All the vulnerabilites related to intel - graphics_driver
Vulnerability from fkie_nvd
Published
2020-03-12 18:15
Modified
2024-11-21 04:53
Severity ?
Summary
Unquoted service path in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D014D7-B878-4DD8-A1D3-82FC177B819C", "versionEndExcluding": "15.33.49.5100", "versionStartIncluding": "15.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAB4DEB-3BCE-48A0-AAB9-842129D5DEC5", "versionEndExcluding": "15.36.38.5117", "versionStartIncluding": "15.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7250C6F-1E48-4E0B-AACB-52D4FC3F494D", "versionEndExcluding": "15.40.44.5107", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB43B202-E327-43C3-8F68-A1CC5E6C8300", "versionEndExcluding": "15.45.30.5103", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8DA53F9-E6E1-41B2-979B-4237C42E5860", "versionEndExcluding": "26.20.100.7212", "versionStartIncluding": "26.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unquoted service path in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Una ruta de servicio no citada en Intel(R) Graphics Drivers versiones anteriores a 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103 y 26.20.100.7212, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0507", "lastModified": "2024-11-21T04:53:38.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T18:15:12.273", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 18:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper access control in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0D882C7-BCD1-4A44-AFB7-90672FA8184E", "versionEndExcluding": "26.20.100.6912", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Un control de acceso inapropiado en Intel(R) Graphics Drivers versiones anteriores a 26.20.100.6912, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2020-0502", "lastModified": "2024-11-21T04:53:37.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T18:15:11.883", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 20:15
Modified
2024-11-21 04:26
Severity ?
Summary
Out of bounds read in a subsystem for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9B5A438B-28FF-4FB8-A209-11DF240B9DC5", "versionEndExcluding": "26.20.100.7209", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds read in a subsystem for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en un subsistema para Intel\u00ae Graphics Driver versiones anteriores a la versi\u00f3n 26.20.100.7209 puede habilitar a un usuario autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2019-14574", "lastModified": "2024-11-21T04:26:58.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T20:15:11.867", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 18:15
Modified
2024-11-21 04:53
Severity ?
Summary
Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7250C6F-1E48-4E0B-AACB-52D4FC3F494D", "versionEndExcluding": "15.40.44.5107", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB43B202-E327-43C3-8F68-A1CC5E6C8300", "versionEndExcluding": "15.45.30.5103", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "0819D727-C1B5-410F-93D6-098B388756CE", "versionEndExcluding": "26.20.100.7158", "versionStartIncluding": "26.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access." }, { "lang": "es", "value": "El desbordamiento del b\u00fafer en los Controladores de gr\u00e1ficos Intel (R) anterior a las versiones 15.40.44.5107, 15.45.30.5103 y 26.20.100.7158 puede permitir que un usuario autenticado permita potencialmente la escalada de privilegios y la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "id": "CVE-2020-0504", "lastModified": "2024-11-21T04:53:37.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T18:15:12.023", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper default permissions in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7463 and 15.45.30.5103 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB43B202-E327-43C3-8F68-A1CC5E6C8300", "versionEndExcluding": "15.45.30.5103", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7755FD3-F563-4B2D-A72C-C201C31F8782", "versionEndExcluding": "26.20.100.7463", "versionStartIncluding": "26.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper default permissions in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7463 and 15.45.30.5103 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unos permisos predeterminados inapropiados en el instalador para Intel(R) Graphics Drivers versiones anteriores a 26.20.100.7463 y 15.45.30.5103, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2020-0514", "lastModified": "2024-11-21T04:53:38.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.580", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-02 15:29
Modified
2024-11-21 03:28
Severity ?
Summary
Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089&languageid=en-fr | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089&languageid=en-fr | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.40.1.64.4256 | |
intel | graphics_driver | 15.40.4.64.4256 | |
intel | graphics_driver | 15.40.7.64.4279 | |
intel | graphics_driver | 15.40.14.4352 | |
intel | graphics_driver | 15.40.26.4474 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 15.46.02.4729 | |
intel | graphics_driver | 15.46.05.4771 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.1.64.4256:*:*:*:*:*:*:*", "matchCriteriaId": "17C2024D-1B35-44CD-8918-3549D92D8B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.4.64.4256:*:*:*:*:*:*:*", "matchCriteriaId": "6A142D12-514E-4B13-A77E-A63D2525A2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.7.64.4279:*:*:*:*:*:*:*", "matchCriteriaId": "DE08572D-F0E3-4F5E-A5E1-D69486E87129", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.14.4352:*:*:*:*:*:*:*", "matchCriteriaId": "30B59E90-097C-4BF8-BCDE-321C810D1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.26.4474:*:*:*:*:*:*:*", "matchCriteriaId": "61E584F3-65D0-4D38-ABBB-83C86CDF169D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "E9DB6338-23B0-4C1D-97C2-345A22EDCFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*", "matchCriteriaId": "8D7C8297-0E65-4659-8049-34401194D0FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*", "matchCriteriaId": "58D10DEC-49BC-4226-83CE-0C4B805CD296", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:*:*:*", "matchCriteriaId": "BA3A67F6-415F-4B0E-AA2B-40286CC492A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:*:*:*", "matchCriteriaId": "2B637567-0958-488D-ACCA-E5A61D71433A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:*:*:*", "matchCriteriaId": "9579A4DB-D506-4570-9C40-1CB4BD666A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:*:*:*", "matchCriteriaId": "09F53D97-D600-4AB1-8898-2491AC8B90A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.46.02.4729:*:*:*:*:*:*:*", "matchCriteriaId": "10A32D02-2A6C-4E07-A021-13080036E761", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.46.05.4771:*:*:*:*:*:*:*", "matchCriteriaId": "D642F69C-7292-4350-8697-147F7E717ABC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access." }, { "lang": "es", "value": "Una desreferencia de puntero en Intel Graphics Driver 15.40.x.x, 15.45.x.x y 15.46.x.x permite que un usuario sin privilegios eleve sus privilegios mediante acceso local." } ], "id": "CVE-2017-5727", "lastModified": "2024-11-21T03:28:18.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-02T15:29:00.363", "references": [ { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089\u0026languageid=en-fr" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:25
Severity ?
