e0 29.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "13th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "12th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler software for Windows versions ant\u00e9rieures \u00e0 2025.0.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "7th-10th Gen Intel Core processor family versions ant\u00e9rieures \u00e0 31.0.101.2134.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Atom, Pentium et Celeron processors versions ant\u00e9rieures \u00e0 31.0.101.2134.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc Graphics family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center GPU Flex Series versions ant\u00e9rieures \u00e0 32.0.101.6314.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "10th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Graphics Windows DCH driver software versions ant\u00e9rieures \u00e0 30.0.100.9955.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 7th-10th Gen Processor Graphics for Windows driver versions ant\u00e9rieures \u00e0 31.0.101.2130:",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center GPU Flex Series for Windows driver versions ant\u00e9rieures \u00e0 31.0.101.4314:\n\nIntel Data Center GPU Flex 140\nIntel Data Center GPU Flex 170\n",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Administrative Tools for Intel Network Adapters versions ant\u00e9rieures \u00e0 29.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc et Iris Xe Graphics for Windows driver versions ant\u00e9rieures \u00e0 32.0.101.6083/32.0.101.5736:",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Graphics Drivers pour Intel Arc graphics versions ant\u00e9rieures \u00e0 32.0.101.6449/32.0.101.6256.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 6th Gen Processor Graphics driver toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Core Ultra processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "11th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "8th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Graphics Windows DCH driver software versions ant\u00e9rieures \u00e0 30.0.101.1191.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "7th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Gaudi software installer versions ant\u00e9rieures \u00e0 before 1.18.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI DPC++/C++ Compiler software versions ant\u00e9rieures \u00e0 2025.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc\u2122 Pro A-series graphics versions ant\u00e9rieures \u00e0 30.0.101.1729.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Core Processor with Intel Hybrid Technology",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Simics Package Manager software versions ant\u00e9rieures \u00e0 1.12.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "14th Gen Intel Core processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Pentium et Celeron processor family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc\u2122 A-Series graphics versions ant\u00e9rieures \u00e0 31.0.101.3277.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Iris Xe graphics versions ant\u00e9rieures \u00e0 32.0.101.6449/32.0.101.6256.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20618"
},
{
"name": "CVE-2025-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20008"
},
{
"name": "CVE-2024-31150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31150"
},
{
"name": "CVE-2025-20041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20041"
},
{
"name": "CVE-2025-20043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20043"
},
{
"name": "CVE-2025-21099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21099"
},
{
"name": "CVE-2025-22892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22892"
},
{
"name": "CVE-2025-20084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20084"
},
{
"name": "CVE-2025-20022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20022"
},
{
"name": "CVE-2025-23233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23233"
},
{
"name": "CVE-2025-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20095"
},
{
"name": "CVE-2025-20101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20101"
},
{
"name": "CVE-2024-45067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45067"
},
{
"name": "CVE-2024-43420",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43420"
},
{
"name": "CVE-2025-22848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22848"
},
{
"name": "CVE-2025-20039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20039"
},
{
"name": "CVE-2025-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20006"
},
{
"name": "CVE-2025-22843",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22843"
},
{
"name": "CVE-2025-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21094"
},
{
"name": "CVE-2025-20616",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20616"
},
{
"name": "CVE-2025-22446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22446"
},
{
"name": "CVE-2024-48869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48869"
},
{
"name": "CVE-2024-28954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28954"
},
{
"name": "CVE-2024-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39833"
},
{
"name": "CVE-2025-20003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20003"
},
{
"name": "CVE-2025-20629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20629"
},
{
"name": "CVE-2024-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21829"
},
{
"name": "CVE-2025-20018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20018"
},
{
"name": "CVE-2025-22895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22895"
},
{
"name": "CVE-2024-43101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43101"
},
{
"name": "CVE-2025-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20013"
},
{
"name": "CVE-2025-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22844"
},
{
"name": "CVE-2025-20057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20057"
},
{
"name": "CVE-2025-21100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21100"
},
{
"name": "CVE-2024-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47550"
},
{
"name": "CVE-2024-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39758"
},
{
"name": "CVE-2024-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21859"
},
{
"name": "CVE-2025-20612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20612"
},
{
"name": "CVE-2025-20046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20046"
},
{
"name": "CVE-2024-47800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47800"
},
{
"name": "CVE-2025-24308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24308"
},
{
"name": "CVE-2025-20611",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20611"
},
{
"name": "CVE-2024-28047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28047"
},
{
"name": "CVE-2025-20082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20082"
},
{
"name": "CVE-2025-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20054"
},
{
"name": "CVE-2025-20034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20034"
},
{
"name": "CVE-2025-20047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20047"
},
{
"name": "CVE-2024-31073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31073"
},
{
"name": "CVE-2025-20079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20079"
},
{
"name": "CVE-2025-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20052"
},
{
"name": "CVE-2024-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29222"
},
{
"name": "CVE-2025-21081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21081"
},
{
"name": "CVE-2025-22448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22448"
},
{
"name": "CVE-2025-20015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20015"
},
{
"name": "CVE-2025-20083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20083"
},
{
"name": "CVE-2025-20026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20026"
},
{
"name": "CVE-2025-20624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20624"
},
{
"name": "CVE-2025-20103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20103"
},
{
"name": "CVE-2024-46895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46895"
},
{
"name": "CVE-2024-36292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36292"
},
{
"name": "CVE-2025-20071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20071"
},
{
"name": "CVE-2025-20031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20031"
},
{
"name": "CVE-2025-20100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20100"
},
{
"name": "CVE-2025-20104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20104"
},
{
"name": "CVE-2024-31157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31157"
},
{
"name": "CVE-2025-20108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20108"
},
{
"name": "CVE-2025-20623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20623"
},
{
"name": "CVE-2025-20076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20076"
},
{
"name": "CVE-2024-28036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28036"
},
{
"name": "CVE-2024-45333",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45333"
},
{
"name": "CVE-2024-47795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47795"
},
{
"name": "CVE-2025-20032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20032"
},
{
"name": "CVE-2025-20004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20004"
},
{
"name": "CVE-2025-20009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20009"
},
{
"name": "CVE-2024-31155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31155"
},
{
"name": "CVE-2025-20062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20062"
},
{
"name": "CVE-2024-45332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45332"
},
{
"name": "CVE-2024-45371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45371"
},
{
"name": "CVE-2025-20030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20030"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0402",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01268",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01268.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01216",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01216.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01271",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01271.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01290",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01290.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01252",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01252.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01274",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01274.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01293",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01293.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01305",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01263",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01263.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01244",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01254",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01254.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01270",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01272",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01272.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01297",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01297.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01259",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01278",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01278.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01239",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01273",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01273.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01180",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01180.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01295",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01295.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01253",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01253.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01243",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01243.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01269",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01247",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01294",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01294.html"
}
]
}
CERTFR-2025-AVI-0394
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "les processeurs Intel sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20012"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-24495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24495"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0394",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2025-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01153",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html"
},
{
"published_at": "2025-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01322",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html"
}
]
}
CERTFR-2025-AVI-0119
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Arc Pro Graphics pour pilote Windows versions antérieures à 31.0.101.5978 | ||
| Intel | N/A | Intel Battery Life Diagnostic Tool versions antérieures à 2.4.1 | ||
| Intel | N/A | Intel oneAPI Base Toolkit versions antérieures à 2024.2 | ||
| Intel | N/A | Intel DSA versions antérieures à 23.4.39 | ||
| Intel | N/A | Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.1 | ||
| Intel | N/A | Intel MPI Library pour Windows versions antérieures à 2021.13 | ||
| Intel | N/A | Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.3 | ||
| Intel | N/A | EPCT versions antérieures à 1.42.8.0 | ||
| Intel | N/A | Intel XTU versions antérieures à 7.14.2.14 | ||
| Intel | N/A | Intel GPA versions antérieures à 2024.3 | ||
| Intel | N/A | Intel 7th-10th Gen Processor Graphics pour pilote Windows versions antérieures à 31.0.101.2130 | ||
| Intel | N/A | Intel MLC versions antérieures à v3.11b | ||
| Intel | N/A | Intel Chipset Software Installation Utility version antérieures à 10.1.19867.8574 | ||
| Intel | N/A | Intel GPA Framework versions antérieures à 2024.3 | ||
| Intel | N/A | Intel Arc Iris Xe graphics pour Windows versions antérieures à 31.0.101.5186_101.5234 | ||
| Intel | N/A | Intel Ethernet Connection I219 Series | ||
| Intel | N/A | Intel 7th-10th Gen Processor graphics pour Windows versions antérieures à 31.0.101.2130 | ||
| Intel | N/A | Intel DSA versions antérieures à 24.2.19.5 | ||
| Intel | N/A | Intel Data Center GPU Flex Series pour pilote Windows versions antérieures à 31.0.101.5768 | ||
| Intel | N/A | Intel Arc Iris Xe Graphics pour pilote Windows versions antérieures à 31.0.101.5768 | ||
| Intel | N/A | Intel Thread Director Visualizer versions antérieures à 1.0.1 | ||
| Intel | N/A | BIOS and System Firmware Update Package for Intel Server M50FCP family versions antérieures à R01.02.0002 | ||
| Intel | N/A | Intel Advisor versions antérieures à 2024.2 | ||
| Intel | N/A | Intel oneAPI HPC Toolkit versions antérieures à 2024.2 | ||
| Intel | N/A | Intel QuickAssist Technology versions antérieures à 2.2.0 | ||
| Intel | N/A | Intel Quartus Prime Standard Edition Design Software versions antérieures à 23.1.1 Patch 1.01std | ||
| Intel | N/A | Intel VPL software pour Windows version 2023.4.0 | ||
| Intel | N/A | FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler versions antérieures à 2024.2 | ||
| Intel | N/A | Intel 800 Series Ethernet Linux Kernel Mode Driver versions antérieures à 1.15.4 | ||
| Intel | N/A | Intel High Level Synthesis Compiler versions antérieures à 24.2 | ||
| Intel | N/A | Intel RealSense D400 Series Universal Windows Platform (UWP) Driver pour Windows 10 toutes versions | ||
| Intel | N/A | Intel Quartus Prime Lite Edition Design Software versions antérieures à 23.1.1 Patch 1.01std | ||
| Intel | N/A | Intel Arc Pro graphics pour Windows versions antérieures à 31.0.101.5319 | ||
| Intel | N/A | Intel Data Center GPU Flex Series pour Windows versions antérieures à 31.0.101.5333 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Arc Pro Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5978",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 2.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 23.4.39",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library pour Windows versions ant\u00e9rieures \u00e0 2021.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "EPCT versions ant\u00e9rieures \u00e0 1.42.8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel XTU versions ant\u00e9rieures \u00e0 7.14.2.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel GPA versions ant\u00e9rieures \u00e0 2024.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 7th-10th Gen Processor Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.2130",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MLC versions ant\u00e9rieures \u00e0 v3.11b",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Chipset Software Installation Utility version ant\u00e9rieures \u00e0 10.1.19867.8574",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel GPA Framework versions ant\u00e9rieures \u00e0 2024.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc Iris Xe graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5186_101.5234",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet Connection I219 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 7th-10th Gen Processor graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.2130",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 24.2.19.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center GPU Flex Series pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5768",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc Iris Xe Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5768",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Thread Director Visualizer versions ant\u00e9rieures \u00e0 1.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "BIOS and System Firmware Update Package for Intel Server M50FCP family versions ant\u00e9rieures \u00e0 R01.02.0002",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advisor versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QuickAssist Technology versions ant\u00e9rieures \u00e0 2.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Standard Edition Design Software versions ant\u00e9rieures \u00e0 23.1.1 Patch 1.01std",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VPL software pour Windows version 2023.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 800 Series Ethernet Linux Kernel Mode Driver versions ant\u00e9rieures \u00e0 1.15.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel High Level Synthesis Compiler versions ant\u00e9rieures \u00e0 24.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RealSense D400 Series Universal Windows Platform (UWP) Driver pour Windows 10 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Lite Edition Design Software versions ant\u00e9rieures \u00e0 23.1.1 Patch 1.01std",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc Pro graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5319",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center GPU Flex Series pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5333",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38310"
},
{
"name": "CVE-2024-25571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25571"
},
{
"name": "CVE-2023-34440",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34440"
},
{
"name": "CVE-2024-37020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37020"
},
{
"name": "CVE-2024-29214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29214"
},
{
"name": "CVE-2024-36285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36285"
},
{
"name": "CVE-2024-42410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42410"
},
{
"name": "CVE-2024-24582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24582"
},
{
"name": "CVE-2024-31068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31068"
},
{
"name": "CVE-2024-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36280"
},
{
"name": "CVE-2024-40887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40887"
},
{
"name": "CVE-2024-39284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39284"
},
{
"name": "CVE-2024-24852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24852"
},
{
"name": "CVE-2023-48366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48366"
},
{
"name": "CVE-2024-39279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39279"
},
{
"name": "CVE-2024-31858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31858"
},
{
"name": "CVE-2024-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39813"
},
{
"name": "CVE-2023-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29164"
},
{
"name": "CVE-2023-25192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25192"
},
{
"name": "CVE-2024-32941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32941"
},
{
"name": "CVE-2023-31276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31276"
},
{
"name": "CVE-2023-49615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49615"
},
{
"name": "CVE-2024-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39805"
},
{
"name": "CVE-2024-41917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41917"
},
{
"name": "CVE-2024-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39779"
},
{
"name": "CVE-2024-42405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42405"
},
{
"name": "CVE-2024-30211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30211"
},
{
"name": "CVE-2024-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39797"
},
{
"name": "CVE-2024-36283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36283"
},
{
"name": "CVE-2024-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38307"
},
{
"name": "CVE-2024-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21859"
},
{
"name": "CVE-2024-39356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39356"
},
{
"name": "CVE-2023-43758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43758"
},
{
"name": "CVE-2024-41168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41168"
},
{
"name": "CVE-2024-37355",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37355"
},
{
"name": "CVE-2024-36291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36291"
},
{
"name": "CVE-2023-49618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49618"
},
{
"name": "CVE-2024-39606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39606"
},
{
"name": "CVE-2024-41166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41166"
},
{
"name": "CVE-2025-20097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20097"
},
{
"name": "CVE-2023-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49603"
},
{
"name": "CVE-2024-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32938"
},
{
"name": "CVE-2024-28047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28047"
},
{
"name": "CVE-2024-39355",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39355"
},
{
"name": "CVE-2024-39365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39365"
},
{
"name": "CVE-2024-39271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39271"
},
{
"name": "CVE-2024-36262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36262"
},
{
"name": "CVE-2024-36293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36293"
},
{
"name": "CVE-2024-36274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36274"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2021-37577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37577"
},
{
"name": "CVE-2023-25191",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25191"
},
{
"name": "CVE-2024-42492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42492"
},
{
"name": "CVE-2024-32942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32942"
},
{
"name": "CVE-2024-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21830"
},
{
"name": "CVE-2024-47006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47006"
},
{
"name": "CVE-2024-26021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26021"
},
{
"name": "CVE-2023-32277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32277"
},
{
"name": "CVE-2023-48267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48267"
},
{
"name": "CVE-2024-42419",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42419"
},
{
"name": "CVE-2024-28127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28127"
},
{
"name": "CVE-2024-31157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31157"
},
{
"name": "CVE-2024-31153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31153"
},
{
"name": "CVE-2024-41934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41934"
},
{
"name": "CVE-2024-31155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31155"
},
{
"name": "CVE-2024-39372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39372"
},
{
"name": "CVE-2024-29223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29223"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0119",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01139",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01215",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01215.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01120",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01120.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01124",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01237",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01237.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01230",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01230.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01231",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01144",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01224",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01044",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01044.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01213",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01218",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01218.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01235",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01214",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01214.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01203",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01166",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01236",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01236.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01228",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01198",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01198.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00990",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01194",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01238",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01238.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01240",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01240.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01207",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01207.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01232",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01232.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00590",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00590.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01156",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01156.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01227",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01227.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01184",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01184.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01152",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01152.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00606",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00606.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01233",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01233.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01030",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01030.html"
},
{
"published_at": "2025-02-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01208",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01208.html"
}
]
}
CERTFR-2024-AVI-1059
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NUC M15 Laptop Kits: LAPBC510, LAPBC710.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "NUC P14E Laptop Element: CMCN1CC.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "NUC Software Studio Service",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-23197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23197"
},
{
"name": "CVE-2024-36297",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36297"
},
{
"name": "CVE-2024-34159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34159"
},
{
"name": "CVE-2024-23498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23498"
},
{
"name": "CVE-2024-36483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36483"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2024-12-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01185",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01185.html"
}
]
}
CERTFR-2024-AVI-0980
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Quartus Prime Pro Edition versions antérieures à 24.2 | ||
| Intel | N/A | Intel Server Board S2600ST toutes versions | ||
| Intel | N/A | Intel Fortran Compiler Classic versions antérieures à 2021.13 | ||
| Intel | N/A | Processeurs 4e génération Intel Xeon Scalable Eagle Stream Server CPU ID 0x806f8 | ||
| Intel | N/A | Intel VROC versions antérieures à 8.6.0.3001 | ||
| Intel | N/A | Intel Binary Configuration Tool versions antérieures à 3.4.5 | ||
| Intel | N/A | Processeurs 5e génération Intel Xeon Scalable Eagle Stream Server CPUID C0F62 | ||
| Intel | N/A | Intel Series management versions antérieures à CR_MGMT_02.00.00.4040 et CR_MGMT_03.00.00.0499 pour Optane PMem | ||
| Intel | N/A | Intel oneAPI Base Toolkit versions antérieures à 2024.2 | ||
| Intel | N/A | Intel Advanced Link Analyzer Standard Edition installer versions antérieures à 23.1.1 | ||
| Intel | N/A | Processeurs 4e génération Intel Xeon Scalable avec Intel vRAN Eagle Stream Network et Edge CPU ID 806F8 | ||
| Intel | N/A | Pilote Intel Graphics 15.40 4e Gen toutes versions pour Windows 10 | ||
| Intel | N/A | Pilote Intel Arc Pro Graphics versions antérieures à 31.0.101.5525 pour Windows | ||
| Intel | N/A | Intel oneMKL versions antérieures à 2024.2 pour Windows | ||
| Intel | N/A | Processeurs 4e génération Intel Xeon Edge Enhanced Eagle Stream Network et Edge CPU ID 806F8 | ||
| Intel | N/A | Intel CIP versions antérieures à 2.4.10852 | ||
| Intel | N/A | Intel Wireless-AC 9260 (ThP2) et Intel Killer Wi-Fi AX1550x/w2 | ||
| Intel | N/A | Intel DSA versions antérieures à 24.3.26.8 | ||
| Intel | N/A | Thunderbolt Share versions antérieures à 1.0.49.9 | ||
| Intel | N/A | Intel Rendering Toolkit versions antérieures à 2024.1.0 | ||
| Intel | N/A | Intel Server Board M10JNP2SB toutes versions | ||
| Intel | N/A | Intel SGX SDK pour Linux versions antérieures à 2.24 | ||
| Intel | N/A | Intel Wi-Fi 6E AX210 (TyP2) et Intel Killer Wi-Fi AX1675x/w2 | ||
| Intel | N/A | Moteur Intel QAT pour OpenSSL versions antérieures à v1.6.1 | ||
| Intel | N/A | Processeurs 4e génération Intel Xeon Gold Eagle Stream Server CPU ID 0x806f8 | ||
| Intel | N/A | Intel SDP Tool toutes versions pour Windows | ||
| Intel | N/A | Intel Server Board M20NTP toutes versions | ||
| Intel | N/A | BigDL versions antérieures à 2.5.0 | ||
| Intel | N/A | Processeurs 4e génération Intel Xeon Silver Eagle Stream Server CPU ID 0x806f8 | ||
| Intel | N/A | Pilote Intel Graphics 15.40 6e Gen toutes versions pour Windows 7 et 8.1 | ||
| Intel | N/A | Intel EMA versions antérieures à 1.13.1.0 | ||
| Intel | N/A | Intel MAS versions antérieures à 2.5 | ||
| Intel | N/A | Processeurs 4e Generation Intel Xeon Bronze Eagle Stream Server CPU ID 0x806f8 | ||
| Intel | N/A | Pilote Intel Graphics 15.45 toutes versions pour Windows | ||
| Intel | N/A | JAM STAPL Player versions antérieures à 2.6.1 | ||
| Intel | N/A | Intel PROSet/Wireless Intel Killer Wi-Fi et Intel Wireless Bluetooth versions 23.40 | ||
| Intel | N/A | Intel Extension pour Transformers versions antérieures à 1.5 | ||
| Intel | N/A | Processeurs 4e génération Intel Xeon Platinum Eagle Stream Server CPU ID 0x806f8 | ||
| Intel | N/A | Intel Server Board S2600BPBR toutes versions | ||
| Intel | N/A | Intel Media Driver pour VAAPI versions antérieures à 24.1.1 | ||
| Intel | N/A | Intel Wi-Fi 6E AX211 (GfP2) et Intel Killer Wi-Fi AX1675i/s2 | ||
| Intel | N/A | Intel Distribution pour Python versions antérieures à 2024.2 | ||
| Intel | N/A | Processeurs Intel Xeon W2400 et W3400 Fishhawk Falls Workstation CPU ID 806F8 | ||
| Intel | N/A | Pilote Intel Arc et Iris Xe Graphics versions antérieures à 30.0.101.5379 pour Windows | ||
| Intel | N/A | Intel CST versions antérieures à 8.7.10803 | ||
| Intel | N/A | Intel Quartus Prime Standard Edition versions antérieures à 23.1.1 pour Windows | ||
| Intel | N/A | Processeurs 3e génération Intel Xeon Scalable Whitley Server Workstation CPU ID 606A6 | ||
| Intel | N/A | Intel Server Board S2600BP toutes versions | ||
| Intel | N/A | Intel VPL versions antérieures à 24.1.4 | ||
| Intel | N/A | Intel Server Board M70KLP toutes versions | ||
| Intel | N/A | OpenVINO Model Server versions antérieures à 2024.0 | ||
| Intel | N/A | Intel Wi-Fi 6 AX200 (CcP2) et Intel Killer Wi-Fi AX1650x/w2 | ||
| Intel | N/A | Intel oneAPI HPC Toolkit versions antérieures à 2024.2 | ||
| Intel | N/A | Intel IPP versions antérieures à 2021.12.0 | ||
| Intel | N/A | Processeurs Intel Xeon 6 Sierra Forest Server CPUID A06F2 | ||
| Intel | N/A | Pilotes Intel Data Center GPU Flex Series versions antérieures à 31.0.101.5522 pour Windows | ||
| Intel | N/A | Processeurs Intel Xeon D Idaville Server CPU ID 606C1 | ||
| Intel | N/A | Intel Graphics Offline Compiler pour OpenCL Code versions antérieures à 2024.1.0.142, pilotes graphiques 31.0.101.5445. | ||
| Intel | N/A | Intel Granulate versions antérieures à 4.30.1 | ||
| Intel | N/A | Intel Fortran Compiler versions antérieures à 2024.2 | ||
| Intel | N/A | Intel High Level Synthesis Compiler pour Intel Quartus Prime Pro Edition versions antérieures à 24.1 | ||
| Intel | N/A | ACAT versions antérieures à 3.11.0 | ||
| Intel | N/A | Pilote Intel 7e à 10e Gen Processor Graphics versions antérieures à 31.0.101.2128 pour Windows | ||
| Intel | N/A | Intel VTune Profiler versions antérieures à 2024.2.0 | ||
| Intel | N/A | Intel Neural Compressor versions antérieures v3.0 | ||
| Intel | N/A | Pilotes Intel Arc et Iris Xe Graphics versions antérieures à 31.0.101.5518 pour Windows | ||
| Intel | N/A | Processeurs Intel Xeon CPU Max Series Eagle Stream Server CPU ID 806F8 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Quartus Prime Pro Edition versions ant\u00e9rieures \u00e0 24.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board S2600ST toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Fortran Compiler Classic versions ant\u00e9rieures \u00e0 2021.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Scalable Eagle Stream Server CPU ID 0x806f8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VROC versions ant\u00e9rieures \u00e0 8.6.0.3001",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Binary Configuration Tool versions ant\u00e9rieures \u00e0 3.4.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 5e g\u00e9n\u00e9ration Intel Xeon Scalable Eagle Stream Server CPUID C0F62",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Series management versions ant\u00e9rieures \u00e0 CR_MGMT_02.00.00.4040 et CR_MGMT_03.00.00.0499 pour Optane PMem",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advanced Link Analyzer Standard Edition installer versions ant\u00e9rieures \u00e0 23.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Scalable avec Intel vRAN Eagle Stream Network et Edge CPU ID 806F8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel Graphics 15.40 4e Gen toutes versions pour Windows 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel Arc Pro Graphics versions ant\u00e9rieures \u00e0 31.0.101.5525 pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneMKL versions ant\u00e9rieures \u00e0 2024.2 pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Edge Enhanced Eagle Stream Network et Edge CPU ID 806F8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CIP versions ant\u00e9rieures \u00e0 2.4.10852",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wireless-AC 9260 (ThP2) et Intel Killer Wi-Fi AX1550x/w2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 24.3.26.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Thunderbolt Share versions ant\u00e9rieures \u00e0 1.0.49.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rendering Toolkit versions ant\u00e9rieures \u00e0 2024.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M10JNP2SB toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK pour Linux versions ant\u00e9rieures \u00e0 2.24",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wi-Fi 6E AX210 (TyP2) et Intel Killer Wi-Fi AX1675x/w2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Moteur Intel QAT pour OpenSSL versions ant\u00e9rieures \u00e0 v1.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Gold Eagle Stream Server CPU ID 0x806f8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SDP Tool toutes versions pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M20NTP toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "BigDL versions ant\u00e9rieures \u00e0 2.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Silver Eagle Stream Server CPU ID 0x806f8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel Graphics 15.40 6e Gen toutes versions pour Windows 7 et 8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel EMA versions ant\u00e9rieures \u00e0 1.13.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MAS versions ant\u00e9rieures \u00e0 2.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 4e Generation Intel Xeon Bronze Eagle Stream Server CPU ID 0x806f8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel Graphics 15.45 toutes versions pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "JAM STAPL Player versions ant\u00e9rieures \u00e0 2.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless Intel Killer Wi-Fi et Intel Wireless Bluetooth versions 23.40",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Extension pour Transformers versions ant\u00e9rieures \u00e0 1.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 4e g\u00e9n\u00e9ration Intel Xeon Platinum Eagle Stream Server CPU ID 0x806f8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board S2600BPBR toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Media Driver pour VAAPI versions ant\u00e9rieures \u00e0 24.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wi-Fi 6E AX211 (GfP2) et Intel Killer Wi-Fi AX1675i/s2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon W2400 et W3400 Fishhawk Falls Workstation CPU ID 806F8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel Arc et Iris Xe Graphics versions ant\u00e9rieures \u00e0 30.0.101.5379 pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CST versions ant\u00e9rieures \u00e0 8.7.10803",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Standard Edition versions ant\u00e9rieures \u00e0 23.1.1 pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs 3e g\u00e9n\u00e9ration Intel Xeon Scalable Whitley Server Workstation CPU ID 606A6",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board S2600BP toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VPL versions ant\u00e9rieures \u00e0 24.1.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M70KLP toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "OpenVINO Model Server versions ant\u00e9rieures \u00e0 2024.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wi-Fi 6 AX200 (CcP2) et Intel Killer Wi-Fi AX1650x/w2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP versions ant\u00e9rieures \u00e0 2021.12.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon 6 Sierra Forest Server CPUID A06F2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Intel Data Center GPU Flex Series versions ant\u00e9rieures \u00e0 31.0.101.5522 pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon D Idaville Server CPU ID 606C1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Graphics Offline Compiler pour OpenCL Code versions ant\u00e9rieures \u00e0 2024.1.0.142, pilotes graphiques 31.0.101.5445.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Granulate versions ant\u00e9rieures \u00e0 4.30.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Fortran Compiler versions ant\u00e9rieures \u00e0 2024.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel High Level Synthesis Compiler pour Intel Quartus Prime Pro Edition versions ant\u00e9rieures \u00e0 24.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "ACAT versions ant\u00e9rieures \u00e0 3.11.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel 7e \u00e0 10e Gen Processor Graphics versions ant\u00e9rieures \u00e0 31.0.101.2128 pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2024.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Neural Compressor versions ant\u00e9rieures v3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Intel Arc et Iris Xe Graphics versions ant\u00e9rieures \u00e0 31.0.101.5518 pour Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon CPU Max Series Eagle Stream Server CPU ID 806F8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-32667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32667"
},
{
"name": "CVE-2024-32048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32048"
},
{
"name": "CVE-2024-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21808"
},
{
"name": "CVE-2024-39285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39285"
},
{
"name": "CVE-2024-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23918"
},
{
"name": "CVE-2024-28881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28881"
},
{
"name": "CVE-2024-29076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29076"
},
{
"name": "CVE-2024-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21820"
},
{
"name": "CVE-2024-41167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41167"
},
{
"name": "CVE-2024-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23312"
},
{
"name": "CVE-2024-39609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39609"
},
{
"name": "CVE-2024-28051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28051"
},
{
"name": "CVE-2024-29085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29085"
},
{
"name": "CVE-2024-31407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31407"
},
{
"name": "CVE-2024-34776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34776"
},
{
"name": "CVE-2024-24984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24984"
},
{
"name": "CVE-2024-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36242"
},
{
"name": "CVE-2024-36276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36276"
},
{
"name": "CVE-2024-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25647"
},
{
"name": "CVE-2024-28049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28049"
},
{
"name": "CVE-2024-36282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36282"
},
{
"name": "CVE-2024-35245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35245"
},
{
"name": "CVE-2024-40885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40885"
},
{
"name": "CVE-2024-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23919"
},
{
"name": "CVE-2024-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21783"
},
{
"name": "CVE-2024-36275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36275"
},
{
"name": "CVE-2024-36488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36488"
},
{
"name": "CVE-2024-36294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36294"
},
{
"name": "CVE-2024-25563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25563"
},
{
"name": "CVE-2024-37025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37025"
},
{
"name": "CVE-2024-34165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34165"
},
{
"name": "CVE-2024-31158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31158"
},
{
"name": "CVE-2024-28030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28030"
},
{
"name": "CVE-2024-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23198"
},
{
"name": "CVE-2024-39811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39811"
},
{
"name": "CVE-2024-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28950"
},
{
"name": "CVE-2024-36253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36253"
},
{
"name": "CVE-2022-34301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34301"
},
{
"name": "CVE-2024-34167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34167"
},
{
"name": "CVE-2024-33611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33611"
},
{
"name": "CVE-2024-31154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31154"
},
{
"name": "CVE-2024-34164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34164"
},
{
"name": "CVE-2024-28952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28952"
},
{
"name": "CVE-2024-38383",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38383"
},
{
"name": "CVE-2024-34170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34170"
},
{
"name": "CVE-2024-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21853"
},
{
"name": "CVE-2024-34028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34028"
},
{
"name": "CVE-2024-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38387"
},
{
"name": "CVE-2024-35201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35201"
},
{
"name": "CVE-2024-34023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34023"
},
{
"name": "CVE-2024-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38660"
},
{
"name": "CVE-2024-34022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34022"
},
{
"name": "CVE-2024-25565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25565"
},
{
"name": "CVE-2024-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28169"
},
{
"name": "CVE-2024-29083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29083"
},
{
"name": "CVE-2024-36245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36245"
},
{
"name": "CVE-2024-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38665"
},
{
"name": "CVE-2024-32483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32483"
},
{
"name": "CVE-2024-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33624"
},
{
"name": "CVE-2024-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38668"
},
{
"name": "CVE-2024-37027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37027"
},
{
"name": "CVE-2024-36482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36482"
},
{
"name": "CVE-2024-32044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32044"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0980",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01177",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01177.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01079",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01085",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01085.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01193",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01193.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01200",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01200.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01182",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01182.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01167",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01167.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01219",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01219.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01190",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01190.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01173",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01173.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01158",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01158.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01111",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01111.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01151",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01151.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01148",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01148.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01108",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01108.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01183",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01183.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01132",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01132.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01163",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01163.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01146",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01146.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01145",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01145.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01179",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01179.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01142",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01142.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01101",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01189",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01189.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01076",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01076.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01195",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01195.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01197",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01197.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01204",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01204.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01155",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01155.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01187",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01187.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01154",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01154.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01188",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01188.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01176",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01176.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01217",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01217.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01165",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01165.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01161",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01161.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01196",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01196.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01140",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01140.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01024.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01138",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01138.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01175",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01191",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01191.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01131",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01201",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01201.html"
}
]
}
CERTFR-2024-AVI-0852
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Intel TDX Module. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "TDX Module versions ant\u00e9rieures \u00e0 1.5.06",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-27457",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27457"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0852",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Intel TDX Module. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Vuln\u00e9rabilit\u00e9 dans Intel TDX Module",
"vendor_advisories": [
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01099",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01099.html"
}
]
}
CERTFR-2024-AVI-0768
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Se référer aux bulletins de l'éditeur pour la liste des processeurs vulnérables.
L'éditeur indique que le produit RAID Web Console n'est plus supporté et recommande de migrer vers un produit plus récent.