6.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
NULL pointer dereference in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "769A78AA-5380-4FA8-9B1B-6BC93F54952B", "versionEndExcluding": "31.0.101.4255", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:arc_a310:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6D00BE1-565F-4E36-ABCB-7D6216D3C422", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a380:-:*:*:*:*:*:*:*", "matchCriteriaId": "30DA34B3-3114-432A-9B81-B1E469BFBA35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a530m:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B10E0AF-31C4-4587-ABA0-E7F27A431D84", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2A6623-160D-4712-91B4-7125C6F14587", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a570m:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5A65944-2A11-46D8-ABF0-1A62955D3FC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a580:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1ABFDBB-F30C-4AE2-98B1-90542F427085", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a730m:-:*:*:*:*:*:*:*", "matchCriteriaId": "926E5E32-39B2-4CAD-AB41-9652518B3D8A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a750:-:*:*:*:*:*:*:*", "matchCriteriaId": "E92E63D9-B5E9-49F7-B96F-9C4BE6B8F41C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a770:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE38F333-3BA1-4C84-A311-5DFC90A0BEAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:arc_a770m:-:*:*:*:*:*:*:*", "matchCriteriaId": "7538E01D-C5F4-4D0E-92A6-7D8F1FB95907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "La desreferencia del puntero NULL en algunos controladores Intel(R) Arc(TM) e Iris(R) Xe - WHQL - Windows anteriores a la versi\u00f3n 31.0.101.4255 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "id": "CVE-2022-42879", "lastModified": "2024-11-21T07:25:31.097", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:13.530", "references": [ { "source": "secure@intel.com", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-395" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access via local access." }, { "lang": "es", "value": "Validaci\u00f3n de entradas insuficiente en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario privilegiado ejecute c\u00f3digo arbitrario mediante acceso local." } ], "id": "CVE-2018-12216", "lastModified": "2024-11-21T03:44:47.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.147", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 19:15
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0E6FF30E-AAC5-4EF7-BD06-0CD11E3FE218", "versionEndExcluding": "26.20.100.6813", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "06F38F1F-60D1-404D-84D1-71D2177794FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "AA77EB1A-4DE8-4E4E-88CF-DD61B2B5F856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BE472FC-4776-4FD1-AE36-3D9934A60BB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "470B28CA-4990-4AF8-9CF5-C2A1B037FFA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E50CC66-0FC3-4825-B677-EBF34D6804B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10A12922-9D6D-49E8-B9C6-DD74CD60FAFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86ACD76-A1A6-4B99-A521-38C706AF2EDF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "5C281835-B593-4824-A061-F042409D855C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "CED07547-1A34-4484-8032-CC33B8A24254", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "165E3D96-24EA-4F47-9692-30823C482BF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC956D6E-B4D0-44F0-BE83-6BCCE5ECC480", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E89BBE4-2243-4AF5-A63C-4BD45C62C446", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "FF762097-B0AA-409F-8AE4-EB1A3E33AD30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "DE0858F7-9527-41DF-B6E7-AF0445A6A934", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FED84E6-8E54-4630-9D95-FD2F8EDF4C89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E714DE6-C7C7-44B9-B824-7FF85DA89A86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F87618B-A8DF-46B0-880F-422CD2E52826", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16DE2C40-E8A3-418A-99B2-DD0D19814071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD455EBB-69AE-464A-93AA-13227FBD17E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCB18769-9DDD-4321-B123-BFF81A02DA4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F807F51-D647-4867-BBDA-17492346EB64", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65ABD229-0EF3-44AC-AD87-6C42EF48BF2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E88CE3A-812A-4C01-B0D7-D9A154FF2187", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D8BAD9D-7253-492A-87B3-CACCF66A332F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFC1253-B337-4F9B-855D-14A3F6AE7EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A20E7888-D3A3-4A01-8328-71A81AA0A52A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "988EDA03-EF3B-402F-B3B4-74BA32A1BCCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77C3D738-944D-46A1-A542-32C96A021964", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "80A4E442-8E2C-472B-A9C6-56B58B6B55B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "43695191-7897-4028-A8DA-F45D2B4E0C38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D72230-B7C2-4A9C-928F-328666CA3988", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37ED0DB6-A589-4CB7-87AD-102FE7490AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20EE53DA-4639-4714-B956-CC69BBCC6D26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5DD0B86-37A4-4927-97C5-86B165590105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53B450C9-CDC4-4047-AD77-19A4BC9CB870", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC8851E2-CD05-4575-83E3-F801C1785A59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6484B4DA-85FA-4BF9-9B4A-157BC2ED2889", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F72876C5-C084-4DD3-9BC8-894C4BE40C15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "43CEC4C5-B559-4A48-A1D2-7CDB96381CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5850hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C36021BE-D024-45E4-BAFA-65763D72A260", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "466ECE77-E232-4C03-83A2-FBAC06C82021", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5950hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F5DC2A-9916-4F01-BE70-AAB9061E51A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D98586A-473F-44D7-B299-9480129AE8DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5775c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A30C6FFD-0620-4FB4-87CC-083A53121171", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADC848D-C1AF-4FCE-89B4-DD3ABA050202", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5700hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9242800F-847D-43CE-8611-DBFBDAFAF79B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "91CEC4BC-098C-4B8F-AA4F-25B9211010D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5750hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F885A622-CC74-43DB-9C05-633EB7693296", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9453959E-FB00-441B-B9B6-4BC75DD534B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ACBF161-3C32-44B2-BD31-5FDBCCCFCF62", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C34148EB-C6A7-49DE-8139-316F710D57F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5550u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC9FDA96-4E83-4038-ABF6-134BAD1359C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EA33B05-493C-4F55-82D9-5F2C942A603D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5557u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0B6F4C5-CECA-4D7A-A4F4-A9BD38AB7114", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E8D6B87-CA43-4773-B13E-EB07128E5501", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95BC9762-7F9A-483A-8C20-94481FD54000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D188A7A-9456-4535-A230-C16033A22F21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5071EBE4-CC92-4238-A23E-0213CB14E19A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70EC3730-5825-422D-A728-D719F447E5E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "502AE808-A66F-4C02-A112-C4D682F3E13F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "443C4081-E238-4AF4-AABE-AB5489756333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", "matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF61383-1558-4AE6-97ED-3B8A20667EEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC225BE-FA97-41D2-AD32-5FE58C2DAB94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37E9BA09-E255-438E-9938-3F51A78A3331", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D95AB3F9-7B28-46F8-8882-4976DBBCC767", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B26CE379-73B5-4E3C-B0B2-7550A3A670BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7001A74-CFF9-4CBB-A72B-E476C22ADF07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9C3DCA2-6087-4286-A84A-6091149083C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A5BA9C-83FD-4E4F-8CC7-ABC317BC0F98", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E3236A7-F174-4A47-90B3-7E0457CB3455", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2797768-C460-4901-99BE-148A7BADC020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "07658CBC-A0FD-4A0F-BCBB-FC24115F7FDC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C667DFE1-E66C-44BB-916F-0F1257B5289E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D1FEE69-E2FD-4F88-9D25-7CE3D53D1001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "495C794A-3EB2-4C2B-8312-65C1C70EFFAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5\\+8500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25773AA8-5882-4C05-9A67-FE0D37C9DCAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5\\+8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDF4BEEF-A8FA-4A9A-A906-20268F7886C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5\\+8400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DB5F890-8B92-4F12-8D34-7E9045D22DAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5\\+8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2816803A-2A97-48B2-ACB5-BA35FC6CD82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF5BB43-9A54-4F8F-86EB-04B56135F69A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4ECE37-14C8-4035-9410-F66AF586934D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C71C3D-D137-4302-8B35-3A2AA08DD92C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1B41F0-B592-4E76-823E-847DDCC49859", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84928CAE-996F-42F9-8CB2-E3BC13E3D448", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52E5B70-12E0-4AA2-81E5-71BBBFA1D500", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "66430AA1-841C-4204-8846-B2FBEFF4269A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01CD5DEE-86B0-4431-A542-603300A28DB3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62D1D375-D4AE-4866-8472-30EBF2A6F057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92E1FB35-EB0D-46D9-8B07-5B74CD56B36C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "828E6E11-A376-4F40-9077-81B9000B2692", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1737E9B0-D3DF-4B8A-8548-9B2CD94EB31F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3244927F-488B-4F7D-A616-02D26E64C88C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "059D9645-5A07-44C5-A3B7-E8948D5F942A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2128AB8F-506E-4E75-AEBE-418EDFE083FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "419D32E2-D53C-4A81-8E9D-E79FD5D89B7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A308E6AF-16CB-4722-8318-94F7B1877535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "634087B5-A4D5-45AC-871F-7E785F48B9C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC557726-C2D4-4E95-AE20-85FE621586FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4E97FA-FEF9-4EB1-9B94-9CFC4C5A6821", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F7C959-BC66-40AB-8038-D37181A4CE5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD63AC3-9528-484C-9B94-5AE1790A6492", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F611716-F3D6-4187-AE71-4FF87C95C18E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7505980F-57C3-4278-AA6F-59933ACB34A