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel RAID Web Console Software toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "Se r\u00e9f\u00e9rer aux bulletins de l\u0027\u00e9diteur pour la liste des processeurs vuln\u00e9rables.\n\nL\u0027\u00e9diteur indique que le produit RAID Web Console n\u0027est plus support\u00e9 et recommande de migrer vers un produit plus r\u00e9cent. ",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-32666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32666"
},
{
"name": "CVE-2023-4342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4342"
},
{
"name": "CVE-2023-4328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4328"
},
{
"name": "CVE-2023-4332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4332"
},
{
"name": "CVE-2023-4338",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4338"
},
{
"name": "CVE-2023-41833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41833"
},
{
"name": "CVE-2023-43753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43753"
},
{
"name": "CVE-2023-23904",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23904"
},
{
"name": "CVE-2024-23984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23984"
},
{
"name": "CVE-2023-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4339"
},
{
"name": "CVE-2024-33848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33848"
},
{
"name": "CVE-2024-23599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23599"
},
{
"name": "CVE-2023-4324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4324"
},
{
"name": "CVE-2024-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21781"
},
{
"name": "CVE-2023-4333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4333"
},
{
"name": "CVE-2023-4344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4344"
},
{
"name": "CVE-2024-36261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36261"
},
{
"name": "CVE-2024-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21829"
},
{
"name": "CVE-2024-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32940"
},
{
"name": "CVE-2024-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34153"
},
{
"name": "CVE-2023-4334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4334"
},
{
"name": "CVE-2023-4323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4323"
},
{
"name": "CVE-2023-4325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4325"
},
{
"name": "CVE-2023-42772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42772"
},
{
"name": "CVE-2023-4327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4327"
},
{
"name": "CVE-2023-4326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4326"
},
{
"name": "CVE-2023-4329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4329"
},
{
"name": "CVE-2024-34545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34545"
},
{
"name": "CVE-2023-4336",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4336"
},
{
"name": "CVE-2023-25546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25546"
},
{
"name": "CVE-2023-4341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4341"
},
{
"name": "CVE-2023-4343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4343"
},
{
"name": "CVE-2024-28170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28170"
},
{
"name": "CVE-2023-4340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4340"
},
{
"name": "CVE-2024-24968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24968"
},
{
"name": "CVE-2023-4345",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4345"
},
{
"name": "CVE-2023-22351",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22351"
},
{
"name": "CVE-2024-34543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34543"
},
{
"name": "CVE-2023-4331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4331"
},
{
"name": "CVE-2024-36247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36247"
},
{
"name": "CVE-2023-43626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43626"
},
{
"name": "CVE-2023-4337",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4337"
},
{
"name": "CVE-2024-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21871"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0768",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01071",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01103",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00926",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00926.html"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01097",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html"
}
]
}
CERTFR-2024-AVI-0679
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Arc Iris Xe Graphics versions antérieures à 31.0.101.4824 | ||
| Intel | N/A | Intel NUC M15 Laptop Kits: LAPBC710, LAPBC510, LAPRC710, LAPRC510 | ||
| Intel | N/A | Intel NUC M15 Laptop Kits: LAPRC710, LAPRC510 | ||
| Intel | N/A | Intel NUC X15 Laptop | ||
| Intel | N/A | Intel oneAPI Base Toolkit software versions antérieures à 2024.1 | ||
| Intel | N/A | Intel oneAPI Base Toolkits versions antérieures à 2024.1 | ||
| Intel | N/A | Intel Quartus Prime Pro Edition Design software versions antérieures à 23.4 | ||
| Intel | N/A | Intel Quartus Prime Pro Edition Design Software versions antérieures à 24.1 | ||
| Intel | N/A | Intel(R) Ethernet Complete Driver Pack versions antérieures à 28.3 | ||
| Intel | N/A | Intel(R) Ethernet Controllers E800 Series with NVM image versions 4.4 | ||
| Intel | N/A | Intel(R) Ethernet Controllers E800 Series avec des versions antérieures à NIC1.3 PV, NVM avec versions d'images avant 3.36 et Intel(R) Ethernet Complete Driver Pack 28.3. | ||
| Intel | N/A | Intel TDX module software versions 1.5.05.46.698 | ||
| Intel | N/A | Intel TDX module software versions antérieures à TDX 1.5.01.00.592 | ||
| Intel | N/A | Intel Trace Analyzer and Collector versions antérieures à 2022.1 | ||
| Intel | N/A | Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEdit-Win software versions antérieures à 5.27.03.0006 | ||
| Intel | N/A | Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEditLnx software versions antérieures à 5.27.06.0019 | ||
| Intel | N/A | Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVLnx software versions antérieures à 5.13.00.2106 | ||
| Intel | N/A | Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVWin software versions antérieures à 5.13.00.2109 | ||
| Intel | N/A | Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgLnx software versions antérieures à 5.05.04.0008 | ||
| Intel | N/A | Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgWin software versions antérieures à 5.05.04.0008 | ||
| Intel | N/A | Intel NUC X15 Laptop Kits: LAPAC71G, LAPAC71H, LAPKC71F, LAPKC71E, LAPKC51E. | ||
| Intel | N/A | Intel Simics Package Manager software versions antérieures à 1.8.3. | ||
| Intel | N/A | Intel oneAPI Base Toolkit versions antérieures à 2024.1 | ||
| Intel | N/A | Intel oneAPI DPC++/C++ Compiler versions antérieures à 2024.1. | ||
| Intel | N/A | Intel oneAPI HPC Toolkit versions antérieures à 2024.1 | ||
| Intel | N/A | Intel oneAPI HPC Toolkit versions antérieures à 2024.1.0. | ||
| Intel | N/A | Intel oneAPI Math Kernel Library versions antérieures à 2024.1 | ||
| Intel | N/A | BMRA software versions antérieures à 22.08 | ||
| Intel | N/A | Flexlm License Daemons for Intel FPGA Software version v11.19.5.0 | ||
| Intel | N/A | Intel Advisor software versions antérieures à 2024.1 | ||
| Intel | N/A | Intel Agilex FPGA 7 FPGA firmware versions antérieures à 24.1 | ||
| Intel | N/A | Intel CIP software versions antérieures à 2.4.10717 | ||
| Intel | N/A | Intel Connectivity Performance Suite software versions antérieures à 2.0 | ||
| Intel | N/A | Intel DPC++ C++ Compiler software versions antérieures à 2024.1 | ||
| Intel | N/A | Intel Ethernet Adapter Complete Driver Pack software versions antérieures à 28.3 | ||
| Intel | N/A | Intel Fortran Compiler versions antérieures à 2024.1 | ||
| Intel | N/A | Intel FPGA SDK for OpenCL software technology, toutes versions | ||
| Intel | N/A | Intel GPA software versions antérieures à 2024.1 | ||
| Intel | N/A | Intel Graphics Performance Analyzers (Intel GPA) software versions antérieures à 2023.4 | ||
| Intel | N/A | Intel HID Event Filter software versions antérieures à 2.2.2.1 | ||
| Intel | N/A | Intel High Level Synthesis Compiler software versions antérieures à 23.4 | ||
| Intel | N/A | Intel Integrated Performance Primitive versions antérieures à 2021.11 | ||
| Intel | N/A | Intel IPP Cryptography software versions antérieures à 2021.11 | ||
| Intel | N/A | Intel ISH software for Intel NUC M15 Laptop Kits LAPBC710 and LAPBC510 versions antérieures à 5.4.1.4479 | ||
| Intel | N/A | Intel ISH software for Intel NUC M15 Laptop Kits LAPRC710 and LAPRC510 versions antérieures à 5.4.2.4594 | ||
| Intel | N/A | Intel License Manager for FLEXlm product versions antérieures à 11.19.5.0 | ||
| Intel | N/A | Intel MAS (GUI) versions antérieures à 2.5.0 | ||
| Intel | N/A | Processeurs Intel Xeon Scalable de 4ème et 5ème génération | ||
| Intel | N/A | Intel Data Center GPU Max Series 1100 et 1550 | ||
| Intel | N/A | Intel Distribution pour GDB software versions antérieures à 2024.0.1 | ||
| Intel | N/A | Intel Distribution pour Python pour Windows versions antérieures à 2024.1 | ||
| Intel | N/A | Intel ISH software for 11th Generation Intel Core Processor Family versions antérieures à 5.4.1.4479 | ||
| Intel | N/A | Intel ISH software for 12th Generation Intel Core Processor Family versions antérieures à 5.4.2.4594 | ||
| Intel | N/A | Intel MPI Library versions antérieures à 2021.12 | ||
| Intel | N/A | Intel Unite Client Extended Display Plugin software installer, toutes versions | ||
| Intel | N/A | Intel VROC versions antérieures à 8.6.0.1191 | ||
| Intel | N/A | Intel VTune Profiler software versions antérieures à 2024.1 | ||
| Intel | N/A | LAPAC71G and LAPAC71H versions antérieures à 0065 | ||
| Intel | N/A | LAPBC510 and LAPBC710 versions antérieures à 0083 | ||
| Intel | N/A | LAPKC51E, LAPKC71E, LAPKC71F versions antérieures à 0048 | ||
| Intel | N/A | LAPRC510, LAPRC710 versions antérieures à 0066 | ||
| Intel | N/A | VTune Profiler versions antérieures à VTune 2024.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Arc Iris Xe Graphics versions ant\u00e9rieures \u00e0 31.0.101.4824",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC M15 Laptop Kits: LAPBC710, LAPBC510, LAPRC710, LAPRC510",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC M15 Laptop Kits: LAPRC710, LAPRC510",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC X15 Laptop",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit software versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkits versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Pro Edition Design software versions ant\u00e9rieures \u00e0 23.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Pro Edition Design Software versions ant\u00e9rieures \u00e0 24.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel(R) Ethernet Complete Driver Pack versions ant\u00e9rieures \u00e0 28.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel(R) Ethernet Controllers E800 Series with NVM image versions 4.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel(R) Ethernet Controllers E800 Series avec des versions ant\u00e9rieures \u00e0 NIC1.3 PV, NVM avec versions d\u0027images avant 3.36 et Intel(R) Ethernet Complete Driver Pack 28.3.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TDX module software versions 1.5.05.46.698",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TDX module software versions ant\u00e9rieures \u00e0 TDX 1.5.01.00.592",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trace Analyzer and Collector versions ant\u00e9rieures \u00e0 2022.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEdit-Win software versions ant\u00e9rieures \u00e0 5.27.03.0006",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iDmiEditLnx software versions ant\u00e9rieures \u00e0 5.27.06.0019",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVLnx software versions ant\u00e9rieures \u00e0 5.13.00.2106",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iFlashVWin software versions ant\u00e9rieures \u00e0 5.13.00.2109",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgLnx software versions ant\u00e9rieures \u00e0 5.05.04.0008",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Aptio V UEFI Firmware Integrator Tools for Intel NUC iSetupCfgWin software versions ant\u00e9rieures \u00e0 5.05.04.0008",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC X15 Laptop Kits: LAPAC71G, LAPAC71H, LAPKC71F, LAPKC71E, LAPKC51E.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Simics Package Manager software versions ant\u00e9rieures \u00e0 1.8.3.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2024.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.1.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "BMRA software versions ant\u00e9rieures \u00e0 22.08",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Flexlm License Daemons for Intel FPGA Software version v11.19.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advisor software versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Agilex FPGA 7 FPGA firmware versions ant\u00e9rieures \u00e0 24.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CIP software versions ant\u00e9rieures \u00e0 2.4.10717",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Connectivity Performance Suite software versions ant\u00e9rieures \u00e0 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DPC++ C++ Compiler software versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet Adapter Complete Driver Pack software versions ant\u00e9rieures \u00e0 28.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Fortran Compiler versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel FPGA SDK for OpenCL software technology, toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel GPA software versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Graphics Performance Analyzers (Intel GPA) software versions ant\u00e9rieures \u00e0 2023.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HID Event Filter software versions ant\u00e9rieures \u00e0 2.2.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel High Level Synthesis Compiler software versions ant\u00e9rieures \u00e0 23.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Integrated Performance Primitive versions ant\u00e9rieures \u00e0 2021.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP Cryptography software versions ant\u00e9rieures \u00e0 2021.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel ISH software for Intel NUC M15 Laptop Kits LAPBC710 and LAPBC510 versions ant\u00e9rieures \u00e0 5.4.1.4479",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel ISH software for Intel NUC M15 Laptop Kits LAPRC710 and LAPRC510 versions ant\u00e9rieures \u00e0 5.4.2.4594",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel License Manager for FLEXlm product versions ant\u00e9rieures \u00e0 11.19.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MAS (GUI) versions ant\u00e9rieures \u00e0 2.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Xeon Scalable de 4\u00e8me et 5\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center GPU Max Series 1100 et 1550",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour GDB software versions ant\u00e9rieures \u00e0 2024.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python pour Windows versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel ISH software for 11th Generation Intel Core Processor Family versions ant\u00e9rieures \u00e0 5.4.1.4479",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel ISH software for 12th Generation Intel Core Processor Family versions ant\u00e9rieures \u00e0 5.4.2.4594",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library versions ant\u00e9rieures \u00e0 2021.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Unite Client Extended Display Plugin software installer, toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VROC versions ant\u00e9rieures \u00e0 8.6.0.1191",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler software versions ant\u00e9rieures \u00e0 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "LAPAC71G and LAPAC71H versions ant\u00e9rieures \u00e0 0065",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "LAPBC510 and LAPBC710 versions ant\u00e9rieures \u00e0 0083",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "LAPKC51E, LAPKC71E, LAPKC71F versions ant\u00e9rieures \u00e0 0048",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "LAPRC510, LAPRC710 versions ant\u00e9rieures \u00e0 0066",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "VTune Profiler versions ant\u00e9rieures \u00e0 VTune 2024.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-23495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23495"
},
{
"name": "CVE-2024-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21801"
},
{
"name": "CVE-2024-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21844"
},
{
"name": "CVE-2024-23497",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23497"
},
{
"name": "CVE-2023-45230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45230"
},
{
"name": "CVE-2024-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21784"
},
{
"name": "CVE-2022-36763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36763"
},
{
"name": "CVE-2023-39539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39539"
},
{
"name": "CVE-2024-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21857"
},
{
"name": "CVE-2024-24980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24980"
},
{
"name": "CVE-2024-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21787"
},
{
"name": "CVE-2024-26027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26027"
},
{
"name": "CVE-2024-27461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27461"
},
{
"name": "CVE-2023-34424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34424"
},
{
"name": "CVE-2023-38655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38655"
},
{
"name": "CVE-2024-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23491"
},
{
"name": "CVE-2024-23499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23499"
},
{
"name": "CVE-2023-45229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45229"
},
{
"name": "CVE-2023-45234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45234"
},
{
"name": "CVE-2023-45236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45236"
},
{
"name": "CVE-2024-24983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24983"
},
{
"name": "CVE-2024-28947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28947"
},
{
"name": "CVE-2024-28887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28887"
},
{
"name": "CVE-2024-25939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25939"
},
{
"name": "CVE-2024-29015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29015"
},
{
"name": "CVE-2024-25576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25576"
},
{
"name": "CVE-2024-21769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21769"
},
{
"name": "CVE-2024-24986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24986"
},
{
"name": "CVE-2024-28046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28046"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2024-34163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34163"
},
{
"name": "CVE-2024-24973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24973"
},
{
"name": "CVE-2024-26025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26025"
},
{
"name": "CVE-2023-45231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45231"
},
{
"name": "CVE-2022-29871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29871"
},
{
"name": "CVE-2023-43747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43747"
},
{
"name": "CVE-2023-45237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45237"
},
{
"name": "CVE-2023-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40067"
},
{
"name": "CVE-2024-28050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28050"
},
{
"name": "CVE-2024-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21810"
},
{
"name": "CVE-2023-49141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49141"
},
{
"name": "CVE-2023-45233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45233"
},
{
"name": "CVE-2023-45232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45232"
},
{
"name": "CVE-2024-25562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25562"
},
{
"name": "CVE-2024-23907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23907"
},
{
"name": "CVE-2024-23908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23908"
},
{
"name": "CVE-2024-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21807"
},
{
"name": "CVE-2023-35123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35123"
},
{
"name": "CVE-2024-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24977"
},
{
"name": "CVE-2024-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21806"
},
{
"name": "CVE-2024-24580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24580"
},
{
"name": "CVE-2024-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22184"
},
{
"name": "CVE-2024-23909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23909"
},
{
"name": "CVE-2023-49144",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49144"
},
{
"name": "CVE-2023-48361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48361"
},
{
"name": "CVE-2024-39283",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39283"
},
{
"name": "CVE-2024-23489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23489"
},
{
"name": "CVE-2023-43489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43489"
},
{
"name": "CVE-2024-25561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25561"
},
{
"name": "CVE-2024-22374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22374"
},
{
"name": "CVE-2023-42667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42667"
},
{
"name": "CVE-2024-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21766"
},
{
"name": "CVE-2024-23974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23974"
},
{
"name": "CVE-2024-26022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26022"
},
{
"name": "CVE-2024-28172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28172"
},
{
"name": "CVE-2024-28876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28876"
},
{
"name": "CVE-2024-24853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24853"
},
{
"name": "CVE-2023-45235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45235"
},
{
"name": "CVE-2024-22378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22378"
},
{
"name": "CVE-2024-23981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23981"
},
{
"name": "CVE-2024-28953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28953"
},
{
"name": "CVE-2024-22376",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22376"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0679",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01102",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01102.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01172",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01172.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01116",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01116.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01129",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01129.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00790",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00790.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01070",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01070.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01106",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01106.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01089",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01089.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01121",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01121.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01038",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01113",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01113.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01057",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01057.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01046",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01088",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01088.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01122",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01122.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01164",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01164.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01130",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01130.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01107",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01107.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01127",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01127.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01112",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01112.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01075",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01075.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01095",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01095.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01115",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01115.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01010",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01010.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01126",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01126.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01128",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01128.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01087",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01087.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01114",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01114.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01094",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01094.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00999",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00999.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01083",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01022.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01117",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01117.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01073",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01073.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00918",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00918.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01105",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01105.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01078",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01125",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01125.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01072",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01072.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01104",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01104.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01100",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01118",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01110",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01110.html"
}
]
}
CERTFR-2024-AVI-0213
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Local Manageability Service versions antérieures à 2316.5.1.2. | ||
| Intel | N/A | Intel Xeon D | ||
| Intel | N/A | Processor Bus Lock | ||
| Intel | N/A | Intel CSME software installer versions antérieures à 2328.5.5.0. | ||
| Intel | N/A | Bios | ||
| Intel | N/A | Intel Xeon de 3ème et 4ème génération | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E5_04.04.04.500.0 ou SPS_E5_06.01.02.048.0. |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Local Manageability Service versions ant\u00e9rieures \u00e0 2316.5.1.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Xeon D",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processor Bus Lock",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME software installer versions ant\u00e9rieures \u00e0 2328.5.5.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Bios",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Xeon de 3\u00e8me et 4\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E5_04.04.04.500.0 ou SPS_E5_06.01.02.048.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-32666",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32666"
},
{
"name": "CVE-2023-27502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27502"
},
{
"name": "CVE-2023-35191",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35191"
},
{
"name": "CVE-2023-32633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32633"
},
{
"name": "CVE-2023-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38575"
},
{
"name": "CVE-2023-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32282"
},
{
"name": "CVE-2023-43490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43490"
},
{
"name": "CVE-2023-22655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22655"
},
{
"name": "CVE-2023-39368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39368"
},
{
"name": "CVE-2023-28389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28389"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0213",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Intel\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00923 du 12 mars 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00982 du 12 mars 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01045 du 12 mars 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00986 du 12 mars 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00960 du 12 mars 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00972 du 12 mars 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00929 du 12 mars 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00929.html"
}
]
}
CERTFR-2024-AVI-0124
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | ACAT software maintenu par Intel versions antérieures à 2.0.0 | ||
| Intel | N/A | Arm DS software pour Intel SoC FPGA versions antérieures à 2022.2 | ||
| Intel | N/A | Tous les processeurs Intel Core de 6e, 7e, 8e ou 9e génération avec le pilote Intel Thunderbolt DCH toutes versions | ||
| Intel | N/A | Installation software pour Administrative Tools pour Intel Network Adapters versions antérieures à 28.2 | ||
| Intel | N/A | Installation software pour Intel Ethernet Adapter Complete Driver Pack versions antérieures à 28.2 | ||
| Intel | N/A | Installation software pour Intel Ethernet Connections Boot Utility, Preboot Images et pilotes EFI s versions antérieures à 28.2 | ||
| Intel | N/A | Intel Advisor pour oneAPI versions antérieures à 2023.2.0 | ||
| Intel | N/A | Intel Battery Life Diagnostic Tool software versions antérieures à 2.3.1 | ||
| Intel | N/A | Intel Binary Configuration Tool software versions antérieures à 3.4.4 | ||
| Intel | N/A | Intel CIP software versions antérieures à 2.4.10577 | ||
| Intel | N/A | Intel Chipset Driver Software versions antérieures à 10.1.19444.8378 | ||
| Intel | N/A | Intel Cluster Checker 2021.7.3 | ||
| Intel | N/A | Intel DSA software versions antérieures à 23.4.33 | ||
| Intel | N/A | Intel Distribution pour Python 2023.1 | ||
| Intel | N/A | Intel IPP Cryptography versions antérieures à 2021.8.0 | ||
| Intel | N/A | Intel ISPC versions antérieures à 1.21.0 | ||
| Intel | N/A | Intel Inspector pour oneAPI versions antérieures à 2023.2.0 | ||
| Intel | N/A | Intel Integrated Performance Primitives 2021.9.0 | ||
| Intel | N/A | Micrologiciel du contrôleur Intel JHL8440 Thunderbolt 4 versions antérieures à 41 | ||
| Intel | N/A | Intel MAS software versions antérieures à 2.3 | ||
| Intel | N/A | Intel MPI Library software versions antérieures à 2021.11 | ||
| Intel | N/A | Intel MPI Library versions antérieures à 2021.10.0 | ||
| Intel | N/A | Intel OFU software versions antérieures à 14.1.31 | ||
| Intel | N/A | Intel Optane PMem 100 Series management software versions antérieures à 01.00.00.3547 | ||
| Intel | N/A | Intel Optane PMem 200 Series management software versions antérieures à 02.00.00.3915 | ||
| Intel | N/A | Intel Optane PMem 300 Series management software versions antérieures à 03.00.00.0483 | ||
| Intel | N/A | Intel Optimization pour TensorFlow versions antérieures à 2.13.0 | ||
| Intel | N/A | Intel PCM software versions antérieures à 202307 | ||
| Intel | N/A | Intel PM software toutes versions | ||
| Intel | N/A | Intel PROSet/Wireless Wi-Fi software versions antérieures à 22.240 | ||
| Intel | N/A | Intel Killer Wi-Fi software version antérieures à 3.1423.712 | ||
| Intel | N/A | Pilotes Intel QAT software pour Windows versions antérieures à QAT1.7-W-1.11.0 | ||
| Intel | N/A | Intel QSFP+ Configuration Utility software toutes versions | ||
| Intel | N/A | Intel SDK pour OpenCL Applications software toutes versions | ||
| Intel | N/A | Intel SGX DCAP software pour Windows versions antérieures à 1.19.100.3 | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E5_06.01.04.002.0 | ||
| Intel | N/A | Intel SSU software versions antérieures à 3.0.0.2 | ||
| Intel | N/A | Intel SUR software versions antérieures à 2.4.10587 | ||
| Intel | N/A | Intel System Usage Report pour Gameplay Software version 2.0.1901 | ||
| Intel | N/A | Pilote Intel Thunderbolt DCH pour Windows versions antérieures à 88 | ||
| Intel | N/A | Intel Trace Analyzer and Collector 2021.10.0 | ||
| Intel | N/A | Intel Unison software versions antérieures à C15 | ||
| Intel | N/A | Intel Unite Client software versions antérieures à 4.2.35041 | ||
| Intel | N/A | Intel VROC software versions antérieures à 8.0.8.1001 | ||
| Intel | N/A | Intel VTune Profiler pour oneAPI versions antérieures à 2023.2.0 | ||
| Intel | N/A | Intel XTU software versions antérieures à 7.12.0.29 | ||
| Intel | N/A | Intel oneAPI AI Analytics Toolkit 2023.2 | ||
| Intel | N/A | Intel oneAPI Base Toolkit versions antérieures à 2023.2.0 | ||
| Intel | N/A | Intel oneAPI Deep Neural Network Library versions antérieures à 2023.2.0 | ||
| Intel | N/A | Intel oneAPI HPC Toolkit versions antérieures à 2023.2.0 | ||
| Intel | N/A | Intel oneAPI IoT Toolkit versions antérieures à 2023.2.0. | ||
| Intel | N/A | Intel oneAPI Math Kernel Library versions antérieures à 2023.2.0. | ||
| Intel | N/A | Intel oneAPI Threading Building Blocks versions antérieures à 2021.10.0. | ||
| Intel | N/A | Intel oneAPI Toolkit et du programme d'installation des composants versions antérieures à 4.3.2 | ||
| Intel | N/A | Sapphire Rapids Eagle Stream avec les processeurs Intel Xeon Scalable de 4e génération versions antérieures à PLR4 Release |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ACAT software maintenu par Intel versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Arm DS software pour Intel SoC FPGA versions ant\u00e9rieures \u00e0 2022.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Tous les processeurs Intel Core de 6e, 7e, 8e ou 9e g\u00e9n\u00e9ration avec le pilote Intel Thunderbolt DCH toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Installation software pour Administrative Tools pour Intel Network Adapters versions ant\u00e9rieures \u00e0 28.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Installation software pour Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 28.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Installation software pour Intel Ethernet Connections Boot Utility, Preboot Images et pilotes EFI s versions ant\u00e9rieures \u00e0 28.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advisor pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Battery Life Diagnostic Tool software versions ant\u00e9rieures \u00e0 2.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Binary Configuration Tool software versions ant\u00e9rieures \u00e0 3.4.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CIP software versions ant\u00e9rieures \u00e0 2.4.10577",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Chipset Driver Software versions ant\u00e9rieures \u00e0 10.1.19444.8378",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Cluster Checker 2021.7.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA software versions ant\u00e9rieures \u00e0 23.4.33",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python 2023.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel ISPC versions ant\u00e9rieures \u00e0 1.21.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Inspector pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Integrated Performance Primitives 2021.9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel du contr\u00f4leur Intel JHL8440 Thunderbolt 4 versions ant\u00e9rieures \u00e0 41",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MAS software versions ant\u00e9rieures \u00e0 2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library software versions ant\u00e9rieures \u00e0 2021.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library versions ant\u00e9rieures \u00e0 2021.10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OFU software versions ant\u00e9rieures \u00e0 14.1.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Optane PMem 100 Series management software versions ant\u00e9rieures \u00e0 01.00.00.3547",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Optane PMem 200 Series management software versions ant\u00e9rieures \u00e0 02.00.00.3915",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Optane PMem 300 Series management software versions ant\u00e9rieures \u00e0 03.00.00.0483",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Optimization pour TensorFlow versions ant\u00e9rieures \u00e0 2.13.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PCM software versions ant\u00e9rieures \u00e0 202307",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PM software toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless Wi-Fi software versions ant\u00e9rieures \u00e0 22.240",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer Wi-Fi software version ant\u00e9rieures \u00e0 3.1423.712",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Intel QAT software pour Windows versions ant\u00e9rieures \u00e0 QAT1.7-W-1.11.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QSFP+ Configuration Utility software toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SDK pour OpenCL Applications software toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX DCAP software pour Windows versions ant\u00e9rieures \u00e0 1.19.100.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E5_06.01.04.002.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSU software versions ant\u00e9rieures \u00e0 3.0.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SUR software versions ant\u00e9rieures \u00e0 2.4.10587",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel System Usage Report pour Gameplay Software version 2.0.1901",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel Thunderbolt DCH pour Windows versions ant\u00e9rieures \u00e0 88",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trace Analyzer and Collector 2021.10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Unison software versions ant\u00e9rieures \u00e0 C15",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Unite Client software versions ant\u00e9rieures \u00e0 4.2.35041",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VROC software versions ant\u00e9rieures \u00e0 8.0.8.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel XTU software versions ant\u00e9rieures \u00e0 7.12.0.29",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI AI Analytics Toolkit 2023.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2023.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Deep Neural Network Library versions ant\u00e9rieures \u00e0 2023.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2023.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI IoT Toolkit versions ant\u00e9rieures \u00e0 2023.2.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2023.2.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Threading Building Blocks versions ant\u00e9rieures \u00e0 2021.10.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Toolkit et du programme d\u0027installation des composants versions ant\u00e9rieures \u00e0 4.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Sapphire Rapids Eagle Stream avec les processeurs Intel Xeon Scalable de 4e g\u00e9n\u00e9ration versions ant\u00e9rieures \u00e0 PLR4 Release",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-27307",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27307"
},
{
"name": "CVE-2023-25174",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25174"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-34315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34315"
},
{
"name": "CVE-2023-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38135"
},
{
"name": "CVE-2023-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40161"
},
{
"name": "CVE-2023-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32280"
},
{
"name": "CVE-2022-43703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43703"
},
{
"name": "CVE-2023-39432",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39432"
},
{
"name": "CVE-2023-22293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22293"
},
{
"name": "CVE-2023-35121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35121"
},
{
"name": "CVE-2023-35062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35062"
},
{
"name": "CVE-2023-33870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33870"
},
{
"name": "CVE-2023-31189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31189"
},
{
"name": "CVE-2023-28396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28396"
},
{
"name": "CVE-2023-25073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25073"
},
{
"name": "CVE-2023-26596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26596"
},
{
"name": "CVE-2023-26592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26592"
},
{
"name": "CVE-2023-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28715"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2023-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38561"
},
{
"name": "CVE-2023-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38566"
},
{
"name": "CVE-2023-32647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32647"
},
{
"name": "CVE-2023-35769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35769"
},
{
"name": "CVE-2023-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28739"
},
{
"name": "CVE-2023-39425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39425"
},
{
"name": "CVE-2023-28407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28407"
},
{
"name": "CVE-2023-35060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35060"
},
{
"name": "CVE-2023-29153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29153"
},
{
"name": "CVE-2023-22390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22390"
},
{
"name": "CVE-2023-24542",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24542"
},
{
"name": "CVE-2022-43701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43701"
},
{
"name": "CVE-2023-41252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41252"
},
{
"name": "CVE-2023-27517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27517"
},
{
"name": "CVE-2023-26591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26591"
},
{
"name": "CVE-2023-28745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28745"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2023-27300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27300"
},
{
"name": "CVE-2023-24463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24463"
},
{
"name": "CVE-2023-35003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35003"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2023-25779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25779"
},
{
"name": "CVE-2023-39941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39941"
},
{
"name": "CVE-2023-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26585"
},
{
"name": "CVE-2023-27308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27308"
},
{
"name": "CVE-2023-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29162"
},
{
"name": "CVE-2023-24591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24591"
},
{
"name": "CVE-2023-34351",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34351"
},
{
"name": "CVE-2023-22342",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22342"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2023-36490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36490"
},
{
"name": "CVE-2023-25769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25769"
},
{
"name": "CVE-2023-41231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41231"
},
{
"name": "CVE-2022-43702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43702"
},
{
"name": "CVE-2023-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41091"
},
{
"name": "CVE-2023-36493",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36493"
},
{
"name": "CVE-2023-27301",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27301"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2023-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41090"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2023-30767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30767"
},
{
"name": "CVE-2023-31271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31271"
},
{
"name": "CVE-2023-22311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22311"
},
{
"name": "CVE-2023-32646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32646"
},
{
"name": "CVE-2023-42776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42776"
},
{
"name": "CVE-2023-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39932"
},
{
"name": "CVE-2023-25777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25777"
},
{
"name": "CVE-2023-22848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22848"
},
{
"name": "CVE-2023-25945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25945"
},
{
"name": "CVE-2023-24589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24589"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40154"
},
{
"name": "CVE-2023-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32618"
},
{
"name": "CVE-2023-27303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27303"
},
{
"name": "CVE-2023-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40156"
},
{
"name": "CVE-2023-24481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24481"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Intel\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01004 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01004.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00947 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00992 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00992.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00956 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00969 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00993 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00993.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00981 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00981.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01003 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01003.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00987 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00987.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01006 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00959 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00959.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01014 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01014.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00967 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00954 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00954.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00913 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00913.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01005 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01005.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00998 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00998.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00994 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00994.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00927 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00927.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00851 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00948 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00988 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01011 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00958 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00958.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00903 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00903.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01000 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01000.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00973 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00973.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00974 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00974.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00928 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00928.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00953 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00955 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00930 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00930.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00895 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00895.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00922 du 13 f\u00e9vrier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html"
}
]
}
CERTFR-2024-AVI-0017
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel HotKey Services for Windows 10 for Intel NUC P14E Laptop Element versions antérieures à 1.1.45 | ||
| Intel | N/A | Intel NUC sans les derniers correctifs de sécurité (se référer aux bulletins de sécurité de l'éditeur pour la liste complète des systèmes affectés) | ||
| Intel | N/A | Intel ISH driver for Windows 10 pour Intel NUC P14E Laptop Element versions antérieures à 5.4.1.4479 | ||
| Intel | N/A | les pilotes Intel HID Event Filter pour Windows 10 pour certains portables Intel NUC versions antérieures à 2.2.2.1 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel HotKey Services for Windows 10 for Intel NUC P14E Laptop Element versions ant\u00e9rieures \u00e0 1.1.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC sans les derniers correctifs de s\u00e9curit\u00e9 (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour la liste compl\u00e8te des syst\u00e8mes affect\u00e9s)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel ISH driver for Windows 10 pour Intel NUC P14E Laptop Element versions ant\u00e9rieures \u00e0 5.4.1.4479",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes Intel HID Event Filter pour Windows 10 pour certains portables Intel NUC versions ant\u00e9rieures \u00e0 2.2.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-32272",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32272"
},
{
"name": "CVE-2023-42429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42429"
},
{
"name": "CVE-2023-28722",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28722"
},
{
"name": "CVE-2023-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28738"
},
{
"name": "CVE-2023-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29244"
},
{
"name": "CVE-2023-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38587"
},
{
"name": "CVE-2023-42766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42766"
},
{
"name": "CVE-2023-29495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29495"
},
{
"name": "CVE-2023-28743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28743"
},
{
"name": "CVE-2023-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38541"
},
{
"name": "CVE-2023-32544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32544"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0017",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00964 du 09 janvier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00964.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01028 du 09 janvier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01028.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-01009 du 09 janvier 2024",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01009.html"
}
]
}
CERTFR-2023-AVI-0953
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel oneAPI Base Toolkit versions antérieures à 2023.1 | ||
| Intel | N/A | Utilitaire Intel Server Information Retrieval versions antérieures à 16.0.9 | ||
| Intel | N/A | Intel In-Band Manageability versions antérieures à 3.0.14 | ||
| Intel | N/A | Micrologiciels Intel Optane SSD et Intel Optane SSD DC | ||
| Intel | N/A | 8ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Intel OpenVINO Model Server versions antérieures à 2022.3 | ||
| Intel | N/A | Micrologiciel Intel NUC, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Intel MPI Library versions antérieures à 2021.9 | ||
| Intel | N/A | Intel oneAPI HPC Toolkit versions antérieures à 2023.1 | ||
| Intel | N/A | 11ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Intel OFU versions antérieures à 14.1.31 | ||
| Intel | N/A | Intel Unison sans le dernier correctif de sécurité | ||
| Intel | N/A | Micrologiciel Intel FPGA versions antérieures à 2.8.1 | ||
| Intel | N/A | Pilote Intel QAT pour Windows HW versions 2.x antérieures à 2.04 | ||
| Intel | N/A | Intel Arc RGB Controller versions antérieures à 1.06 | ||
| Intel | N/A | Pilotes Intel Arc & Iris Xe Graphics WHQL pour Windows versions antérieures à 31.0.101.4255 | ||
| Intel | N/A | Outil Intel Battery Life Diagnostic versions antérieures à 2.2.1 | ||
| Intel | N/A | Application Intel Support pour Android toutes versions | ||
| Intel | N/A | Application Intel Smart Campus pour Android versions antérieures à 9.4 | ||
| Intel | N/A | Intel Simics Simulator versions antérieures à 1.7.2 | ||
| Intel | N/A | Processeur Intel Atom, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Pilote pour Radeon RX Vega M (intégré dans les processeurs Intel Core) versions antérieures à 23.10.01.46 | ||
| Intel | N/A | 13ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | 12ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Logiciels pour Intel NUC | ||
| Intel | N/A | Processeur Intel Xeon D, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Intel RealSense Dynamic Calibration versions antérieures à 2.13.1.0 | ||
| Intel | N/A | Intel OpenVINO toolkit versions antérieures à 2023.0.0 | ||
| Intel | N/A | Intel Server Configuration Utility versions antérieures à 16.0.9 | ||
| Intel | N/A | Bibliothèque Intel QAT Library (QATlib) versions antérieures à 22.07.1 | ||
| Intel | N/A | Intel XTU versions antérieures à 7.12.0.15 | ||
| Intel | N/A | Intel Connectivity Performance Suite sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel QAT pour Linux versions antérieures à QAT20.L.1.0.40-00004 | ||
| Intel | N/A | Intel Inspector versions antérieures à 2023.1 | ||
| Intel | N/A | Processeur Intel Celeron, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | 10ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Intel On Demand Agent sans le dernier correctif de sécurité | ||
| Intel | N/A | Micrologiciels Intel Ethernet Adapters | ||
| Intel | N/A | Intel Chipset Device versions antérieures à 10.1.19444.8378 | ||
| Intel | N/A | Micrologiciels Intel Server Board et Server System | ||
| Intel | N/A | Pilote Intel QAT pour Windows HW versions 1.x antérieures à 1.10 | ||
| Intel | N/A | Intel DCM versions antérieures à 5.2 | ||
| Intel | N/A | Processeur Intel Pentium, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | Intel Advisor versions antérieures à 2023.1 | ||
| Intel | N/A | Intel Rapid Storage Technology versions antérieures à 16.8.5.1014.9 | ||
| Intel | N/A | Micrologiciels Intel Ethernet Controllers | ||
| Intel | N/A | Processeur Intel Server, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations | ||
| Intel | N/A | 9ème génération de processeur Intel Core, veuillez-vous réferer aux avis de l'éditeur pour plus d'Informations |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2023.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Utilitaire Intel Server Information Retrieval versions ant\u00e9rieures \u00e0 16.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel In-Band Manageability versions ant\u00e9rieures \u00e0 3.0.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciels Intel Optane SSD et Intel Optane SSD DC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "8\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OpenVINO Model Server versions ant\u00e9rieures \u00e0 2022.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel Intel NUC, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library versions ant\u00e9rieures \u00e0 2021.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2023.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "11\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OFU versions ant\u00e9rieures \u00e0 14.1.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Unison sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel Intel FPGA versions ant\u00e9rieures \u00e0 2.8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel QAT pour Windows HW versions 2.x ant\u00e9rieures \u00e0 2.04",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Arc RGB Controller versions ant\u00e9rieures \u00e0 1.06",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilotes Intel Arc \u0026 Iris Xe Graphics WHQL pour Windows versions ant\u00e9rieures \u00e0 31.0.101.4255",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Outil Intel Battery Life Diagnostic versions ant\u00e9rieures \u00e0 2.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Application Intel Support pour Android toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Application Intel Smart Campus pour Android versions ant\u00e9rieures \u00e0 9.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Simics Simulator versions ant\u00e9rieures \u00e0 1.7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Atom, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote pour Radeon RX Vega M (int\u00e9gr\u00e9 dans les processeurs Intel Core) versions ant\u00e9rieures \u00e0 23.10.01.46",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "13\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "12\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Logiciels pour Intel NUC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Xeon D, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RealSense Dynamic Calibration versions ant\u00e9rieures \u00e0 2.13.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OpenVINO toolkit versions ant\u00e9rieures \u00e0 2023.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Configuration Utility versions ant\u00e9rieures \u00e0 16.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Biblioth\u00e8que Intel QAT Library (QATlib) versions ant\u00e9rieures \u00e0 22.07.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel XTU versions ant\u00e9rieures \u00e0 7.12.0.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Connectivity Performance Suite sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QAT pour Linux versions ant\u00e9rieures \u00e0 QAT20.L.1.0.40-00004",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Inspector versions ant\u00e9rieures \u00e0 2023.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "10\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel On Demand Agent sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciels Intel Ethernet Adapters",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Chipset Device versions ant\u00e9rieures \u00e0 10.1.19444.8378",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciels Intel Server Board et Server System",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Pilote Intel QAT pour Windows HW versions 1.x ant\u00e9rieures \u00e0 1.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DCM versions ant\u00e9rieures \u00e0 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advisor versions ant\u00e9rieures \u00e0 2023.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rapid Storage Technology versions ant\u00e9rieures \u00e0 16.8.5.1014.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciels Intel Ethernet Controllers",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Server, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "9\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l\u0027\u00e9diteur pour plus d\u0027Informations",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28388"