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "867B2DCB-A413-4EAB-811B-02BD5BA30F3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83E3A698-AB8A-40C6-BBE1-61FCB0375483", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1054FBFC-1609-4301-A0D0-B78878FB2427", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "180F2FC8-2C6D-4D54-9CE5-B74348BF1663", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5F67974-81B3-43C2-8DAE-A66C6A876B7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-5350h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "079CAA7D-456D-499E-8604-F218DE1333AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-5350h:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FCEEDB-C125-4F83-99B6-9DC8736F2F00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-5200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FC041F8-7830-4CED-8330-88412A9F4EFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A08817-7679-4B7B-8D32-08F7F42525CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-5287u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77B4603-C1B5-4C2D-8072-F0339B5B8682", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7138774-E0CF-47C6-BA82-4034AA63AC1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-5250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6C53104-79C6-4FDE-AE7C-233813939FDA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8085F23-481D-4395-9071-5F79DCC4EFEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-5257u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F92C5142-6771-4C3B-BB2F-CBC60BFD2FC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB0B9DA-FB37-4E96-99E7-3345B53FDC2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80BB84A-3BF8-40E0-BB06-FD39C583B94B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A589B59-DB9C-427F-A28A-BFD01EC64997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7474BC6-6D73-47B5-B7B4-AA6BBFFC36A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "196BA038-162F-4E30-8DE3-6FFB35102A1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77B8A8CC-9009-4CF0-894F-97079FD27796", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD20B8F2-FCD6-454F-955F-9F59B140593C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AC85FC5-274A-43B1-A9B6-245130812551", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "769E9A01-C94B-4254-8510-ABE32567E22D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*", "matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1100AAC2-5A94-4EF3-AB94-AB4B4085F109", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30904062-0998-4D93-8F61-36C41BCD11F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9147C908-0B5E-4CC4-BFDA-FDC8219494A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC25F057-A548-4E02-A464-8AE97B40A39D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CAE5F9-E9D5-4EE1-A02D-88707B118C1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9130u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F454B00-67EF-468A-88DA-C98C67FC0942", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9E6003C-A4D9-45EE-877F-B18502BD8ACD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6325AFF1-8B27-408C-ADC3-E1FA826A2B9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F99AFDF6-1B9C-4F06-A827-F0C5052EA485", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9D0FC02-90FB-4C7D-88A6-CCC7FC7D96F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AE97A31-CFCC-43AA-9354-E7ACC2415211", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE031B88-677D-4EA4-A257-1641680E407E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBC24393-D20D-4BED-B327-2DC80876383B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B860BA95-FB11-4314-8EF7-9992F2F26C68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD689A93-49A6-49F8-83A8-D87563658FAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CE3890B-D84E-4552-BCC5-9CB8C615BAD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BBB9687-14B5-4F4E-B6A8-1524930E605E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B1E75F-5225-4656-90EF-473D417D3051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E23104C-8296-4A9B-BC55-E2E7B1CE7AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE0F2403-8146-4CA0-9E89-04022B375CEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "546BA014-D154-4B2E-9EB9-CAA4B810264A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C68A5FCF-3ECB-4831-A217-F58B63CCA4BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B1E424-885F-4BB0-9257-8284A18B1655", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C4ABB7-71F8-4AF6-918F-263E58FC26EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E16A4-5B81-412F-9B02-D15288F0EB52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-5015u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8464165-83B9-4745-A71D-0072AB466DF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A627BB-47E3-4870-8B66-92546ABA0060", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-5020u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6CD613-B37A-442E-842C-9F60E8F96951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6DD467D-BCB8-48CA-920B-5591A3E8D4C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-5005u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B5896D-2B98-45AE-B4BF-1196C5362785", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F45AB6-55EF-4ED0-BBAD-E78894ED399B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-5010u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D47B941-8617-4EDA-9EFA-577BDBB3D1B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DA07BF1-F5E6-4AFB-AE92-26E3E5125064", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-5157u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83279B8E-8448-4D7A-8795-D7DAA6BD4092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A64B0EA-FB22-4CE6-81E7-56CFFE12FC5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E6609BC-7E90-41F9-91A3-4139100D7A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39616E34-9182-485B-B6AE-566DE2E77AA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "443C4081-E238-4AF4-AABE-AB5489756333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", "matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC225BE-FA97-41D2-AD32-5FE58C2DAB94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D95AB3F9-7B28-46F8-8882-4976DBBCC767", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78DB74AB-9D98-40B0-9715-EF934125C228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF86B5D-4B93-4DFA-945E-723F49D90F1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B26CE379-73B5-4E3C-B0B2-7550A3A670BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E603DAD7-EC5F-42E9-B902-445599280DC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD242386-919B-4B0C-A7C9-D045C0977FD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDC571E-D4F4-4837-9462-781B9085DDA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "36FAB23F-A289-42E6-BA8E-C4A061A9604C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C5BEE28-D0F7-44F0-8B01-69EEF249FDBE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4B23DC-BB43-4BF2-B96A-3A531EC603C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB14435-11E5-4F75-98BA-0A6D2E4818FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382FEC53-468F-41B4-A639-5875F6C62DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48293B3F-0DE7-4100-9512-2D20FC437D12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DB2544C-BD41-4316-BDAD-30B4DDF785EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "26584C5B-4599-42CF-9C43-91A7B382756B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1B41F0-B592-4E76-823E-847DDCC49859", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61BD341-9D1F-444C-A5C9-761994866ED2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AB7E123-7871-4ED7-B76E-DC0151035B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45BC7EDA-83CD-488A-84B4-9B41B4780DE0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16807D5E-1E13-4A98-8217-9AF6CE24A933", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB96985-BB1A-4F60-8259-E3AD4ACAD8CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBDCB2FA-B3D8-4922-B8B5-7FAA4A574D0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m7-6y75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE8D1416-F7CE-4836-9E02-C54019454F6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "E29F8E70-5429-4756-A574-C7B60BE74A86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF8C481-398C-4C2D-A3FD-76F4D6205B80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7F9109E-EADD-40F4-8360-BF7E37433E2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "46994C87-8D86-4699-8257-DFAB90D08A09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C00E0312-D1D1-410D-A3A1-74495AA1C2C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F03AC52-80DC-46A9-9E71-B1C5A6EAA7AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE88726F-B548-4FF1-8E76-90DD6CFC12E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m5-6y57_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24027ED1-4E3A-44A0-AB40-FAF01EFC3E0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFFF65E-6576-41A5-82E0-F2EECDC64743", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "237D4E3F-F132-4D6E-95F8-C607EC09CB50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3EB3692-06DA-4EED-8F5E-D21ECC9EEDEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6440hq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2CCD117-16E9-46FD-A472-E46D8B0511BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0974E563-6326-4E79-95FF-40625440696E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-6360u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "595F7EA6-D753-402E-824A-FEA82EC68246", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9B3858-E58D-471E-8F12-DC109A133B81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CFAE743-376B-4FD1-8391-664D97667105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-5300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "093B2716-8A86-4EB2-9461-E669DD87262B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B44D1003-4CB4-4EAF-8D9C-920A6163A6F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1F1011B-A3A9-4F32-833B-F5BB43AD34CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BAD40A-BE40-411C-A5E3-19C264BF4805", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-5350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF1BC082-71CF-4C4D-8A4A-57981B476466", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7EA9832-4E75-4295-B0AE-AB632B043FCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-5650u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E85B6E71-1376-4856-BF27-0CD2718FF7FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCD85430-4610-41B7-B7BD-CD3AA5391FB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m-5y71_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7643B75E-E3F4-4D99-9DD4-D26D68D169C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F011F80-4FBA-490D-AF5F-F6DDC941CB61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m-5y70_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAA0EBB7-B00B-4E07-AD14-E68B0243F113", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*", "matchCriteriaId": "091D17D3-213F-4EC7-81C3-CD96AB7BC89C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E600C57D-AF4C-44F2-B1FB-E6B7D6CBE58F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB4C2ED4-CF69-44D8-859F-9A186FFF27E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m5-6y54_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D356C5D1-2FFD-4762-9FB4-E553CE9E030A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "0504478A-E635-4A8B-A3F2-BE0E5908A7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95AA95C2-806A-4F8B-BD55-EDCEC16A587C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "831048A2-657F-4F2C-83AC-802DF45204A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m-5y31_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DC64A4A-5397-45C8-A9D7-1C6FA8CF0929", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m-5y31:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF8CEB91-F0AF-4254-B566-5B69D25CBFBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m-5y51_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A9E35A1-C36B-4106-9085-1258E8276CA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A5C29F-3597-4846-8CEC-74C8C73740C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59288E55-4880-42D0-8022-1FAB33E468FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*", "matchCriteriaId": "232B0352-B020-4CAA-A5E3-38E75A157C4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m-5y10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "758AD850-98AE-47F5-ACC3-146BC712ECA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*", "matchCriteriaId": "71AF96FE-EB28-474A-B260-EC22B4A334A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m-5y10a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927FB6B2-68DE-4396-9F11-9DE7FF20C80D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "80F61261-1AF5-4B77-8065-25A6B0AFFEEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_silver_j5040_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B37489-5B01-4B98-AF04-2DC3B3E7B3A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*", "matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_silver_n5030_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE311495-060E-48A8-B90D-73E2CD6E4DC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA31DE89-2BE5-4743-9694-A37DFAEC2C36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9116354-0807-4089-A6C1-9A5DF87D8795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A16C20E0-57F2-422E-ABD6-5BA1E35FC590", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB623CE2-3D25-46F6-B7E6-08825275D9E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF2583-34CA-4D67-8E8E-3E790EB00DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11E57CFC-7A4F-42A3-9637-BF296CC7CB22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B73E3E-322B-4BCC-A1AF-AF9F763073F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D12EFB3F-E57A-49AB-83E4-48BFA59D3704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_silver_j5005_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4770D33C-0C3A-4FC3-967C-2CD5E1F6DF9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_silver_n5000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAAF4781-186B-4FC1-B8FC-D7F4A6966034", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5DE990B-B3E8-4037-8502-8C72575A9BB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1237FF-E3A8-4491-9FBE-995820495490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_g4560t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3D1872D-0814-41B5-8042-D648BFB57F61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_g4560t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0186DE49-94AE-4E39-8138-4E11B251E718", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28381986-24F5-48B7-AADC-886D040D037F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g4560_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9941DA97-65C9-440E-AE42-DDA001993457", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g4560:-:*:*:*:*:*:*:*", "matchCriteriaId": "2034243D-EDB2-4D28-9523-B4BD9B066F93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g4600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48D04EB9-90FE-4666-AA6F-9CB5D9D312B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g4600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E6C4E88-80BB-47FE-B14E-0F8EAB73F6FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g4620_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AB33586-7342-4F4B-AB29-B35FCCC5AC72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g4620:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2CA778-54C3-477E-8185-5AE7C7A5F0F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_g4600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2CD8446-AFB1-4CC3-9F9B-18F6306D5A7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_g4600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A94D9124-0FE4-473E-ABBC-42E59C783D12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_j4205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F1EC1E8-3F5F-4671-9B8D-C977C7C01AED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_d1519_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97EEEA27-6DA8-4B85-A0F3-0EABC72A50E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_d1519:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CF08B9D-D383-4FA6-A88C-E440E21C37A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_j3710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B204A73-26AE-4EF3-8632-508803EBE5BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*", "matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_a1020_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D54A49E8-E3B1-4F3C-B0C5-AE113B519F46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_a1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "E22E23ED-8D32-4C9C-8043-3F0C16C1A477", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_d1517_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "867C83D4-76B3-4219-86AD-EFEF52F495C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_d1517:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FC02016-4DFD-4F7F-A0A7-1763C44EBA39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_d1508_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53042A9-CF42-4D22-9DC8-E5E3D101F425", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_d1508:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C59D361-E4EF-4349-BD22-8E53B38F0DB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_d1509_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FFCB8F6-573A-4FAF-9266-DAB4FE2E7B0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_d1509:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528737C-57B3-465E-910C-EA984A281F00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_d1507_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "433EC55E-6048-4C0D-923C-F6A448453D5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_d1507:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A780AAA-8317-4F7B-BC0C-AD27323C45DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_g4400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "432F9B99-C2AB-404D-830B-04C4CA2CFD10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_g4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85AE2D5-1BA9-45F5-808A-166E27D7D6CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_4405u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "55D3A3E4-8149-4450-86CC-C1451E465246", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_4405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4156AF88-99DA-4331-93A9-07F2049D6B07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_4405y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C6EBCB9-F884-429E-AC6F-C403E2103FDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_4405y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F17DA0-EAF5-4BE0-B6CE-AE710C3F871E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_3825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CE25013-BE5C-452D-9CED-E7D05E02DDED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_3825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB91D35-0E4F-478A-AE1E-7C8645DA51E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_3805u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9724D229-6E84-4978-AE1E-5E3E71D950FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_3805u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E24661E-9974-466F-AA8E-C57048DD0978", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_n3540_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0FF3E-B5B7-4272-8CB8-4F4215D3F9C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_3560m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C97242A-940E-4525-A8E8-2CDB94A6E2D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_3560m:-:*:*:*:*:*:*:*", "matchCriteriaId": "489DA073-57C8-4904-90B7-F4E94CA34DDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_n3530_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F4085C3-E941-4196-99B9-E7D396907C08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1ECBE6A-40DB-4842-978B-F3AB8AE91D75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0B5FB2-188C-4B07-A529-D2649BF8434E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EBEF475-B1B9-4BF3-8CF0-6A864F66696D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "357102D6-1E13-4FD9-856D-2D42453DCFF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56BD8E2E-6328-4DEA-8A21-0738CC87C6A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "970FCDB0-2FC6-4AF7-B640-224893D19143", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*", "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56BD8E2E-6328-4DEA-8A21-0738CC87C6A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E3D9F3C-4C12-4BA2-A03C-D01B6BBBF475", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*", "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08659BD6-1BF1-4D9D-8DB7-B480A0C4153B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*", "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD35500F-CDA5-49AC-AC54-E2D5D335FD61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*", "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C12EF12-2606-4769-8460-A5CD082CCB44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*", "matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC0E07A-F8B3-44C6-8B30-5A603FA6FFA8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*", "matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4BC5341-2826-4A95-93DD-05EC013E4769", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6075F975-9589-44FD-BF37-230B22FC1303", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DACD411C-B72B-4B04-A496-75937031D5BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1705760B-5F38-4C39-88FC-5526CBDF7974", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "930BC589-7692-46A2-B872-C4697018F015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8E1791C-8B39-4F04-B8C1-AABCF9D9696F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0223B4-4A5B-446A-AAA2-95896285658F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "209244AF-F533-4550-BB5D-C326B28E0E16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2629221-AED6-4C72-8E08-11F85912F198", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC156034-C02F-4334-A6CF-D16DDC1464AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DE4E28B-EBB6-496D-B639-FA2941155BCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EC5969A-90D0-4A74-87A3-B1B9BABB6A9E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A6D739-A483-41C0-8D2D-0ECA2336B735", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E6B91F-D0CC-4358-B511-FD69F27E86D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5FF6565-D585-454F-BECA-D3B1D55DF1FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5501903-8981-48B6-9C6A-614C2351280C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34BA0C9A-4288-407F-8ACC-C6F839E04741", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC6EC17-2A04-4BE5-BA94-1B02FD7B5845", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCDABB69-268D-498C-B11E-09EA06E4000C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*", "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8AE2B2-8768-4A11-AE8D-16568C3133E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*", "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E88B57-83A1-47FE-9DC1-B3D0CB0A9264", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70F7725D-3171-4DF8-BBF3-3DE2BC537420", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*", "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17787B53-A329-4089-8599-0CE6553D9F6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B21BB2-FB68-4B01-94C5-D5F0D193001A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6E50BA-30AB-4910-A908-BB977FCC0DBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3440A44-2149-4216-8675-E8D8D659ACA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E2CBF2E-DA42-403A-9DAE-CB66128F06E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "310FBAF2-A386-4C80-B238-8968D8C0BB41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7512275F-3577-430B-9377-44EA37FBA308", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*", "matchCriteriaId": "22828766-08EF-430F-A0F0-F59E772E38B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF7727B-7F22-4B85-87A9-EBBBC783C140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*", "matchCriteriaId": "37662BCE-5344-4938-8AE7-2025D9F4D4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB2E14AD-3B48-40EF-B07C-675445A73AB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