},
{
"name": "CVE-2023-25756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25756"
},
{
"name": "CVE-2023-29504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29504"
},
{
"name": "CVE-2023-32661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32661"
},
{
"name": "CVE-2022-41700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41700"
},
{
"name": "CVE-2022-43477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43477"
},
{
"name": "CVE-2023-39230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39230"
},
{
"name": "CVE-2023-33878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33878"
},
{
"name": "CVE-2022-24379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24379"
},
{
"name": "CVE-2023-32204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32204"
},
{
"name": "CVE-2023-28401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28401"
},
{
"name": "CVE-2023-27513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27513"
},
{
"name": "CVE-2023-38411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38411"
},
{
"name": "CVE-2023-28740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28740"
},
{
"name": "CVE-2023-27519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27519"
},
{
"name": "CVE-2023-36860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36860"
},
{
"name": "CVE-2023-39221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39221"
},
{
"name": "CVE-2023-32655",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32655"
},
{
"name": "CVE-2023-27879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27879"
},
{
"name": "CVE-2023-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24587"
},
{
"name": "CVE-2022-46298",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46298"
},
{
"name": "CVE-2023-28378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28378"
},
{
"name": "CVE-2023-22663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22663"
},
{
"name": "CVE-2023-22327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22327"
},
{
"name": "CVE-2022-43666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43666"
},
{
"name": "CVE-2023-22292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22292"
},
{
"name": "CVE-2023-22337",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22337"
},
{
"name": "CVE-2022-34302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34302"
},
{
"name": "CVE-2022-27229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27229"
},
{
"name": "CVE-2023-25075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25075"
},
{
"name": "CVE-2023-28377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28377"
},
{
"name": "CVE-2023-28737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28737"
},
{
"name": "CVE-2023-32279",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32279"
},
{
"name": "CVE-2023-22290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22290"
},
{
"name": "CVE-2023-39411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39411"
},
{
"name": "CVE-2023-39228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39228"
},
{
"name": "CVE-2023-34350",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34350"
},
{
"name": "CVE-2023-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33874"
},
{
"name": "CVE-2023-28723",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28723"
},
{
"name": "CVE-2023-28404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28404"
},
{
"name": "CVE-2023-20568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20568"
},
{
"name": "CVE-2021-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46748"
},
{
"name": "CVE-2023-28397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28397"
},
{
"name": "CVE-2023-22310",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22310"
},
{
"name": "CVE-2023-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29157"
},
{
"name": "CVE-2023-22448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22448"
},
{
"name": "CVE-2023-27306",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27306"
},
{
"name": "CVE-2023-26589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26589"
},
{
"name": "CVE-2022-34301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34301"
},
{
"name": "CVE-2023-40540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40540"
},
{
"name": "CVE-2023-25071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25071"
},
{
"name": "CVE-2023-22285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22285"
},
{
"name": "CVE-2023-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24588"
},
{
"name": "CVE-2023-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34997"
},
{
"name": "CVE-2023-28376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28376"
},
{
"name": "CVE-2023-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29165"
},
{
"name": "CVE-2022-29262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29262"
},
{
"name": "CVE-2022-41689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41689"
},
{
"name": "CVE-2023-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40220"
},
{
"name": "CVE-2022-36396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36396"
},
{
"name": "CVE-2022-36377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36377"
},
{
"name": "CVE-2023-20567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20567"
},
{
"name": "CVE-2023-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38570"
},
{
"name": "CVE-2022-36374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36374"
},
{
"name": "CVE-2022-33945",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33945"
},
{
"name": "CVE-2022-46301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46301"
},
{
"name": "CVE-2023-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38131"
},
{
"name": "CVE-2022-46299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46299"
},
{
"name": "CVE-2023-31203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31203"
},
{
"name": "CVE-2022-41659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41659"
},
{
"name": "CVE-2023-23583",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23583"
},
{
"name": "CVE-2023-27305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27305"
},
{
"name": "CVE-2023-32660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32660"
},
{
"name": "CVE-2023-32638",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32638"
},
{
"name": "CVE-2023-34431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34431"
},
{
"name": "CVE-2023-32278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32278"
},
{
"name": "CVE-2023-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22329"
},
{
"name": "CVE-2023-33872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33872"
},
{
"name": "CVE-2022-33898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33898"
},
{
"name": "CVE-2023-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29161"
},
{
"name": "CVE-2023-32658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32658"
},
{
"name": "CVE-2022-46646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46646"
},
{
"name": "CVE-2023-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32283"
},
{
"name": "CVE-2023-31273",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31273"
},
{
"name": "CVE-2022-46647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46647"
},
{
"name": "CVE-2022-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29510"
},
{
"name": "CVE-2023-25080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25080"
},
{
"name": "CVE-2023-22305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22305"
},
{
"name": "CVE-2023-28741",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28741"
},
{
"name": "CVE-2023-25952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25952"
},
{
"name": "CVE-2023-25949",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25949"
},
{
"name": "CVE-2023-32641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32641"
},
{
"name": "CVE-2023-22313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22313"
},
{
"name": "CVE-2022-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45469"
},
{
"name": "CVE-2023-34314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34314"
},
{
"name": "CVE-2022-34303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34303"
},
{
"name": "CVE-2023-39412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39412"
},
{
"name": "CVE-2022-42879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42879"
},
{
"name": "CVE-2022-45109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45109"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0953",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel du 14 novembre 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/default.html"
}
]
}
CERTFR-2023-AVI-0422
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Intel HDMI Firmware Update Tool. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel HDMI Firmware Update Tool pour NUC versions ant\u00e9rieures \u00e0 1.79.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-40971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40971"
},
{
"name": "CVE-2022-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21162"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0422",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-31T00:00:00.000000"
},
{
"description": "Clarification du produit affect\u00e9",
"revision_date": "2023-06-01T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eIntel HDMI Firmware Update Tool\u003c/span\u003e. Elles permettent\n\u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel HDMI Firmware Update Tool",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00833 du 09 mai 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00833.html"
}
]
}
CERTFR-2023-AVI-0127
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Intel. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une élévation de privilèges, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Distribution pour le langage de programmation Python versions antérieures à 2022.1 | ||
| Intel | N/A | Intel SUR versions antérieures à 2.4.8902 | ||
| Intel | N/A | Intel Trace Analyzer and Collector versions antérieures à 2021.5 | ||
| Intel | N/A | Intel DSA versions antérieures à 22.4.26 | ||
| Intel | N/A | Intel oneAPI DPC++/C++ Compiler Runtime versions antérieures à 2022.0 | ||
| Intel | N/A | Les processeurs Intel dont la liste est mentionnée dans les liens des fabriquants de la section Documentation. | ||
| Intel | N/A | Intel OpenBMC versions antérieures à 0.72 | ||
| Intel | N/A | Micrologiciel Intel BMC versions antérieures à 2.86 | ||
| Intel | N/A | Intel CVAT versions antérieures à 2.0.1 | ||
| Intel | N/A | Les pilotes Intel Ethernet 500 Series Controller pour VMWare versions antérieures à 1.10.0.13 | ||
| Intel | N/A | Intel FPGA Add-on pour Intel oneAPI Toolkits versions antérieures à 2022.2 | ||
| Intel | N/A | Intel oneAPI Collective Communications Library (oneCCL) versions antérieures à 2021.6 | ||
| Intel | N/A | Intel oneAPI Data Analytics Library versions antérieures à 2021.5 | ||
| Intel | N/A | Intel Integrated Sensor Solution versions antérieures à 5.4.1.4479 | ||
| Intel | N/A | Intel C++ Compiler Classic versions antérieures à 2021.6 | ||
| Intel | N/A | Intel oneAPI Toolkits versions antérieures à 2022.2 | ||
| Intel | N/A | Intel Media SDK versions antérieures à 22.2.2 | ||
| Intel | N/A | Micrologiciel Intel BMC versions antérieures à 2.78 | ||
| Intel | N/A | Intel FCS server versions antérieures à 1.1.79.3 | ||
| Intel | N/A | Intel oneAPI DPC++/C++ Compiler versions antérieures à 2022.1 | ||
| Intel | N/A | Intel oneAPI Deep Neural Network (oneDNN) versions antérieures à 2022.1 | ||
| Intel | N/A | Intel Integrated Sensor Solution versions antérieures à 5.4.2.4579v3 | ||
| Intel | N/A | Intel Battery Life Diagnostic Tool versions antérieures à 2.2.0 | ||
| Intel | N/A | Les pilotes Intel Iris Xe MAX pour Windows versions antérieures à 100.0.5.1474 | ||
| Intel | N/A | Intel OpenBMC versions antérieures à egs-0.91-179 | ||
| Intel | N/A | Intel OFU versions antérieures à 14.1.28 | ||
| Intel | N/A | Intel MPI Library pour Intel oneAPI HPC Toolkit versions antérieures à 2021.6 | ||
| Intel | N/A | Intel Quartus Prime Pro edition versions antérieures à 22.2 | ||
| Intel | N/A | Intel Integrated Sensor Solution versions antérieures à 5.0.0.4143 | ||
| Intel | N/A | Intel E810 Ethernet Controllers and Adapters versions antérieures à 1.7.0.8 | ||
| Intel | N/A | Intel OpenBMC versions antérieures à wht-1.01-61 | ||
| Intel | N/A | Les pilotes Intel QAT pour Linux versions antérieures à 4.17 | ||
| Intel | N/A | Intel QATzip versions antérieures à 1.0.9 | ||
| Intel | N/A | Intel Administrative Tools pour Intel Network Adapters versions antérieures à 27.3 | ||
| Intel | N/A | Intel Quartus Prime Standard Edition versions antérieures à 21.1 | ||
| Intel | N/A | Intel SGX SDK software pour Linux versions antérieures à 2.16.100.1 | ||
| Intel | N/A | Intel Open CAS versions antérieures à 22.3.1 | ||
| Intel | N/A | Intel Quartus Prime Pro Edition versions antérieures à 21.3 | ||
| Intel | N/A | Intel EMA versions antérieures à 1.8.1.0 | ||
| Intel | N/A | Micrologiciel Intel BMC versions antérieures à 2.09 | ||
| Intel | N/A | Les applications Android Intel ON Event Series versions antérieures à 2.0 | ||
| Intel | N/A | Intel SGX SDK software pour Windows versions antérieures à 2.15.100.1 | ||
| Intel | N/A | Intel Quartus Prime Standard edition versions antérieures à 22.1STD | ||
| Intel | N/A | Intel 700 Series Ethernet Controllers and Adapters versions antérieures à 9.101 | ||
| Intel | N/A | Intel Non-Volatile Memory (NVM) Update Utility pour Intel Ethernet Network Adapter E810 Series versions antérieures à 4.01 | ||
| Intel | N/A | Intel SPS firmware versions antérieures à SPS_E3_06.00.03.300.0 | ||
| Intel | N/A | Intel oneapi-cli pour Intel oneAPI Toolkits versions antérieures à 0.2.0 | ||
| Intel | N/A | Intel Crypto API Toolkit pour Intel SGX versions antérieures à 2.0 ID commit 91ee496 | ||
| Intel | N/A | Les pilotes Intel QAT pour Windows versions antérieures à 1.6 | ||
| Intel | N/A | Intel SPS firmware versions antérieures à SPS_E5_04.04.04.300.0 | ||
| Intel | N/A | Intel FPGA SDK pour OpenCL Pro Edition versions antérieures à 22.1 | ||
| Intel | N/A | Les pilotes Intel Ethernet Controller Administrative Tools pour Windows versions antérieures à 1.5.0.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Distribution pour le langage de programmation Python versions ant\u00e9rieures \u00e0 2022.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SUR versions ant\u00e9rieures \u00e0 2.4.8902",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trace Analyzer and Collector versions ant\u00e9rieures \u00e0 2021.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 22.4.26",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI DPC++/C++ Compiler Runtime versions ant\u00e9rieures \u00e0 2022.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les processeurs Intel dont la liste est mentionn\u00e9e dans les liens des fabriquants de la section Documentation.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OpenBMC versions ant\u00e9rieures \u00e0 0.72",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel Intel BMC versions ant\u00e9rieures \u00e0 2.86",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CVAT versions ant\u00e9rieures \u00e0 2.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les pilotes Intel Ethernet 500 Series Controller pour VMWare versions ant\u00e9rieures \u00e0 1.10.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel FPGA Add-on pour Intel oneAPI Toolkits versions ant\u00e9rieures \u00e0 2022.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Collective Communications Library (oneCCL) versions ant\u00e9rieures \u00e0 2021.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Data Analytics Library versions ant\u00e9rieures \u00e0 2021.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Integrated Sensor Solution versions ant\u00e9rieures \u00e0 5.4.1.4479",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel C++ Compiler Classic versions ant\u00e9rieures \u00e0 2021.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Toolkits versions ant\u00e9rieures \u00e0 2022.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Media SDK versions ant\u00e9rieures \u00e0 22.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel Intel BMC versions ant\u00e9rieures \u00e0 2.78",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel FCS server versions ant\u00e9rieures \u00e0 1.1.79.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2022.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI Deep Neural Network (oneDNN) versions ant\u00e9rieures \u00e0 2022.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Integrated Sensor Solution versions ant\u00e9rieures \u00e0 5.4.2.4579v3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 2.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les pilotes Intel Iris Xe MAX pour Windows versions ant\u00e9rieures \u00e0 100.0.5.1474",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OpenBMC versions ant\u00e9rieures \u00e0 egs-0.91-179",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OFU versions ant\u00e9rieures \u00e0 14.1.28",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel MPI Library pour Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2021.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Pro edition versions ant\u00e9rieures \u00e0 22.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Integrated Sensor Solution versions ant\u00e9rieures \u00e0 5.0.0.4143",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel E810 Ethernet Controllers and Adapters versions ant\u00e9rieures \u00e0 1.7.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel OpenBMC versions ant\u00e9rieures \u00e0 wht-1.01-61",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les pilotes Intel QAT pour Linux versions ant\u00e9rieures \u00e0 4.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QATzip versions ant\u00e9rieures \u00e0 1.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Administrative Tools pour Intel Network Adapters versions ant\u00e9rieures \u00e0 27.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Standard Edition versions ant\u00e9rieures \u00e0 21.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK software pour Linux versions ant\u00e9rieures \u00e0 2.16.100.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Open CAS versions ant\u00e9rieures \u00e0 22.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Pro Edition versions ant\u00e9rieures \u00e0 21.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel EMA versions ant\u00e9rieures \u00e0 1.8.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel Intel BMC versions ant\u00e9rieures \u00e0 2.09",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les applications Android Intel ON Event Series versions ant\u00e9rieures \u00e0 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK software pour Windows versions ant\u00e9rieures \u00e0 2.15.100.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Standard edition versions ant\u00e9rieures \u00e0 22.1STD",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 700 Series Ethernet Controllers and Adapters versions ant\u00e9rieures \u00e0 9.101",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Non-Volatile Memory (NVM) Update Utility pour Intel Ethernet Network Adapter E810 Series versions ant\u00e9rieures \u00e0 4.01",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS firmware versions ant\u00e9rieures \u00e0 SPS_E3_06.00.03.300.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneapi-cli pour Intel oneAPI Toolkits versions ant\u00e9rieures \u00e0 0.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Crypto API Toolkit pour Intel SGX versions ant\u00e9rieures \u00e0 2.0 ID commit 91ee496",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les pilotes Intel QAT pour Windows versions ant\u00e9rieures \u00e0 1.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS firmware versions ant\u00e9rieures \u00e0 SPS_E5_04.04.04.300.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel FPGA SDK pour OpenCL Pro Edition versions ant\u00e9rieures \u00e0 22.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les pilotes Intel Ethernet Controller Administrative Tools pour Windows versions ant\u00e9rieures \u00e0 1.5.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-34346",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34346"
},
{
"name": "CVE-2022-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26840"
},
{
"name": "CVE-2022-29514",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29514"
},
{
"name": "CVE-2022-32971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32971"
},
{
"name": "CVE-2021-33104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33104"
},
{
"name": "CVE-2022-33972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33972"
},
{
"name": "CVE-2022-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21163"
},
{
"name": "CVE-2022-32575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32575"
},
{
"name": "CVE-2022-26421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26421"
},
{
"name": "CVE-2022-30539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30539"
},
{
"name": "CVE-2022-33964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33964"
},
{
"name": "CVE-2022-29523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29523"
},
{
"name": "CVE-2022-36348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36348"
},
{
"name": "CVE-2022-36369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36369"
},
{
"name": "CVE-2022-34157",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34157"
},
{
"name": "CVE-2022-26345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26345"
},
{
"name": "CVE-2022-25992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25992"
},
{
"name": "CVE-2022-26888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26888"
},
{
"name": "CVE-2022-30339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30339"
},
{
"name": "CVE-2022-34864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34864"
},
{
"name": "CVE-2022-26032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26032"
},
{
"name": "CVE-2021-39295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39295"
},
{
"name": "CVE-2022-30692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30692"
},
{
"name": "CVE-2022-36398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36398"
},
{
"name": "CVE-2022-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30704"
},
{
"name": "CVE-2022-35729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35729"
},
{
"name": "CVE-2022-26425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26425"
},
{
"name": "CVE-2022-41314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41314"
},
{
"name": "CVE-2022-36397",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36397"
},
{
"name": "CVE-2022-34849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34849"
},
{
"name": "CVE-2022-25987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25987"
},
{
"name": "CVE-2022-31476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31476"
},
{
"name": "CVE-2022-36287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36287"
},
{
"name": "CVE-2022-32231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32231"
},
{
"name": "CVE-2022-26052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26052"
},
{
"name": "CVE-2022-21216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21216"
},
{
"name": "CVE-2022-36289",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36289"
},
{
"name": "CVE-2022-30530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30530"
},
{
"name": "CVE-2022-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26837"
},
{
"name": "CVE-2022-29493",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29493"
},
{
"name": "CVE-2022-35883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35883"
},
{
"name": "CVE-2022-25905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25905"
},
{
"name": "CVE-2022-34854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34854"
},
{
"name": "CVE-2022-33190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33190"
},
{
"name": "CVE-2022-36794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36794"
},
{
"name": "CVE-2022-33902",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33902"
},
{
"name": "CVE-2022-37329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37329"
},
{
"name": "CVE-2022-37340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37340"
},
{
"name": "CVE-2022-26509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26509"
},
{
"name": "CVE-2022-32764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32764"
},
{
"name": "CVE-2022-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33196"
},
{
"name": "CVE-2022-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27170"
},
{
"name": "CVE-2022-26076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26076"
},
{
"name": "CVE-2021-39296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39296"
},
{
"name": "CVE-2022-34841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34841"
},
{
"name": "CVE-2022-36797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36797"
},
{
"name": "CVE-2022-38056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38056"
},
{
"name": "CVE-2022-36416",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36416"
},
{
"name": "CVE-2022-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34153"
},
{
"name": "CVE-2022-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32570"
},
{
"name": "CVE-2022-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27808"
},
{
"name": "CVE-2022-30531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30531"
},
{
"name": "CVE-2022-26062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26062"
},
{
"name": "CVE-2022-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38090"
},
{
"name": "CVE-2022-41614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41614"
},
{
"name": "CVE-2022-29494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29494"
},
{
"name": "CVE-2022-33892",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33892"
},
{
"name": "CVE-2022-36278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36278"
},
{
"name": "CVE-2022-26512",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26512"
},
{
"name": "CVE-2022-34843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34843"
},
{
"name": "CVE-2021-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0187"
},
{
"name": "CVE-2022-36382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36382"
},
{
"name": "CVE-2022-27234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27234"
},
{
"name": "CVE-2022-26343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26343"
},
{
"name": "CVE-2022-33946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33946"
},
{
"name": "CVE-2022-26841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26841"
},
{
"name": "CVE-2022-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26843"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0127",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eIntel\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\ncontournement de la politique de s\u00e9curit\u00e9, une \u00e9l\u00e9vation de privil\u00e8ges,\nun d\u00e9ni de service et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00674 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00714 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00714.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00700 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00767 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00770 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00770.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00751 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00751.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00776 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00776.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00728 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00728.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00731 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00731.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00738 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00726 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00717 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00733 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00733.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00764 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00764.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00762 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00762.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00737 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00761 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00761.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00736 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00736.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00718 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00718.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00725 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00725.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00754 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00754.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00765 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00765.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00677 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00677.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00730 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00739 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00739.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00769 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00769.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00727 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00727.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00746 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00746.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00729 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00750 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00750.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00721 du 14 f\u00e9vrier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00721.html"