B130F009-C77E-496D-9A6C-1140559A54FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D70B1E1B-B170-4C29-AC1D-7A51A0FBC33D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE7313A-56E8-4041-9CF9-9BBA430CD9A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE8499B5-2CE1-4E17-AD0D-48EBCC464251", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EB95463-05B4-4BCD-894E-3EFA944CB418", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52ED8318-017D-4941-8D5C-B6CBB89B0B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B0288C6-F7DD-4D0F-9C3E-0C0835FD5ED3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5CFD725-7C31-4020-B5ED-C47C310717BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC3B9962-455F-4215-9E0D-4AE380C36DDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C55884-A90F-4FE7-B4C9-772ECD1606F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9278297-5E4B-40D0-8782-E5AE87E43B7B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "891BC1FA-F2D3-40DF-B9C2-760DBA21BFA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5EF6E96-034B-47B0-8B88-5D5EC9B995A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E197F6CD-BB7F-4053-A92C-63D1C0ECB55B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "matchCriteriaId": "226CBC16-EC2A-4498-ADB3-655A0E9CF396", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50F2F50E-8D52-41B2-A43A-369D213D826A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*", "matchCriteriaId": "83A9423B-08A0-4721-8868-7E7E3E0ABA4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3BBD0DF-DC34-40A9-B0B3-4A00847AFA2E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D7291F-752E-409F-82BE-6060BA5E2559", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C49ECFD-BEE9-4AA1-9341-B29CBB0CA5EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "matchCriteriaId": "11A64939-F09B-4FEC-8F1D-FAC34D8E14BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B99121-D844-44E0-99E7-9C4C5CACB138", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "25BC4638-06F6-41C9-BF0F-74037F24CBEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F6DA909-971C-437D-BA18-46C2D8E37E99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C02B3D0E-93A7-4DCB-8CE5-7EEEA58FFEF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F055D55-7881-4416-AB20-217490A3EB5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5723C9D-E59D-4FA3-893F-D79E726025C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C609DC3B-BCC1-48D8-8BDA-5F2C441A96A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "25847980-2D7B-4D4B-B0F2-C2CAB648182C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:atom_x7-e3950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D54333EB-CA61-4F9B-805B-AE26F4254412", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:atom_x5-e3940_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB0B2DF-4B96-42A4-8A71-548C28905BC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:atom_x5-e3930_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40155034-0A0D-4848-8DBF-BC46C2D42A38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "216DE05B-001E-47FE-B35A-55319B095853", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E35FCE26-90AE-4D68-AEA3-8C0F0E9C6917", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6A6C110-BE1A-4D3E-A048-D63F4F64B1E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D19BB027-D927-4D06-A580-6C6E3E077B7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "666DC282-15F9-4FA1-AD5F-2C75D5C0EFF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEA4F635-86BE-409A-A619-9EEA4C4B4FBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F981A8EE-13BB-42C2-91D0-631247A03CB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A3CE35-5572-4355-B063-08DA49917126", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB8F7DCA-3FA7-4943-9458-13695F529BBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ECFB4D6-CDF8-4FE7-9B9A-41935C0431AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4C619D6-6275-465E-9023-25EEFC298711", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5111864-B660-4603-BC03-94A719C8D2EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EE48BFF-CCB4-423D-968C-013060E447E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C056C18D-457C-4216-8B91-84A4628DE44E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D1273C6-1F76-4366-88A2-A3955CB1CE3D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9BABD0-E0D7-4D9D-B998-0FB23612E7BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3540784A-1B0B-41EE-AB66-A293AC400C39", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39616E34-9182-485B-B6AE-566DE2E77AA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C562AA0-3A76-4223-A5E4-13B2898FBC43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F68C14E0-5711-4D18-B529-AA0EE3BDC99C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DFD79A0-2F24-484C-AD4A-D58B7414788E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE469B71-77FC-4940-AF10-631D73DEF18A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA2E0EEF-1C40-4227-835D-A0DB28BDAF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E6609BC-7E90-41F9-91A3-4139100D7A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98D6031F-201E-4FF2-A233-BF4C96ECF4B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF1AC701-DF74-457B-8CB6-FA35E0E78F29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC07C3B-8ECF-4BF1-A08D-907319EFFC34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29EEEF17-0881-448C-A984-D5EFCB0F68EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1A528C2-662C-40B1-8C71-A5A4134A6314", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F222C991-CA9F-48FB-AC22-D8F6B837F8D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F40D7630-3069-4AF7-B2B9-9AFF96A43AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08DFA1D1-C133-4152-A66A-C70800905E17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C9C4CE2-F65F-41FE-947C-16AD1558D03B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE808573-A9E6-4DFE-82E1-08546F5BF451", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9EB59BF-2708-4C3C-BA60-F621E067D824", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "80F61A3B-2BBF-4CAB-A0EA-61AFF378FAA8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "36FAB23F-A289-42E6-BA8E-C4A061A9604C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4ABBE1-EE80-4FED-BBA7-A552BE31A826", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A73DA92B-919E-4F75-A4A7-54E7F892BB24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1490C2DA-4627-4BAC-A505-E434A81FBDC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B263A8AF-03E7-4B05-888B-3395A2B10BF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA1C21E5-81FF-45EE-836B-E809C8F34440", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7C6423-2E99-41D6-AD38-17658F1B1D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61B6C0D6-7463-4E69-B24E-4C50987773E0", "versionEndExcluding": "15.45.5077", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "2E4973AC-8422-4F4C-8786-0A1AD018F6FC", "versionEndExcluding": "4.4.201", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "FED1D8B8-CB66-4B84-83F2-C323FC9AA5AC", "versionEndExcluding": "4.9.201", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "FADD0779-ED16-462C-A64B-14AFE89A1CDB", "versionEndExcluding": "4.14.154", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "C4AFF9AF-E488-47E1-8BCF-80E9B25FC469", "versionEndExcluding": "4.19.84", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:linux:*:*", "matchCriteriaId": "9B0DD7E6-ADC4-4125-95B9-C572812A491D", "versionEndExcluding": "5.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Un control de acceso insuficiente en un subsistema para Intel\u00ae processor graphics en 6th, 7th, 8th and 9th Generation Intel\u00ae Core(TM) Processor Families; Intel\u00ae Pentium\u00ae Processor J, N, Silver y Gold Series; Intel\u00ae Celeron\u00ae Processor J, N, G3900 y G4900 Series; Intel\u00ae Atom\u00ae Processor A y E3900 Series; Intel\u00ae Xeon\u00ae Processor E3-1500 v5 y v6, E-2100 y E-2200 Processor Families; Intel\u00ae Graphics Driver para versiones de Windows anteriores a 26.20.100.6813 (DCH) o 26.20.100.6812 y versiones anteriores a 21.20.x.5077 (tambi\u00e9n se conoce como 15.45.5077), i915 Linux Driver para Intel\u00ae Processor Graphics versiones anteriores a 5.4-rc7, 5.3. 11, 4.19.84, 4.14.154, 4.9.201, 4.4.201, puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2019-0155", "lastModified": "2024-11-21T04:16:21.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T19:15:12.877", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3841" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3887" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3889" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3908" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0204" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Nov/26" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "url": "https://support.f5.com/csp/article/K73659122?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4186-2/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3887" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Nov/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K73659122?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4186-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access." }, { "lang": "es", "value": "Control de acceso insuficiente en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario sin privilegios escape de una m\u00e1quina virtual \"guest-to-host\" mediante acceso local." } ], "id": "CVE-2018-12223", "lastModified": "2024-11-21T03:44:48.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.367", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access." }, { "lang": "es", "value": "Una Condici\u00f3n de Carrera en Intel (R) Graphics Drivers anterior a las versiones 10.18.14.5067 (conocida como 15.36.x.5067) y 10.18.10.5069 (conocida como 15.33.x.5069) puede admitir que un usuario autenticado habilite potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2019-0114", "lastModified": "2024-11-21T04:16:15.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.610", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-05-15 14:29
Modified
2024-11-21 04:05
Severity ?
Summary
Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "EABE3895-7448-4C74-9484-008509B43448", "versionEndIncluding": "15.40.37.4835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3867C23-092B-4B0F-8325-C29D3705A04A", "versionEndIncluding": "20.19.15.4835", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access." }, { "lang": "es", "value": "Vulnerabilidad de comprobaci\u00f3n de l\u00edmites en User Mode Driver en Intel Graphics Driver 15.40.x.4 y 21.20.x.x permite que un usuario sin privilegios provoque una denegaci\u00f3n de servicio mediante el acceso local." } ], "id": "CVE-2018-3611", "lastModified": "2024-11-21T04:05:46.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-15T14:29:00.247", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00109.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00109.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 18:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper initialization in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.29.5077, and 26.20.100.7000 may allow a privileged user to potentially enable a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7250C6F-1E48-4E0B-AACB-52D4FC3F494D", "versionEndExcluding": "15.40.44.5107", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA51DABD-467C-4A2E-BE13-F91471170BB5", "versionEndExcluding": "15.45.29.5077", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F954EF-554D-4637-AA09-E0EFDBD0F666", "versionEndExcluding": "26.20.100.7000", "versionStartIncluding": "26.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper initialization in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.29.5077, and 26.20.100.7000 may allow a privileged user to potentially enable a denial of service via local access." }, { "lang": "es", "value": "Una inicializaci\u00f3n inapropiada en Intel(R) Graphics Drivers versiones anteriores a 15.40.44.5107, 15.45.29.5077 y 26.20.100.7000, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0506", "lastModified": "2024-11-21T04:53:38.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T18:15:12.180", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 19:15
Modified
2024-11-21 04:20
Severity ?