}
]
}
CERTFR-2023-AVI-0017
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Intel oneAPI Toolkit. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel C++ Compiler Classic versions ant\u00e9rieures \u00e0 2021.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2022.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-41342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41342"
},
{
"name": "CVE-2022-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38136"
},
{
"name": "CVE-2022-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40196"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0017",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Intel oneAPI\nToolkit. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel oneAPI Toolkit",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00773 du 10 janvier 2023",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00773.html"
}
]
}
CERTFR-2022-AVI-1087
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Intel OpenIPC. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel OpenIPC binaries pour At-Scale Debug (ASD) sans le dernier correctif",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-1087",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Intel OpenIPC.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel OpenIPC",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00789 du 12 d\u00e9cembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00789.html"
}
]
}
CERTFR-2022-AVI-1078
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les micrologiciels Baseboard Management Controller (BMC) Intel. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Micrologiciel BMC pour la famille de cartes M70KLP2SB versions antérieures à 4.15 | ||
| Intel | N/A | Micrologiciel BMC pour la famille de cartes M10JNP2SB versions antérieures à 1.11 | ||
| Intel | N/A | Micrologiciel BMC pour la famille de cartes M20NTP versions antérieures à v0027 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Micrologiciel BMC pour la famille de cartes M70KLP2SB versions ant\u00e9rieures \u00e0 4.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel BMC pour la famille de cartes M10JNP2SB versions ant\u00e9rieures \u00e0 1.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Micrologiciel BMC pour la famille de cartes M20NTP versions ant\u00e9rieures \u00e0 v0027",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40242"
},
{
"name": "CVE-2022-2827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2827"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-1078",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les micrologiciels\nBaseboard Management Controller (BMC) Intel. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel du 05 d\u00e9cembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00801.html"
}
]
}
CERTFR-2022-AVI-1009
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel MC versions antérieures à 2.3.2 | ||
| Intel | N/A | Intel EMA versions antérieures à 1.7.1 | ||
| Intel | N/A | Intel Quartus Prime Pro edition software versions antérieures à 22.1 | ||
| Intel | N/A | Intel CSME versions antérieures à 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 | ||
| Intel | N/A | Intel PROSet/Wireless WiFi UEFI drivers versions antérieures à 2.2.14.22176 | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0 | ||
| Intel | N/A | Intel SDP Tool versions antérieures à 3.0.0 | ||
| Intel | N/A | Intel NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN et NUC7i7DN versions antérieures à 1.78.2.0.7. | ||
| Intel | N/A | Intel Advanced Link Analyzer Pro versions antérieures à 22.2 | ||
| Intel | N/A | PresentMon versions antérieures à 1.7.1 | ||
| Intel | N/A | Intel NUC Kit Wireless Adapter driver installer software versions antérieures à 22.40.0 | ||
| Intel | N/A | Intel SGX SDK software pour Linux versions antérieures à 2.18.100.1 | ||
| Intel | N/A | Intel Glorp gaming particle physics demonstration software version 1.0.0 | ||
| Intel | N/A | Les produits Intel vPRO CSME WiFi sans la dernière mise à jour | ||
| Intel | N/A | Intel Advanced Link Analyzer Standrad versions antérieures à 22.1.1 STD | ||
| Intel | N/A | Intel XMM 7560 Modem M.2 sans la dernière mise à jour | ||
| Intel | N/A | Intel Server System R1000WF, R200WF et Intel Server Board S2600WF sans la dernière mise à jour | ||
| Intel | N/A | Intel EMA versions antérieures à 1.8.0 | ||
| Intel | N/A | Intel Server Board M50CYP sans la dernière mise à jour | ||
| Intel | N/A | Intel PROSet/Wireless WiFi versions antérieures à 22.140 | ||
| Intel | N/A | Intel Processors sans la dernière mise à jour | ||
| Intel | N/A | Intel VTune Profiler software versions antérieures à 2022.2.0 | ||
| Intel | N/A | Intel NUC BIOS Firmware sans la dernière mise à jour | ||
| Intel | N/A | Intel Quartus Prime Standard edition software versions antérieures à 21.1 Patch 0.02std | ||
| Intel | N/A | Intel Server Board M10JNP sans la dernière mise à jour | ||
| Intel | N/A | Intel AMT versions antérieures à 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0 | ||
| Intel | N/A | Killer WiFi versions antérieures à 3.1122.3158 | ||
| Intel | N/A | Intel Distribution of OpenVINO Toolkit versions antérieures à 2021.4.2 | ||
| Intel | N/A | Intel SGX SDK software pour Windows versions antérieures à 2.17.100.1 | ||
| Intel | N/A | Intel AMT SDK versions antérieures à 16.0.4.1 | ||
| Intel | N/A | Hyperscan library versions antérieures à 5.4.0 | ||
| Intel | N/A | Intel System Studio toutes versions | ||
| Intel | N/A | Intel WAPI Security sans la dernière mise à jour | ||
| Intel | N/A | Intel DCM versions antérieures à 5.0 | ||
| Intel | N/A | Intel Support Android application versions antérieures à 22.02.28 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel MC versions ant\u00e9rieures \u00e0 2.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel EMA versions ant\u00e9rieures \u00e0 1.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Pro edition software versions ant\u00e9rieures \u00e0 22.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi UEFI drivers versions ant\u00e9rieures \u00e0 2.2.14.22176",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.01.04.700.0, SPS_E3_06.00.03.035.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SDP Tool versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN et NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advanced Link Analyzer Pro versions ant\u00e9rieures \u00e0 22.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "PresentMon versions ant\u00e9rieures \u00e0 1.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC Kit Wireless Adapter driver installer software versions ant\u00e9rieures \u00e0 22.40.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK software pour Linux versions ant\u00e9rieures \u00e0 2.18.100.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Glorp gaming particle physics demonstration software version 1.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les produits Intel vPRO CSME WiFi sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Advanced Link Analyzer Standrad versions ant\u00e9rieures \u00e0 22.1.1 STD",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel XMM 7560 Modem M.2 sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System R1000WF, R200WF et Intel Server Board S2600WF sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel EMA versions ant\u00e9rieures \u00e0 1.8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M50CYP sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieures \u00e0 22.140",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processors sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler software versions ant\u00e9rieures \u00e0 2022.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC BIOS Firmware sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Standard edition software versions ant\u00e9rieures \u00e0 21.1 Patch 0.02std",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M10JNP sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT versions ant\u00e9rieures \u00e0 11.8.93, 11.22.93, 12.0.92, 14.1.67, 15.0.42, 16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer WiFi versions ant\u00e9rieures \u00e0 3.1122.3158",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2021.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK software pour Windows versions ant\u00e9rieures \u00e0 2.17.100.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT SDK versions ant\u00e9rieures \u00e0 16.0.4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Hyperscan library versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel System Studio toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel WAPI Security sans la derni\u00e8re mise \u00e0 jour",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DCM versions ant\u00e9rieures \u00e0 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Support Android application versions ant\u00e9rieures \u00e0 22.02.28",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-27233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27233"
},
{
"name": "CVE-2022-27874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27874"
},
{
"name": "CVE-2022-36789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36789"
},
{
"name": "CVE-2022-36380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36380"
},
{
"name": "CVE-2022-33942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33942"
},
{
"name": "CVE-2022-37334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37334"
},
{
"name": "CVE-2022-36349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36349"
},
{
"name": "CVE-2022-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38099"
},
{
"name": "CVE-2022-27187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27187"
},
{
"name": "CVE-2022-30548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30548"
},
{
"name": "CVE-2022-26513",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26513"
},
{
"name": "CVE-2022-27497",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27497"
},
{
"name": "CVE-2021-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0185"
},
{
"name": "CVE-2021-33064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33064"
},
{
"name": "CVE-2022-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21198"
},
{
"name": "CVE-2022-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30691"
},
{
"name": "CVE-2022-36384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36384"
},
{
"name": "CVE-2022-26028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26028"
},
{
"name": "CVE-2022-32569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32569"
},
{
"name": "CVE-2022-25917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25917"
},
{
"name": "CVE-2022-26086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26086"
},
{
"name": "CVE-2022-28126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28126"
},
{
"name": "CVE-2022-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34152"
},
{
"name": "CVE-2022-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26341"
},
{
"name": "CVE-2022-26367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26367"
},
{
"name": "CVE-2022-26006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26006"
},
{
"name": "CVE-2022-21794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21794"
},
{
"name": "CVE-2022-26508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26508"
},
{
"name": "CVE-2022-33176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33176"
},
{
"name": "CVE-2022-26369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26369"
},
{
"name": "CVE-2022-33973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33973"
},
{
"name": "CVE-2022-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26845"
},
{
"name": "CVE-2021-33164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33164"
},
{
"name": "CVE-2021-33159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33159"
},
{
"name": "CVE-2022-37345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37345"
},
{
"name": "CVE-2022-27638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27638"
},
{
"name": "CVE-2022-36367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36367"
},
{
"name": "CVE-2022-36370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36370"
},
{
"name": "CVE-2022-26045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26045"
},
{
"name": "CVE-2022-26124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26124"
},
{
"name": "CVE-2022-36400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36400"
},
{
"name": "CVE-2022-28611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28611"
},
{
"name": "CVE-2022-35276",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35276"
},
{
"name": "CVE-2022-36377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36377"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2022-26079",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26079"
},
{
"name": "CVE-2021-26251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26251"
},
{
"name": "CVE-2022-29486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29486"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2022-27639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27639"
},
{
"name": "CVE-2022-29515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29515"
},
{
"name": "CVE-2022-29893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29893"
},
{
"name": "CVE-2022-27499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27499"
},
{
"name": "CVE-2022-30297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30297"
},
{
"name": "CVE-2022-30542",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30542"
},
{
"name": "CVE-2022-29466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29466"
},
{
"name": "CVE-2022-26024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26024"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00676 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00676.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00715 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00715.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00687 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00687.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00691 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00691.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00695 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00695.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00713 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00713.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00558 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00558.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00711 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00711.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00720 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00720.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00642 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00642.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00716 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00716.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00747 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00680 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00680.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00699 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00659 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00659.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00683 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00683.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00708 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00708.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00688 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00710 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00710.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00689 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00689.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00673 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00673.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00740 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00740.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00610 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html"
}
],
"reference": "CERTFR-2022-AVI-1009",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-11-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00752 du 08 novembre 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
}
]
}
CERTFR-2022-AVI-727
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel 722 Series Ethernet contrôleurs et adaptateurs versions antérieures à 1.5.5 | ||
| Intel | N/A | Intel Killer™ WiFi versions antérieures à 3.1122.1105 | ||
| Intel | N/A | Open AMT Cloud Toolkit versions antérieures à 2.0.2 et 2.2.2 | ||
| Intel | N/A | Intel E810 Ethernet contrôleurs et adaptateurs versions antérieures à 1.6.1.9 | ||
| Intel | N/A | Intel Support Android versions antérieures à 21.7.40 | ||
| Intel | N/A | Intel Team Blue toutes versions | ||
| Intel | N/A | Intel IPP Cryptography versions antérieures à 2021.5 | ||
| Intel | N/A | Intel VTune™ Profiler versions antérieures à 2022.2.0 | ||
| Intel | N/A | Intel Processors (veuillez vous référer aux avis de l'éditeur : intel-sa-00706 et intel-sa-00657) | ||
| Intel | N/A | Intel Edge Insights pour les versions Industrial antérieures à 2.6.1 | ||
| Intel | N/A | Intel Standard Manageability toutes versions | ||
| Intel | N/A | Intel Data Center Manager versions antérieures à 4.1 | ||
| Intel | N/A | Intel PROSet/Wireless WiFi versions antérieure à 22.120 | ||
| Intel | N/A | Intel Datacenter Group Event Android toutes versions | ||
| Intel | N/A | Intel SPS versions antérieures à SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0 | ||
| Intel | N/A | Intel Ethernet 700 Series Controller drivers pour les versions VMware antérieures à 2.1.5.0 | ||
| Intel | N/A | Intel 700 Series Ethernet contrôleurs et adaptateurs versions antérieures à 8.5 | ||
| Intel | N/A | Intel DSA versions antérieures 22.2.14 | ||
| Intel | N/A | Intel NUC9 Extreme Laptop kits versions antérieures à 2.2.0.22 | ||
| Intel | N/A | Intel Connect M Android versions antérieures à 1.7.4 | ||
| Intel | N/A | Intel HAXM versions antérieures à 7.7.1 | ||
| Intel | N/A | Intel Distribution pour Python versions antérieures à 2022.0.3 | ||
| Intel | N/A | Intel Killer™ Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel NUCs versions antérieures à BC0076 | ||
| Intel | N/A | Intel RST versions antérieures à 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003 | ||
| Intel | N/A | Intel SEAPI toutes versions | ||
| Intel | N/A | Intel Ethernet 500 Series Controller drivers pour les versions VMware antérieures à 1.11.4.0 | ||
| Intel | N/A | Intel Wireless Bluetooth versions antérieures à 22.120 | ||
| Intel | N/A | Intel AMT toutes versions | ||
| Intel | N/A | Intel Enpirion Digital Power Configurator GUI toutes versions | ||
| Intel | N/A | Intel Datacenter Group Event Advisory iOS toutes versions |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel 722 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 WiFi versions ant\u00e9rieures \u00e0 3.1122.1105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Open AMT Cloud Toolkit versions ant\u00e9rieures \u00e0 2.0.2 et 2.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel E810 Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 1.6.1.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Support Android versions ant\u00e9rieures \u00e0 21.7.40",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Team Blue toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2022.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processors (veuillez vous r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur : intel-sa-00706 et intel-sa-00657)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Edge Insights pour les versions Industrial ant\u00e9rieures \u00e0 2.6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Standard Manageability toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieure \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Android toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E3_04.08.04.330.0 et SPS_E3_04.01.04.530.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 700 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 2.1.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel 700 Series Ethernet contr\u00f4leurs et adaptateurs versions ant\u00e9rieures \u00e0 8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures 22.2.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC9 Extreme Laptop kits versions ant\u00e9rieures \u00e0 2.2.0.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Connect M Android versions ant\u00e9rieures \u00e0 1.7.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution pour Python versions ant\u00e9rieures \u00e0 2022.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Killer\u2122 Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUCs versions ant\u00e9rieures \u00e0 BC0076",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RST versions ant\u00e9rieures \u00e0 16.8.4.1011, 17.7.1.1010, 18.1.6.1039, 18.2.1.1008 et 18.3.0.1003",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SEAPI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Ethernet 500 Series Controller drivers pour les versions VMware ant\u00e9rieures \u00e0 1.11.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Wireless Bluetooth versions ant\u00e9rieures \u00e0 22.120",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel AMT toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Enpirion Digital Power Configurator GUI toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Datacenter Group Event Advisory iOS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-28696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28696"
},
{
"name": "CVE-2022-33209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33209"
},
{
"name": "CVE-2022-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21197"
},
{
"name": "CVE-2022-29507",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29507"
},
{
"name": "CVE-2022-28709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28709"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2022-21139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21139"
},
{
"name": "CVE-2022-27500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27500"
},
{
"name": "CVE-2022-34345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34345"
},
{
"name": "CVE-2022-30944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30944"
},
{
"name": "CVE-2022-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30601"
},
{
"name": "CVE-2022-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23182"
},
{
"name": "CVE-2021-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23179"
},
{
"name": "CVE-2022-21172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21172"
},
{
"name": "CVE-2022-26344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26344"
},
{
"name": "CVE-2022-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21160"
},
{
"name": "CVE-2022-34488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34488"
},
{
"name": "CVE-2022-21152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21152"
},
{
"name": "CVE-2021-33126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33126"
},
{
"name": "CVE-2022-26374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26374"
},
{
"name": "CVE-2022-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21793"
},
{
"name": "CVE-2021-23168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23168"
},
{
"name": "CVE-2022-27493",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27493"
},
{
"name": "CVE-2022-21225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21225"
},
{
"name": "CVE-2021-26950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26950"
},
{
"name": "CVE-2022-26017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26017"
},
{
"name": "CVE-2022-30296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30296"
},
{
"name": "CVE-2022-22730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22730"
},
{
"name": "CVE-2021-33847",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33847"
},
{
"name": "CVE-2022-25999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25999"
},
{
"name": "CVE-2022-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21812"
},
{
"name": "CVE-2022-26083",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26083"
},
{
"name": "CVE-2022-25841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25841"
},
{
"name": "CVE-2021-33060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33060"
},
{
"name": "CVE-2022-21181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21181"
},
{
"name": "CVE-2021-26254",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26254"
},
{
"name": "CVE-2022-25899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25899"
},
{
"name": "CVE-2021-44545",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44545"
},
{
"name": "CVE-2018-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1285"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2021-44470",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44470"
},
{
"name": "CVE-2022-25966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25966"
},
{
"name": "CVE-2022-28858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28858"
},
{
"name": "CVE-2022-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21140"
},
{
"name": "CVE-2022-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26844"
},
{
"name": "CVE-2022-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21212"
},
{
"name": "CVE-2021-33128",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33128"
},
{
"name": "CVE-2022-23403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23403"
},
{
"name": "CVE-2022-21229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21229"
},
{
"name": "CVE-2021-26257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26257"
},
{
"name": "CVE-2022-28697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28697"
},
{
"name": "CVE-2021-23188",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23188"
},
{
"name": "CVE-2022-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21807"
},
{
"name": "CVE-2022-32579",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32579"
},
{
"name": "CVE-2022-21148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21148"
},
{
"name": "CVE-2022-26074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26074"
},
{
"name": "CVE-2021-37409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37409"
},
{
"name": "CVE-2021-23223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23223"
},
{
"name": "CVE-2022-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21240"
},
{
"name": "CVE-2022-24378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24378"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-727",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00701.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00701.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00703.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00703.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00669.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00669.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00686.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00679.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00679.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00668.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00668.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00657.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00660.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00660.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00593.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00593.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00684.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00684.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00653.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00653.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00658.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00658.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00709.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00621.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00672.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00672.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00628.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00596.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00596.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00665.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00655.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00655.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00712.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00712.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00678.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00678.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00667.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00667.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00705.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00705.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00706.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00694.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00694.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00650.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00650.html.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00662.html du 09 ao\u00fbt 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00662.html.html"