Summary
Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
netapp | cloud_backup | - | |
netapp | data_availability_services | - | |
netapp | steelstore_cloud_integrated_storage | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "61B6C0D6-7463-4E69-B24E-4C50987773E0", "versionEndExcluding": "15.45.5077", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BCD29DB2-A66B-4831-B20F-A56C741676D5", "versionEndExcluding": "26.20.100.6812", "versionStartIncluding": "24.20.100.6025", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una corrupci\u00f3n de la memoria en el Kernel Mode Driver en Intel\u00ae Graphics Driver versiones anteriores a la versi\u00f3n 26.20.100.6813 (DCH) o 26.20.100.6812, puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2019-11112", "lastModified": "2024-11-21T04:20:33.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T19:15:13.017", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." }, { "lang": "es", "value": "Posible corrupci\u00f3n de memoria en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00edan permitir que un usuario sin privilegios provoque una denegaci\u00f3n de servicio mediante acceso local." } ], "id": "CVE-2018-12213", "lastModified": "2024-11-21T03:44:47.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.037", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-17 20:15
Modified
2024-11-21 05:41
Severity ?
Summary
Improper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
microsoft | windows_10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DBEBB37-A8F8-498E-B1D2-9B6BA9C3958B", "versionEndExcluding": "27.20.100.9316", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "La inicializaci\u00f3n incorrecta en el instalador para algunos controladores Intel\u00ae Graphics DCH para Windows 10 versiones anteriores a 27.20.100.9316, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local" } ], "id": "CVE-2021-0120", "lastModified": "2024-11-21T05:41:58.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-17T20:15:09.087", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 20:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BE8AC041-F704-4D5C-9972-D2482EE10FBA", "versionEndExcluding": "25.20.100.6519", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada insuficiente en el m\u00f3dulo Kernel Mode para Intel\u00ae Graphics Driver versiones anteriores a 25.20.100.6519 puede habilitar a un usuario autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2019-11089", "lastModified": "2024-11-21T04:20:31.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T20:15:11.680", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-10 18:29
Modified
2024-11-21 03:44
Severity ?
Summary
Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.33.47.5059 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.36.35.5057 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:*:*:*", "matchCriteriaId": "34E5968D-A8DF-48A4-8B2D-3FD3D4CAA33B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:*:*:*", "matchCriteriaId": "BD8D4743-2DA3-4638-956D-CD816C063D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:*:*:*", "matchCriteriaId": "FFF3AA02-FA3E-407E-9DAB-D849B3192226", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.47.5059:*:*:*:*:*:*:*", "matchCriteriaId": "D8CBA701-583B-42FF-997A-1492372FAB9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*", "matchCriteriaId": "1E25D2E3-B3C5-4D54-AC38-51EA755753DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*", "matchCriteriaId": "565BC82E-A142-4660-B14A-E6D53FFCB39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*", "matchCriteriaId": "116D57F0-4884-4545-BDDA-2C97474DD95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*", "matchCriteriaId": "E9875754-1D9E-4547-B6F8-35D49EF10A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*", "matchCriteriaId": "24752A43-443A-434A-AE3C-3FC6537FCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.35.5057:*:*:*:*:*:*:*", "matchCriteriaId": "6ADFD9FC-1236-4414-A7CF-459840B117CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "E9DB6338-23B0-4C1D-97C2-345A22EDCFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*", "matchCriteriaId": "8D7C8297-0E65-4659-8049-34401194D0FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*", "matchCriteriaId": "58D10DEC-49BC-4226-83CE-0C4B805CD296", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:*:*:*", "matchCriteriaId": "F1FDD8D7-E7EA-4758-A8FA-8B0D038485B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:*:*:*", "matchCriteriaId": "EBCDCF96-ACF9-4074-AEC0-2EA9CAE43577", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access." }, { "lang": "es", "value": "Denegaci\u00f3n de servicio (DoS) en Unified Shader Compiler en Intel Graphics Drivers en versiones anteriores a la 10.18.x.5056 (tambi\u00e9n conocida como 15.33.x.5056), 10.18.x.5057 (tambi\u00e9n conocida como 15.36.x.5057) y 20.19.x.5058 (tambi\u00e9n conocida como 15.40.x.5058) podr\u00eda permitir que un usuario sin privilegios de un invitado de m\u00e1quina virtual provoque el cierre inesperado del sistema host mediante acceso local." } ], "id": "CVE-2018-12153", "lastModified": "2024-11-21T03:44:40.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-10T18:29:03.920", "references": [ { "source": "secure@intel.com", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" }, { "source": "secure@intel.com", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105582" }, { "source": "secure@intel.com", "url": "https://support.apple.com/kb/HT210634" }, { "source": "secure@intel.com", "url": "https://support.apple.com/kb/HT210722" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient access control in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to read device configuration information via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient access control in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to read device configuration information via local access." }, { "lang": "es", "value": "Control de acceso insuficiente en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario privilegiado lea informaci\u00f3n de configuraci\u00f3n del dispositivo mediante acceso local." } ], "id": "CVE-2018-12217", "lastModified": "2024-11-21T03:44:48.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.177", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 21:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E14AC99-60EC-4A7C-9F25-C9A270C1A27A", "versionEndExcluding": "26.20.100.7212", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en Intel\u00ae Graphics Drivers versiones anteriores a la versi\u00f3n 26.20.100.7212, puede permitir a un usuario autenticado habilitar una denegaci\u00f3n de servicio por medio de acceso local." } ], "id": "CVE-2020-0567", "lastModified": "2024-11-21T04:53:46.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T21:15:14.297", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-01 15:29
Modified
2024-11-21 03:28
Severity ?
Summary
Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://www.securityfocus.com/bid/104957 | Third Party Advisory, VDB Entry | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104957 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.36.19.64.4170 | |
intel | graphics_driver | 15.36.19.4170 | |
intel | graphics_driver | 15.36.21.64.4223 | |
intel | graphics_driver | 15.36.21.4222 | |
intel | graphics_driver | 15.36.23.64.4251 | |
intel | graphics_driver | 15.36.23.4251 | |
intel | graphics_driver | 15.36.24.64.4264 | |
intel | graphics_driver | 15.36.24.4264 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.29.64.4371 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.36.35.5057 | |
intel | graphics_driver | 15.40.0.64.4279 | |
intel | graphics_driver | 15.40.10.4300 | |
intel | graphics_driver | 15.40.28.64.4501 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.45.9.64.4534 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.19.64.4170:*:*:*:*:*:*:*", "matchCriteriaId": "86AB3801-E266-42CD-8793-9427B2ACFCC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.19.4170:*:*:*:*:*:*:*", "matchCriteriaId": "82DEA672-792E-48F2-873B-87C734896805", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.21.64.4223:*:*:*:*:*:*:*", "matchCriteriaId": "29DC2F14-3AA5-40CC-A846-7DE0A46DA86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.21.4222:*:*:*:*:*:*:*", "matchCriteriaId": "998E3509-575A-44E1-B0BA-D7787BF1B2D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.23.64.4251:*:*:*:*:*:*:*", "matchCriteriaId": "3CF10A26-4036-455F-A94F-4A401716955F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.23.4251:*:*:*:*:*:*:*", "matchCriteriaId": "3DF99D82-EA86-4408-B7CA-B3846DDF65EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.24.64.4264:*:*:*:*:*:*:*", "matchCriteriaId": "5E09F45F-4FCA-4920-8415-CB033FFAB463", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.24.4264:*:*:*:*:*:*:*", "matchCriteriaId": "BFE511F6-BCD5-4F37-895D-A3E5308FE7ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*", "matchCriteriaId": "1E25D2E3-B3C5-4D54-AC38-51EA755753DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*", "matchCriteriaId": "565BC82E-A142-4660-B14A-E6D53FFCB39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.29.64.4371:*:*:*:*:*:*:*", "matchCriteriaId": "26ADA2F7-7689-440E-AF08-02AF8F85619E", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*", "matchCriteriaId": "116D57F0-4884-4545-BDDA-2C97474DD95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*", "matchCriteriaId": "E9875754-1D9E-4547-B6F8-35D49EF10A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*", "matchCriteriaId": "24752A43-443A-434A-AE3C-3FC6537FCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.35.5057:*:*:*:*:*:*:*", "matchCriteriaId": "6ADFD9FC-1236-4414-A7CF-459840B117CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.0.64.4279:*:*:*:*:*:*:*", "matchCriteriaId": "1EC2C626-D1E8-4195-902A-232A7FCFE6DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.10.4300:*:*:*:*:*:*:*", "matchCriteriaId": "DED8DA08-83A0-497F-8E02-F8F62E1164A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.28.64.4501:*:*:*:*:*:*:*", "matchCriteriaId": "7D0DA5E7-66E5-47D9-A0D7-75DE119B74F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "E9DB6338-23B0-4C1D-97C2-345A22EDCFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.9.64.4534:*:*:*:*:*:*:*", "matchCriteriaId": "483FB1A8-4CD3-4450-A579-98C3DE45AF4F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack." }, { "lang": "es", "value": "Una condici\u00f3n de lectura fuera de l\u00edmites en versiones antiguas de algunos controladores Intel Graphics para ramas de c\u00f3digo de Windows permite que usuarios locales realicen un ataque de denegaci\u00f3n de servicio." } ], "id": "CVE-2017-5692", "lastModified": "2024-11-21T03:28:13.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-01T15:29:00.237", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104957" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:55
Severity ?