}
]
}
CERTFR-2022-AVI-552
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel SGX DCAP pour Linux versions antérieures à 1.14.100.3 | ||
| Intel | N/A | Intel SGX PSW pour Windows versions antérieures à 2.16.100.3 | ||
| Intel | N/A | Intel SGX SDK pour Linux versions antérieures à 2.17.100.3 | ||
| Intel | N/A | Toutes les processeurs Intel | ||
| Intel | N/A | Intel SGX DCAP pour Windows versions antérieures à 1.14.100.3 | ||
| Intel | N/A | Intel SGX SDK pour Windows versions antérieures à 2.16.100.3 | ||
| Intel | N/A | Intel SGX PSW pour Linux versions antérieures à 2.17.100.3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel SGX DCAP pour Linux versions ant\u00e9rieures \u00e0 1.14.100.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX PSW pour Windows versions ant\u00e9rieures \u00e0 2.16.100.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK pour Linux versions ant\u00e9rieures \u00e0 2.17.100.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Toutes les processeurs Intel",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX DCAP pour Windows versions ant\u00e9rieures \u00e0 1.14.100.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX SDK pour Windows versions ant\u00e9rieures \u00e0 2.16.100.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX PSW pour Linux versions ant\u00e9rieures \u00e0 2.17.100.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-24436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24436"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-552",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00615 du 14 juin 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00698 du 14 juin 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00698.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00645 du 14 juin 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00645.html"
}
]
}
CERTFR-2022-AVI-222
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Famille de processeurs Intel Xeon W-1300 | ||
| Intel | N/A | Processeurs Intel Celeron Séries N | ||
| Intel | N/A | Famille de processeurs Intel Xeon W | ||
| Intel | N/A | Séries de processeurs Intel Pentium Gold (44XX et 65XX) | ||
| Intel | N/A | Séries de processeurs Intel Pentium Gold | ||
| Intel | N/A | Séries de processeurs Intel Atom C3000 | ||
| Intel | N/A | Famille de processeurs Intel Xeon D | ||
| Intel | N/A | Séries de chipsets Intel 300 | ||
| Intel | N/A | Séries de chipsets Intel C240 | ||
| Intel | N/A | Séries de processeurs Intel Celeron J4000/N4000 | ||
| Intel | N/A | Processeurs Intel Celeron séries J | ||
| Intel | N/A | Famille de processeurs Intel Celeron | ||
| Intel | N/A | Famille de processeurs Intel Core | ||
| Intel | N/A | Famille de processeurs Intel Xeon Scalable 2nde génération | ||
| Intel | N/A | Famille de processeurs Intel Core 8ème génération | ||
| Intel | N/A | Séries de chipsets Intel 200 | ||
| Intel | N/A | Famille de processeurs Intel Core 9ème génération | ||
| Intel | N/A | Famille de processeurs Intel Core 10ème génération | ||
| Intel | N/A | Famille de processeurs Intel Core 12ème génération | ||
| Intel | N/A | Processeurs Intel Atom C3000 Automated Driving series | ||
| Intel | N/A | Séries de processeurs Intel Celeron 4000 (42XX et 43XX) | ||
| Intel | N/A | Séries de processeurs Intel Pentium J5000/N5000 | ||
| Intel | N/A | Famille de processeurs Intel Core 6ème génération | ||
| Intel | N/A | Séries de chipsets Intel C230 | ||
| Intel | N/A | Séries de chipsets Intel C620 | ||
| Intel | N/A | Séries de processeurs Intel Xeon D 2000 | ||
| Intel | N/A | Famille de processeurs Intel Core 7ème génération | ||
| Intel | N/A | Séries de processeurs Intel Pentium Gold (54XX) | ||
| Intel | N/A | Séries de processeurs Intel Celeron 3000 (38XX et 39XX) | ||
| Intel | N/A | Séries de processeurs Intel Pentium 4000 (44XX) | ||
| Intel | N/A | Séries de processeurs Intel Atom X E3900 | ||
| Intel | N/A | Famille de processeurs Intel Core X | ||
| Intel | N/A | Séries de processeurs Intel X299 | ||
| Intel | N/A | Processeurs Intel Core avec technologie Intel Hybrid | ||
| Intel | N/A | Séries A Intel Atom | ||
| Intel | N/A | Processeurs Intel Atom | ||
| Intel | N/A | Séries de processeurs Intel Celeron J3000/N3000 | ||
| Intel | N/A | Famille de processeurs Intel Xeon Scalable 3ème génération | ||
| Intel | N/A | Famille de processeurs Intel Core 11ème génération | ||
| Intel | N/A | Famille de processeurs Intel Xeon E-2300 | ||
| Intel | N/A | Séries de processeurs Intel Celeron 5000 | ||
| Intel | N/A | Séries de chipsets Intel C420 | ||
| Intel | N/A | Famille de processeurs Intel Xeon | ||
| Intel | N/A | Famille de processeurs Intel Xeon E 9ème génération | ||
| Intel | N/A | Séries de chipsets Intel 100 | ||
| Intel | N/A | Processeurs Intel Pentium séries Silver |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Famille de processeurs Intel Xeon W-1300",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Celeron S\u00e9ries N",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon W",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium Gold (44XX et 65XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium Gold",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Atom C3000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon D",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel 300",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C240",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron J4000/N4000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Celeron s\u00e9ries J",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Celeron",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon Scalable 2nde g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 8\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel 200",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 9\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 10\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 12\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Atom C3000 Automated Driving series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron 4000 (42XX et 43XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium J5000/N5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 6\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C230",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C620",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Xeon D 2000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 7\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium Gold (54XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron 3000 (38XX et 39XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Pentium 4000 (44XX)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Atom X E3900",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core X",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel X299",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Core avec technologie Intel Hybrid",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries A Intel Atom",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Atom",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron J3000/N3000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon Scalable 3\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Core 11\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon E-2300",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de processeurs Intel Celeron 5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel C420",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Famille de processeurs Intel Xeon E 9\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "S\u00e9ries de chipsets Intel 100",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeurs Intel Pentium s\u00e9ries Silver",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33150",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33150"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-222",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel sa-00609 du 08 mars 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel sa-00598 du 08 mars 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
}
]
}
CERTFR-2022-AVI-127
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Se r\u00e9f\u00e9rer aux avis de l\u0027\u00e9diteur pour la liste compl\u00e8te des produits affect\u00e9s",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21218"
},
{
"name": "CVE-2021-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0119"
},
{
"name": "CVE-2022-21133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21133"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2021-0125",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0125"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2021-0091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0091"
},
{
"name": "CVE-2022-21205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21205"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2021-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0156"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2022-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21204"
},
{
"name": "CVE-2021-33147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33147"
},
{
"name": "CVE-2021-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0107"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2021-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0124"
},
{
"name": "CVE-2021-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0169"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2021-33129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33129"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2021-0093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0093"
},
{
"name": "CVE-2022-21174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21174"
},
{
"name": "CVE-2021-33137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33137"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2021-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0144"
},
{
"name": "CVE-2022-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21226"
},
{
"name": "CVE-2021-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0117"
},
{
"name": "CVE-2021-0103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0103"
},
{
"name": "CVE-2021-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0116"
},
{
"name": "CVE-2021-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0179"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2021-0092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0092"
},
{
"name": "CVE-2021-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0115"
},
{
"name": "CVE-2021-0099",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0099"
},
{
"name": "CVE-2021-33166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33166"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2021-44454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44454"
},
{
"name": "CVE-2021-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0060"
},
{
"name": "CVE-2021-33119",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33119"
},
{
"name": "CVE-2021-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0147"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2021-0127",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0127"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2021-0163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0163"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2021-33101",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33101"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2021-33107",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33107"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2021-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0162"
},
{
"name": "CVE-2022-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21157"
},
{
"name": "CVE-2021-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0167"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2022-21153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21153"
},
{
"name": "CVE-2021-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0118"
},
{
"name": "CVE-2021-0178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0178"
},
{
"name": "CVE-2021-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0145"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2021-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0111"
},
{
"name": "CVE-2022-21220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21220"
},
{
"name": "CVE-2021-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33068"
},
{
"name": "CVE-2021-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0171"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2022-21156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21156"
},
{
"name": "CVE-2021-33120",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33120"
},
{
"name": "CVE-2021-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0177"
},
{
"name": "CVE-2022-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21203"
},
{
"name": "CVE-2021-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0114"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2021-23152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23152"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-127",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00589 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00607 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00607.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00581 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00527 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00591 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00591.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00539 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00532 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00639 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00639.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00582 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00588 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00588.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00594 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00594.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00470 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00561 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00622 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00622.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00575 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00575.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00632 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00632.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00599 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00599.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00574 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00574.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00571 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00571.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00604 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00608 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00608.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00600 du 08 f\u00e9vrier 2022",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00600.html"
}
]
}
CERTFR-2021-AVI-858
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | 10th Generation Intel® Core™ Processors | ||
| Intel | N/A | 11th Generation Intel® Core™ Processors | ||
| Intel | N/A | 3rd Generation Intel® Xeon® Scalable Processors | ||
| Intel | N/A | 700-series Ethernet Adapters | ||
| Intel | N/A | 7th Generation Intel® Core™ Processors | ||
| Intel | N/A | 810-series Ethernet Adapters | ||
| Intel | N/A | All Intel® oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions antérieures à 2021.1 Beta 10. | ||
| Intel | N/A | Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 août 2021. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver pour Windows versions antérieures à 1.4.0.15. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver installer pour Windows versions antérieures à 1.4.0.21. | ||
| Intel | N/A | Intel® Atom® Processor A Series | ||
| Intel | N/A | Intel® Atom® Processor C3000 | ||
| Intel | N/A | Intel® Atom® Processor E3900 Series | ||
| Intel | N/A | Intel® Battery Life Diagnostic Tool versions antérieures à 1.2. | ||
| Intel | N/A | Intel® Celeron® Processor J Series, N Series | ||
| Intel | N/A | Intel® Celeron® Processor N Series | ||
| Intel | N/A | Intel® Core™ i5-8305G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel® Core™ i7-8706G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel® Core™ X-series Processors | ||
| Intel | N/A | Intel® Distribution of OpenVINO™ Toolkit versions antérieures à 2021.4. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3165 | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3168 | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8260 | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8265 | ||
| Intel | N/A | Intel® EMA versions antérieures à 1.5.0. | ||
| Intel | N/A | Intel® Ethernet 500 Series Controllers driver pour Linux versions antérieures à 3.17.3. | ||
| Intel | N/A | Intel® Ethernet Diagnostic Driver pour Windows versions antérieures à 1.4.0.10. | ||
| Intel | N/A | Intel® Graphics DCH Drivers pour Windows 10 versions antérieures à 27.20.100.9316. | ||
| Intel | N/A | Intel® Graphics Driver pour Windows® 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions antérieures à 21.10. | ||
| Intel | N/A | Intel® Graphics non DCH Drivers pour Windows 10 versions antérieures à 100.9416. | ||
| Intel | N/A | Intel® Iris® Xe MAX Dedicated Graphics Drivers pour Windows 10 versions antérieures à 27.20.100.9466. | ||
| Intel | N/A | Intel® NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA | ||
| Intel | N/A | Intel® NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Kit - NUC11PHKi7C | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA | ||
| Intel | N/A | Intel® NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7 | ||
| Intel | N/A | Intel® NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA | ||
| Intel | N/A | Intel® NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7 | ||
| Intel | N/A | Intel® NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7 | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNHNC | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNKTC | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE | ||
| Intel | N/A | Intel® NUC 7 Essential, a Mini PC avec Windows® 10 - NUC7CJYSAL | ||
| Intel | N/A | Intel® NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC | ||
| Intel | N/A | Intel® NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW | ||
| Intel | N/A | Intel® NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA | ||
| Intel | N/A | Intel® NUC 8 Home, a Mini PC avec Windows® 10: NUC8i3CYSM, NUC8i3CYSN | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® NUC 8 Pro Board NUC8i3PNB | ||
| Intel | N/A | Intel® NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK | ||
| Intel | N/A | Intel® NUC 8 Rugged Kit NUC8CCHKR | ||
| Intel | N/A | Intel® NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB | ||
| Intel | N/A | Intel® NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX | ||
| Intel | N/A | Intel® NUC Board NUC7i3DNBE | ||
| Intel | N/A | Intel® NUC Board NUC8CCHB | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions antérieures à 1.78.2.0.7. | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions antérieures à 1.78.1.1. | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions antérieures à 1.78.4.0.4. | ||
| Intel | N/A | Intel® NUC Kit: NUC6CAYH, NUC6CAYS | ||
| Intel | N/A | Intel® NUC Kit: NUC7CJYH, NUC7PJYH | ||
| Intel | N/A | Intel® NUC Kit NUC7i3DNHE, NUC7i3DNKE | ||
| Intel | N/A | Intel® NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK | ||
| Intel | N/A | Intel® NUC Kit: NUC8i7HNK, NUC8i7HVK | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC510. | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit: LAPBC510, LAPBC710 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC710. | ||
| Intel | N/A | Intel® oneAPI Base Toolkit versions antérieures à 2021.4.0. | ||
| Intel | N/A | Intel® oneAPI Rendering Toolkit versions antérieures à 2021.2. | ||
| Intel | N/A | Intel® P4510 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Intel® P4510 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® P4511 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Intel® P4511 series (M.2) versions antérieures à VDV10384. | ||
| Intel | N/A | Intel® P4610 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® P4618 series versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Pentium® Processor J Series, N Series | ||
| Intel | N/A | Intel® Pentium® Processor N Series | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series - Refresh | ||
| Intel | N/A | Intel® Pentium® Silver Processor Series | ||
| Intel | N/A | Intel® RealSense™ D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.22. | ||
| Intel | N/A | Intel® Serial IO driver pour Intel® NUC 11 Gen versions antérieures à 30.100.2104.1. | ||
| Intel | N/A | Intel® SSD D3-S4510 Series (SFF, M.2) versions antérieures à XCV10140. | ||
| Intel | N/A | Intel SSD D5-P4320 Series toutes versions. | ||
| Intel | N/A | Intel SSD D5-P4326 Series toutes versions. | ||
| Intel | N/A | Intel SSD D5-P4420 Series toutes versions. | ||
| Intel | N/A | Intel SSD D7-P5500 Series versions antérieures à 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029. | ||
| Intel | N/A | Intel SSD D7-P5600 Series versions antérieures à 1.2.0, 2CV1L029 and 2CV1C030. | ||
| Intel | N/A | Intel SSD D7-P5608 Series versions antérieures à 2CV1R106. | ||
| Intel | N/A | Intel® SSD DC D4512 versions antérieures à ET10. | ||
| Intel | N/A | Intel SSD DC P4500 Series toutes versions. | ||
| Intel | N/A | Intel SSD DC P4501 Series toutes versions. | ||
| Intel | N/A | Intel SSD DC P4600 Series toutes versions. | ||
| Intel | N/A | Intel SSD DC P4608 Series toutes versions. | ||
| Intel | N/A | Intel® Thunderbolt™ 3 and 4 Windows DCH Drivers versions antérieures à 1.41.1054.0 | ||
| Intel | N/A | Intel® Thunderbolt™ non-DCH Driver toutes versions pour Windows. | ||
| Intel | N/A | Intel® VTune™ Profiler versions antérieures à 2021.3.0. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX200 | ||
| Intel | N/A | Intel® Wi-Fi 6 AX201 | ||
| Intel | N/A | Intel® Wi-Fi 6 AX210 | ||
| Intel | N/A | Intel® Wi-Fi 6E AX210 | ||
| Intel | N/A | Intel® Wireless 7265 (Rev D) Family | ||
| Intel | N/A | Intel® Wireless-AC 9260 | ||
| Intel | N/A | Intel® Wireless-AC 9461 | ||
| Intel | N/A | Intel® Wireless-AC 9462 | ||
| Intel | N/A | Intel® Wireless-AC 9560 | ||
| Intel | N/A | Intel® Xeon® Processor E3 v6 Family | ||
| Intel | N/A | Intel® Xeon® Processor E Family | ||
| Intel | N/A | Intel® Xeon® Processor W Family | ||
| Intel | N/A | Killer™ Wi-Fi 6 AX1650 | ||
| Intel | N/A | Killer™ Wi-Fi 6E AX1675 | ||
| Intel | N/A | Killer™ Wireless-AC 1550 | ||
| Intel | N/A | Safestring library maintained by Intel® avant le commit avec l'id efbd4066ea215f03342c1f0e5888102badf14477 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "10th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "11th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "3rd Generation Intel\u00ae Xeon\u00ae Scalable Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "700-series Ethernet Adapters",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "7th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "810-series Ethernet Adapters",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "All Intel\u00ae oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions ant\u00e9rieures \u00e0 2021.1 Beta 10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 ao\u00fbt 2021.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.15.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver installer pour Windows versions ant\u00e9rieures \u00e0 1.4.0.21.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor C3000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor E3900 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 1.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Celeron\u00ae Processor J Series, N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Celeron\u00ae Processor N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 i5-8305G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 i7-8706G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 X-series Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Distribution of OpenVINO\u2122 Toolkit versions ant\u00e9rieures \u00e0 2021.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 3165",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 3168",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 8260",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 8265",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae EMA versions ant\u00e9rieures \u00e0 1.5.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Ethernet 500 Series Controllers driver pour Linux versions ant\u00e9rieures \u00e0 3.17.3.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Ethernet Diagnostic Driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9316.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics Driver pour Windows\u00ae 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics non DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 100.9416.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Iris\u00ae Xe MAX Dedicated Graphics Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9466.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Enthusiast Kit - NUC11PHKi7C",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNHNC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNKTC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Essential, a Mini PC avec Windows\u00ae 10 - NUC7CJYSAL",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Home, a Mini PC avec Windows\u00ae 10: NUC8i3CYSM, NUC8i3CYSN",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Pro Board NUC8i3PNB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Rugged Kit NUC8CCHKR",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Board NUC7i3DNBE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Board NUC8CCHB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.1.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions ant\u00e9rieures \u00e0 1.78.4.0.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC6CAYH, NUC6CAYS",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC7CJYH, NUC7PJYH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit NUC7i3DNHE, NUC7i3DNKE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC8i7HNK, NUC8i7HVK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC510.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit: LAPBC510, LAPBC710",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC710.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2021.4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae oneAPI Rendering Toolkit versions ant\u00e9rieures \u00e0 2021.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4510 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4510 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4511 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4511 series (M.2) versions ant\u00e9rieures \u00e0 VDV10384.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4610 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4618 series versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor J Series, N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b - Refresh",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Silver Processor Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae RealSense\u2122 D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.22.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Serial IO driver pour Intel\u00ae NUC 11 Gen versions ant\u00e9rieures \u00e0 30.100.2104.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae SSD D3-S4510 Series (SFF, M.2) versions ant\u00e9rieures \u00e0 XCV10140.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4320 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4326 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4420 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5500 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5600 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1L029 and 2CV1C030.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5608 Series versions ant\u00e9rieures \u00e0 2CV1R106.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae SSD DC D4512 versions ant\u00e9rieures \u00e0 ET10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4500 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4501 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4600 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4608 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Thunderbolt\u2122 3 and 4 Windows DCH Drivers versions ant\u00e9rieures \u00e0 1.41.1054.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Thunderbolt\u2122 non-DCH Driver toutes versions pour Windows.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2021.3.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX200",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX201",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6E AX210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless 7265 (Rev D) Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9260",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9461",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9462",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9560",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor E3 v6 Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor E Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor W Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wi-Fi 6 AX1650",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wi-Fi 6E AX1675",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wireless-AC 1550",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Safestring library maintained by Intel\u00ae avant le commit avec l\u0027id efbd4066ea215f03342c1f0e5888102badf14477",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0063"