Summary
Out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Lectura fuera de l\u00edmites en igdkm64.sys en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario autenticado provoque una denegaci\u00f3n de servicio (DoS) mediante acceso local." } ], "id": "CVE-2018-18090", "lastModified": "2024-11-21T03:55:27.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.443", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-12 20:29
Modified
2024-11-21 03:28
Severity ?
Summary
Type Confusion in Content Protection HECI Service in Intel Graphics Driver allows unprivileged user to elevate privileges via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33 | |
intel | graphics_driver | 15.36 | |
intel | graphics_driver | 15.40 | |
intel | graphics_driver | 15.45 | |
intel | graphics_driver | 15.46 | |
intel | graphics_driver | 15.47 | |
intel | graphics_driver | 15.49 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33:*:*:*:*:*:*:*", "matchCriteriaId": "E953C915-AE8C-41FC-910A-E7E753BE80AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36:*:*:*:*:*:*:*", "matchCriteriaId": "6587FA95-482E-460A-8528-9A14F6D011C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40:*:*:*:*:*:*:*", "matchCriteriaId": "DF36FB24-B964-4BDE-A86C-28FBEE7DA539", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45:*:*:*:*:*:*:*", "matchCriteriaId": "99AF58D2-4CE6-46CC-AFF9-4CD28C38E8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.46:*:*:*:*:*:*:*", "matchCriteriaId": "21D47F52-E22F-4879-8FF0-9BD223911948", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.47:*:*:*:*:*:*:*", "matchCriteriaId": "35D3A073-86D2-4876-97FE-58BECF6F6D4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.49:*:*:*:*:*:*:*", "matchCriteriaId": "C6F56E35-3B47-4133-91A5-9EFC90181B58", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Type Confusion in Content Protection HECI Service in Intel Graphics Driver allows unprivileged user to elevate privileges via local access." }, { "lang": "es", "value": "Confusi\u00f3n de tipos en Content Protection HECI Service en Intel Graphics Driver permite que usuarios sin privilegios eleven privilegios mediante acceso local." } ], "id": "CVE-2017-5717", "lastModified": "2024-11-21T03:28:17.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-12T20:29:00.287", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00095\u0026languageid=en-fr" }, { "source": "secure@intel.com", "url": "https://www.exploit-db.com/exploits/43373/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00095\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/43373/" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-704" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 18:15
Modified
2024-11-21 04:53
Severity ?
Summary
Buffer overflow in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0D882C7-BCD1-4A44-AFB7-90672FA8184E", "versionEndExcluding": "26.20.100.6912", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable a denial of service via local access." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en Intel(R) Graphics Drivers versiones anteriores a 26.20.100.6912, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0501", "lastModified": "2024-11-21T04:53:37.623", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T18:15:11.790", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access." }, { "lang": "es", "value": "La comprobaci\u00f3n insuficiente de l\u00edmites en Intel (R) Graphics Drivers anterior a las versiones 10.18.14.5067 (tambi\u00e9n conocida como 15.36.x.5067) y 10.18.10.5069 (tambi\u00e9n conocida como 15.33.x.5069) puede admitir que un usuario autenticado habilite potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2019-0113", "lastModified": "2024-11-21T04:16:15.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.563", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:*:*:*", "matchCriteriaId": "34E5968D-A8DF-48A4-8B2D-3FD3D4CAA33B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:*:*:*", "matchCriteriaId": "BD8D4743-2DA3-4638-956D-CD816C063D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:*:*:*", "matchCriteriaId": "FFF3AA02-FA3E-407E-9DAB-D849B3192226", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*", "matchCriteriaId": "1E25D2E3-B3C5-4D54-AC38-51EA755753DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*", "matchCriteriaId": "565BC82E-A142-4660-B14A-E6D53FFCB39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*", "matchCriteriaId": "116D57F0-4884-4545-BDDA-2C97474DD95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*", "matchCriteriaId": "E9875754-1D9E-4547-B6F8-35D49EF10A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*", "matchCriteriaId": "24752A43-443A-434A-AE3C-3FC6537FCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "E9DB6338-23B0-4C1D-97C2-345A22EDCFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*", "matchCriteriaId": "8D7C8297-0E65-4659-8049-34401194D0FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*", "matchCriteriaId": "58D10DEC-49BC-4226-83CE-0C4B805CD296", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:*:*:*", "matchCriteriaId": "F1FDD8D7-E7EA-4758-A8FA-8B0D038485B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:*:*:*", "matchCriteriaId": "EBCDCF96-ACF9-4074-AEC0-2EA9CAE43577", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:*:*:*", "matchCriteriaId": "BA3A67F6-415F-4B0E-AA2B-40286CC492A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:*:*:*", "matchCriteriaId": "2B637567-0958-488D-ACCA-E5A61D71433A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:*:*:*", "matchCriteriaId": "9579A4DB-D506-4570-9C40-1CB4BD666A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:*:*:*", "matchCriteriaId": "09F53D97-D600-4AB1-8898-2491AC8B90A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:*:*:*", "matchCriteriaId": "9BD4933D-2CE7-43C5-A69F-564FA426C44A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:*:*:*", "matchCriteriaId": "2B4B7AE8-F258-4C7A-B148-E04ED1291159", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:*:*:*", "matchCriteriaId": "7243B482-C7F0-4168-9F8A-22872E141513", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:*:*:*", "matchCriteriaId": "A5C5C641-583B-4B90-BD70-59AC5B9996E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:*:*:*", "matchCriteriaId": "979DC154-CCE0-429B-A70E-AFD9F8CA5DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:*:*:*", "matchCriteriaId": "FCAEB64E-D941-41F9-B88D-603B53039A66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." }, { "lang": "es", "value": "M\u00faltiples desreferencias de puntero en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00edan permitir que un usuario sin privilegios provoque una denegaci\u00f3n de servicio mediante acceso local." } ], "id": "CVE-2018-12210", "lastModified": "2024-11-21T03:44:47.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:00.927", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FF5F789-6861-40CF-8684-A2325BCFBB80", "versionEndExcluding": "15.36.38.5117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." }, { "lang": "es", "value": "Una escritura fuera de l\u00edmites en Intel(R) Graphics Drivers versiones anteriores a 15.36.38.5117, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios o una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0517", "lastModified": "2024-11-21T04:53:39.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.800", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 18:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper conditions check in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure and denial of service via local
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D014D7-B878-4DD8-A1D3-82FC177B819C", "versionEndExcluding": "15.33.49.5100", "versionStartIncluding": "15.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAB4DEB-3BCE-48A0-AAB9-842129D5DEC5", "versionEndExcluding": "15.36.38.5117", "versionStartIncluding": "15.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7250C6F-1E48-4E0B-AACB-52D4FC3F494D", "versionEndExcluding": "15.40.44.5107", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB43B202-E327-43C3-8F68-A1CC5E6C8300", "versionEndExcluding": "15.45.30.5103", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8DA53F9-E6E1-41B2-979B-4237C42E5860", "versionEndExcluding": "26.20.100.7212", "versionStartIncluding": "26.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper conditions check in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure and denial of service via local" }, { "lang": "es", "value": "Una comprobaci\u00f3n de condiciones inapropiadas en Intel(R) Graphics Drivers versiones anteriores a 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103 y 26.20.100.7212, puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n y una denegaci\u00f3n de servicio por medio de un acceso local" } ], "id": "CVE-2020-0505", "lastModified": "2024-11-21T04:53:38.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T18:15:12.103", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-10 18:29
Modified
2024-11-21 03:44
Severity ?