},
{
"name": "CVE-2020-12981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12981"
},
{
"name": "CVE-2020-12987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12987"
},
{
"name": "CVE-2021-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0157"
},
{
"name": "CVE-2020-12899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12899"
},
{
"name": "CVE-2021-33062",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33062"
},
{
"name": "CVE-2021-0199",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0199"
},
{
"name": "CVE-2021-33089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33089"
},
{
"name": "CVE-2020-12986",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12986"
},
{
"name": "CVE-2021-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0135"
},
{
"name": "CVE-2021-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0065"
},
{
"name": "CVE-2021-0078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0078"
},
{
"name": "CVE-2020-8741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8741"
},
{
"name": "CVE-2021-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0053"
},
{
"name": "CVE-2021-33106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33106"
},
{
"name": "CVE-2021-0198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0198"
},
{
"name": "CVE-2021-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0096"
},
{
"name": "CVE-2021-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0158"
},
{
"name": "CVE-2021-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33092"
},
{
"name": "CVE-2020-12983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12983"
},
{
"name": "CVE-2021-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0082"
},
{
"name": "CVE-2021-0079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0079"
},
{
"name": "CVE-2021-33094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33094"
},
{
"name": "CVE-2021-33090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33090"
},
{
"name": "CVE-2020-12893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12893"
},
{
"name": "CVE-2020-12982",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12982"
},
{
"name": "CVE-2021-0071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0071"
},
{
"name": "CVE-2020-12980",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12980"
},
{
"name": "CVE-2021-33095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33095"
},
{
"name": "CVE-2020-12963",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12963"
},
{
"name": "CVE-2021-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0151"
},
{
"name": "CVE-2020-12902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12902"
},
{
"name": "CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"name": "CVE-2021-33118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33118"
},
{
"name": "CVE-2021-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0148"
},
{
"name": "CVE-2021-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0121"
},
{
"name": "CVE-2021-33071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33071"
},
{
"name": "CVE-2021-33105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33105"
},
{
"name": "CVE-2021-33058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33058"
},
{
"name": "CVE-2021-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0200"
},
{
"name": "CVE-2021-33097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33097"
},
{
"name": "CVE-2020-12898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12898"
},
{
"name": "CVE-2021-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0152"
},
{
"name": "CVE-2021-0069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0069"
},
{
"name": "CVE-2021-0197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0197"
},
{
"name": "CVE-2020-12901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12901"
},
{
"name": "CVE-2021-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0013"
},
{
"name": "CVE-2020-12985",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12985"
},
{
"name": "CVE-2020-12892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12892"
},
{
"name": "CVE-2021-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0075"
},
{
"name": "CVE-2021-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0120"
},
{
"name": "CVE-2021-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0146"
},
{
"name": "CVE-2020-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12900"
},
{
"name": "CVE-2021-33087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33087"
},
{
"name": "CVE-2021-33086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33086"
},
{
"name": "CVE-2020-12904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12904"
},
{
"name": "CVE-2021-33091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33091"
},
{
"name": "CVE-2021-33059",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33059"
},
{
"name": "CVE-2021-33088",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33088"
},
{
"name": "CVE-2021-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0064"
},
{
"name": "CVE-2020-12897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12897"
},
{
"name": "CVE-2020-12894",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12894"
},
{
"name": "CVE-2020-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12905"
},
{
"name": "CVE-2021-33063",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33063"
},
{
"name": "CVE-2020-12903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12903"
},
{
"name": "CVE-2021-33073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33073"
},
{
"name": "CVE-2021-33093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33093"
},
{
"name": "CVE-2021-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0110"
},
{
"name": "CVE-2020-12964",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12964"
},
{
"name": "CVE-2020-12895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12895"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-858",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00393 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00393.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00560 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00481 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00551 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00551.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00535 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00535.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00565 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00565.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00524 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00567 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00528 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00547 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00562 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00584 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00584.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00556 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00569 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00569.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00557 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00540 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00540.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00533 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00555 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00509 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00564 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00564.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00538 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00538.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00554 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00568 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00568.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00566 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00482 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html"
}
]
}
CERTFR-2021-AVI-778
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Intel HAXM. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel HAXM versions ant\u00e9rieures \u00e0 7.6.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0180"
},
{
"name": "CVE-2021-0182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0182"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-778",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Intel HAXM. Elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Intel HAXM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00544 du 12 octobre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00544.html"
}
]
}
CERTFR-2021-AVI-616
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | les processeurs Xeon (se référer à intel-sa-00512 pour les versions affectées) | ||
| Intel | N/A | les adaptateurs et contrôleurs Ethernet Intel séries 800 versions antérieures à 1.5.1.0, 1.5.3.0 et 1.5.4.0 | ||
| Intel | N/A | les pilotes graphiques pour Windows (se référer à intel-sa-00508 pour les versions affectées) | ||
| Intel | N/A | Intel NUC (se référer à intel-sa-00543 et intel-sa-00553 pour les versions affectées) | ||
| Intel | N/A | les contrôleurs Ethernet Intel séries 800 avec des pilotes Linux versions antérieures à 1.4.11 | ||
| Intel | N/A | les contrôleurs Ethernet Intel séries X722 et 800 avec des pilotes Linux RMDA versions antérieures à 1.3.19 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "les processeurs Xeon (se r\u00e9f\u00e9rer \u00e0 intel-sa-00512 pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les adaptateurs et contr\u00f4leurs Ethernet Intel s\u00e9ries 800 versions ant\u00e9rieures \u00e0 1.5.1.0, 1.5.3.0 et 1.5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes graphiques pour Windows (se r\u00e9f\u00e9rer \u00e0 intel-sa-00508 pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC (se r\u00e9f\u00e9rer \u00e0 intel-sa-00543 et intel-sa-00553 pour les versions affect\u00e9es)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les contr\u00f4leurs Ethernet Intel s\u00e9ries 800 avec des pilotes Linux versions ant\u00e9rieures \u00e0 1.4.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les contr\u00f4leurs Ethernet Intel s\u00e9ries X722 et 800 avec des pilotes Linux RMDA versions ant\u00e9rieures \u00e0 1.3.19",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0005"
},
{
"name": "CVE-2021-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0012"
},
{
"name": "CVE-2021-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0062"
},
{
"name": "CVE-2021-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0007"
},
{
"name": "CVE-2021-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0004"
},
{
"name": "CVE-2021-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0002"
},
{
"name": "CVE-2021-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0003"
},
{
"name": "CVE-2021-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0009"
},
{
"name": "CVE-2021-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0083"
},
{
"name": "CVE-2021-0008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0008"
},
{
"name": "CVE-2021-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0006"
},
{
"name": "CVE-2021-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0061"
},
{
"name": "CVE-2021-0196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0196"
},
{
"name": "CVE-2021-0084",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0084"
},
{
"name": "CVE-2021-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0160"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-616",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00543 du 10 ao\u00fbt 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00543.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00515 du 10 ao\u00fbt 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00515.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00512 du 10 ao\u00fbt 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00508 du 10 ao\u00fbt 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00553 du 10 ao\u00fbt 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00479 du 10 ao\u00fbt 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00479.html"
}
]
}
CERTFR-2021-AVI-530
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits Intel. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Xeon Processor E5 v4 Family | ||
| Intel | N/A | 2nd Generation Intel Xeon Scalable Processors | ||
| Intel | N/A | Intel Xeon Scalable Processors | ||
| Intel | N/A | Intel Core X-series Processors | ||
| Intel | N/A | Intel Xeon Processor E5 v3 Family | ||
| Intel | N/A | Intel Xeon Processor D Family | ||
| Intel | N/A | Intel Xeon Processor W Family |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Xeon Processor E5 v4 Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "2nd Generation Intel Xeon Scalable Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Xeon Scalable Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Core X-series Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Xeon Processor E5 v3 Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Xeon Processor D Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Xeon Processor W Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0144"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-530",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-16T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Intel. Elle permet\n\u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00525 du 13 juillet 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00525.html"
}
]
}
CERTFR-2021-AVI-446
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel RealSense ID F450 et F455 sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Optane DC Persistent Memory for Windows versions antérieures à 2.00.00.3842 et 1.00.00.3515 | ||
| Intel | N/A | Intel VTune Profiler versions antérieures à 2021.1.1 | ||
| Intel | N/A | Intel SGX (se référer au bulletin de sécurité intel-sa-00477 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | les produits Intel Wireless Bluetooth et Killer Bluetooth (se référer au bulletin de sécurité intel-sa-00520 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | Intel SSD Data Center Tool versions téléchargées avant le 31 décembre 2020, Intel recommande de remplacer cet outil par Intel Memory and Storage Tool (MAS) for SSD | ||
| Intel | N/A | Intel NUC M15 Laptop Kit Driver Pack versions antérieures à 1.1 | ||
| Intel | N/A | Intel Rapid Storage Technology versions antérieures à 17.9.1.1009.5, 18.0.3.1148.4 et 18.1.0.1028.2 | ||
| Intel | N/A | les processeurs Intel (se référer aux bulletins de sécurité intel-sa-00442, intel-sa-00463, intel-sa-00521, intel-sa-00459, intel-sa-00464, intel-sa-00465, intel-sa-00500 et intel-sa-00516 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | les versions du noyau Linux antérieures à 5.13 qui supportent BlueZ | ||
| Intel | N/A | Intel Processor Diagnostic Tool versions antérieures à 4.1.5.37 | ||
| Intel | N/A | les pilotes WiFi Intel ProSet/Wireless versions antérieures à 22.0 | ||
| Intel | N/A | Intel Computing Improvement Program versions antérieures à 2.4.6522 | ||
| Intel | N/A | Intel DSA versions antérieures à 20.11.50.9 | ||
| Intel | N/A | les pilotes Intel NUC 9 Extreme Laptop Kit LAN versions antérieures à 10.45 | ||
| Intel | N/A | Intel Server Board M10JNP2SB sans la mise à jour comprenant EFI BIOS 7215 et BMC 8100.01.08 | ||
| Intel | N/A | Intel Unite Client pour Windows versions antérieures à 4.2.25031 | ||
| Intel | N/A | Intel Thunderbolt (se référer au bulletin de sécurité intel-sa-00401 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | Intel Brand Verification Tool versions antérieures à 11.0.0.1225 | ||
| Intel | N/A | Intel Server System gammes R1000WF et R2000WF, Server Board gamme S2600WF, Server Board gamme S2600ST, Compute Module gamme HNS2600BP et Server Board gamme S2600BP versions antérieures à 2.48.ce3e3bd2 | ||
| Intel | N/A | Intel NUC (se référer au bulletin de sécurité intel-sa-00511 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | les pilotes FPGA OPAE pour Linux (se référer au bulletin de sécurité intel-sa-00440 de l'éditeur, cf. section Documentation) | ||
| Intel | N/A | Intel IPP versions antérieures à 2020 update 1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel RealSense ID F450 et F455 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Optane DC Persistent Memory for Windows versions ant\u00e9rieures \u00e0 2.00.00.3842 et 1.00.00.3515",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel VTune Profiler versions ant\u00e9rieures \u00e0 2021.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SGX (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00477 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les produits Intel Wireless Bluetooth et Killer Bluetooth (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00520 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD Data Center Tool versions t\u00e9l\u00e9charg\u00e9es avant le 31 d\u00e9cembre 2020, Intel recommande de remplacer cet outil par Intel Memory and Storage Tool (MAS) for SSD",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC M15 Laptop Kit Driver Pack versions ant\u00e9rieures \u00e0 1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Rapid Storage Technology versions ant\u00e9rieures \u00e0 17.9.1.1009.5, 18.0.3.1148.4 et 18.1.0.1028.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les processeurs Intel (se r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 intel-sa-00442, intel-sa-00463, intel-sa-00521, intel-sa-00459, intel-sa-00464, intel-sa-00465, intel-sa-00500 et intel-sa-00516 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les versions du noyau Linux ant\u00e9rieures \u00e0 5.13 qui supportent BlueZ",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Processor Diagnostic Tool versions ant\u00e9rieures \u00e0 4.1.5.37",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes WiFi Intel ProSet/Wireless versions ant\u00e9rieures \u00e0 22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.6522",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel DSA versions ant\u00e9rieures \u00e0 20.11.50.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes Intel NUC 9 Extreme Laptop Kit LAN versions ant\u00e9rieures \u00e0 10.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M10JNP2SB sans la mise \u00e0 jour comprenant EFI BIOS 7215 et BMC 8100.01.08",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Unite Client pour Windows versions ant\u00e9rieures \u00e0 4.2.25031",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Thunderbolt (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00401 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Brand Verification Tool versions ant\u00e9rieures \u00e0 11.0.0.1225",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System gammes R1000WF et R2000WF, Server Board gamme S2600WF, Server Board gamme S2600ST, Compute Module gamme HNS2600BP et Server Board gamme S2600BP versions ant\u00e9rieures \u00e0 2.48.ce3e3bd2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00511 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes FPGA OPAE pour Linux (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 intel-sa-00440 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel IPP versions ant\u00e9rieures \u00e0 2020 update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0090"
},
{
"name": "CVE-2020-24516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24516"
},
{
"name": "CVE-2020-12288",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12288"
},
{
"name": "CVE-2020-8700",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8700"
},
{
"name": "CVE-2020-24474",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24474"
},
{
"name": "CVE-2021-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0134"
},
{
"name": "CVE-2021-0094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0094"
},
{
"name": "CVE-2021-0086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0086"
},
{
"name": "CVE-2020-12289",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12289"
},
{
"name": "CVE-2020-12293",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12293"
},
{
"name": "CVE-2021-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0089"
},
{
"name": "CVE-2021-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0051"
},
{
"name": "CVE-2020-12292",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12292"
},
{
"name": "CVE-2021-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0098"
},
{
"name": "CVE-2021-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0095"
},
{
"name": "CVE-2021-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0052"
},
{
"name": "CVE-2020-12291",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12291"
},
{
"name": "CVE-2020-12360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
},
{
"name": "CVE-2021-0073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0073"
},
{
"name": "CVE-2021-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0056"
},
{
"name": "CVE-2021-0132",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0132"
},
{
"name": "CVE-2021-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0001"
},
{
"name": "CVE-2020-8703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
},
{
"name": "CVE-2021-0100",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0100"
},
{
"name": "CVE-2020-12357",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-24475",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24475"
},
{
"name": "CVE-2020-8702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8702"
},
{
"name": "CVE-2021-0058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0058"
},
{
"name": "CVE-2021-0097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0097"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2020-24514",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24514"
},
{
"name": "CVE-2021-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0104"
},
{
"name": "CVE-2021-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0108"
},
{
"name": "CVE-2020-24473",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24473"
},
{
"name": "CVE-2020-24507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
},
{
"name": "CVE-2021-0070",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0070"
},
{
"name": "CVE-2020-12358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
},
{
"name": "CVE-2020-24509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24509"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0106"
},
{
"name": "CVE-2020-12290",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12290"
},
{
"name": "CVE-2021-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0057"
},
{
"name": "CVE-2020-24485",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24485"
},
{
"name": "CVE-2021-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0113"
},
{
"name": "CVE-2020-8670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
},
{
"name": "CVE-2020-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24515"
},
{
"name": "CVE-2020-8704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
},
{
"name": "CVE-2020-12296",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12296"
},
{
"name": "CVE-2021-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0102"
},
{
"name": "CVE-2020-12294",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12294"
},
{
"name": "CVE-2020-12295",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12295"
},
{
"name": "CVE-2021-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0101"
},
{
"name": "CVE-2020-12359",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12359"
},
{
"name": "CVE-2021-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0077"
},
{
"name": "CVE-2021-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0105"
},
{
"name": "CVE-2020-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
},
{
"name": "CVE-2021-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0131"
},
{
"name": "CVE-2021-0067",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0067"
},
{
"name": "CVE-2020-24506",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2021-0074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0074"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2021-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24489"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0055"
},
{
"name": "CVE-2021-0133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0133"
},
{
"name": "CVE-2021-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0112"
},
{
"name": "CVE-2021-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0054"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-446",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00516 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00516.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00463 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00510 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00510.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00506 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00506.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00505 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00545 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00545.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00520 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00442 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00477 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00476 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00472 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00472.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00530 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00530.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00458 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00458.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00521 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00521.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00401 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00401.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00440 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00440.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00507 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00507.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00459 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00541 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00541.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00474 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00474.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00500 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00500.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00518 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00518.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00546 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00546.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00517 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00511 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00537 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00537.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00465 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00460 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00460.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00464 du 08 juin 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html"
}
]
}
CERTFR-2021-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Wifi Intel. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "les processeurs Intel (se r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur pour la liste des processeurs vuln\u00e9rables)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PROSet/Wireless WiFi versions ant\u00e9rieures \u00e0 22.30",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes Wifi pour UEFI versions ant\u00e9rieures \u00e0 1.2.3-2121",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-375",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Wifi\nIntel. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Wifi Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00473 du 11 mai 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
}
]
}