Summary
Pointer corruption in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unauthenticated remote user to potentially execute arbitrary WebGL code via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.33.47.5059 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.36.35.5057 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:*:*:*", "matchCriteriaId": "34E5968D-A8DF-48A4-8B2D-3FD3D4CAA33B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:*:*:*", "matchCriteriaId": "BD8D4743-2DA3-4638-956D-CD816C063D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:*:*:*", "matchCriteriaId": "FFF3AA02-FA3E-407E-9DAB-D849B3192226", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.47.5059:*:*:*:*:*:*:*", "matchCriteriaId": "D8CBA701-583B-42FF-997A-1492372FAB9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*", "matchCriteriaId": "1E25D2E3-B3C5-4D54-AC38-51EA755753DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*", "matchCriteriaId": "565BC82E-A142-4660-B14A-E6D53FFCB39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*", "matchCriteriaId": "116D57F0-4884-4545-BDDA-2C97474DD95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*", "matchCriteriaId": "E9875754-1D9E-4547-B6F8-35D49EF10A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*", "matchCriteriaId": "24752A43-443A-434A-AE3C-3FC6537FCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.35.5057:*:*:*:*:*:*:*", "matchCriteriaId": "6ADFD9FC-1236-4414-A7CF-459840B117CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "E9DB6338-23B0-4C1D-97C2-345A22EDCFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*", "matchCriteriaId": "8D7C8297-0E65-4659-8049-34401194D0FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*", "matchCriteriaId": "58D10DEC-49BC-4226-83CE-0C4B805CD296", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:*:*:*", "matchCriteriaId": "F1FDD8D7-E7EA-4758-A8FA-8B0D038485B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:*:*:*", "matchCriteriaId": "EBCDCF96-ACF9-4074-AEC0-2EA9CAE43577", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pointer corruption in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unauthenticated remote user to potentially execute arbitrary WebGL code via local access." }, { "lang": "es", "value": "Corrupci\u00f3n de punteros en Unified Shader Compiler en Intel Graphics Drivers en versiones anteriores a la 10.18.x.5056 (tambi\u00e9n conocida como 15.33.x.5056), 10.18.x.5057 (tambi\u00e9n conocida como 15.36.x.5057) y 20.19.x.5058 (tambi\u00e9n conocida como 15.40.x.5058) podr\u00eda permitir que un usuario remoto no autenticado ejecute c\u00f3digo WebGL arbitrario mediante acceso local." } ], "id": "CVE-2018-12152", "lastModified": "2024-11-21T03:44:39.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-10T18:29:03.827", "references": [ { "source": "secure@intel.com", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" }, { "source": "secure@intel.com", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105582" }, { "source": "secure@intel.com", "url": "https://support.apple.com/kb/HT210634" }, { "source": "secure@intel.com", "url": "https://support.apple.com/kb/HT210722" }, { "source": "secure@intel.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:55
Severity ?
Summary
Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access." }, { "lang": "es", "value": "Uso de memoria previamente liberada en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario sin privilegios provoque una denegaci\u00f3n de servicio mediante acceso local." } ], "id": "CVE-2018-18091", "lastModified": "2024-11-21T03:55:28.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.477", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read device configuration information via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read device configuration information via local access." }, { "lang": "es", "value": "Control de acceso insuficiente en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario sin privilegios lea informaci\u00f3n de configuraci\u00f3n del dispositivo mediante acceso local." } ], "id": "CVE-2018-12209", "lastModified": "2024-11-21T03:44:47.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:00.880", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 21:15
Modified
2024-11-21 04:53
Severity ?
Summary
Uncontrolled search path in Intel(R) Graphics Drivers before version 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "376711A0-AED9-47E9-B05C-9C6B7B92CA58", "versionEndExcluding": "26.20.100.7158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in Intel(R) Graphics Drivers before version 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una ruta de b\u00fasqueda no controlada en Intel\u00ae Graphics Drivers versiones anteriores a la versi\u00f3n 26.20.100.7158, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2020-0565", "lastModified": "2024-11-21T04:53:46.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T21:15:14.233", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an integer overflow via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an integer overflow via local access." }, { "lang": "es", "value": "Validaci\u00f3n de entradas insuficiente en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario no privilegiado provoque un desbordamiento de enteros mediante acceso local." } ], "id": "CVE-2018-12221", "lastModified": "2024-11-21T03:44:48.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.303", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
An out of bound read in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow a privileged user to potentially enable denial of service via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out of bound read in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow a privileged user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmite en el m\u00f3dulo KMD para Intel(R) Graphics Driver antes de las versiones 10.18.14.5067 (conocida como 15.36.x.5067) y 10.18.10.5069 (conocida como 15.33.x.5069) puede admitir a un usuario privilegiado habilitar potencialmente la denegaci\u00f3n de Servicio por medio de un acceso local." } ], "id": "CVE-2019-0116", "lastModified": "2024-11-21T04:16:15.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.737", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an out of bound memory read via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an out of bound memory read via local access." }, { "lang": "es", "value": "Validaci\u00f3n de entradas insuficiente en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario sin privilegios provoque una lectura de memoria fuera de l\u00edmites mediante acceso local." } ], "id": "CVE-2018-12222", "lastModified": "2024-11-21T03:44:48.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.333", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Logic bug in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logic bug in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access." }, { "lang": "es", "value": "Error de l\u00f3gica en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario privilegiado ejecute c\u00f3digo arbitrario mediante acceso local." } ], "id": "CVE-2018-12220", "lastModified": "2024-11-21T03:44:48.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.270", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." }, { "lang": "es", "value": "Validaci\u00f3n de entradas insuficiente en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00edan permitir que un usuario sin privilegios provoque una denegaci\u00f3n de servicio mediante acceso local." } ], "id": "CVE-2018-12211", "lastModified": "2024-11-21T03:44:47.287", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:00.977", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108385 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Una insuficiente validaci\u00f3n de entrada en el m\u00f3dulo KMD para Intel(R) Graphics Driver anterior a las versiones 10.18.14.5067 (conocido como 15.36.x.5067) y 10.18.10.5069 (conocida como 15.33.x.5069) puede admitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2019-0115", "lastModified": "2024-11-21T04:16:15.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.673", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7463 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EAF936A-8AD0-4683-B8FC-F775323960BD", "versionEndExcluding": "26.20.100.7463", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7463 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Un control de acceso inapropiado en Intel(R) Graphics Drivers versiones anteriores a 26.20.100.7463, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0516", "lastModified": "2024-11-21T04:53:39.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.737", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html" }, { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access." }, { "lang": "es", "value": "Validaci\u00f3n de entradas insuficiente en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario privilegiado provoque una denegaci\u00f3n de servicio mediante acceso local." } ], "id": "CVE-2018-12215", "lastModified": "2024-11-21T03:44:47.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.117", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 20:15
Modified
2024-11-21 04:20
Severity ?
Summary
Pointer corruption in the Unified Shader Compiler in Intel(R) Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "432FA622-05A0-45ED-87D4-3394F8BE32D5", "versionEndExcluding": "15.36.37.5074", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pointer corruption in the Unified Shader Compiler in Intel(R) Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una corrupci\u00f3n del puntero en el Unified Shader Compiler en Intel\u00ae Graphics Drivers versiones anteriores a la versi\u00f3n 10.18.14.5074 (tambi\u00e9n se conoce como 15.36.x.5074) puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2019-11111", "lastModified": "2024-11-21T04:20:33.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T20:15:11.743", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00edan permitir que un usuario sin privilegios provoque una denegaci\u00f3n de servicio mediante acceso local." } ], "id": "CVE-2018-12212", "lastModified": "2024-11-21T03:44:47.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.007", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 20:15
Modified
2024-11-21 04:20
Severity ?
Summary
Buffer overflow in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | 15.22.54.64.2622 | |
intel | graphics_driver | 15.22.54.2622 | |
intel | graphics_driver | 15.22.58.64.2993 | |
intel | graphics_driver | 15.22.58.2993 | |
intel | graphics_driver | 15.28.24.64.4229 | |
intel | graphics_driver | 15.28.24.4229 | |
intel | graphics_driver | 15.33.48.5069 | |
intel | graphics_driver | 15.36.36.5067 | |
intel | graphics_driver | 15.36.37.5074 | |
intel | graphics_driver | 15.40.1.64.4256 | |
intel | graphics_driver | 15.40.7.64.4279 | |
intel | graphics_driver | 15.40.14.4352 | |
intel | graphics_driver | 15.40.26.4474 | |
intel | graphics_driver | 15.40.42.5063 | |
intel | graphics_driver | 15.45.26.5065 | |
intel | graphics_driver | 15.45.27.5068 | |
intel | graphics_driver | 15.45.29.5077 | |
netapp | cloud_backup | - | |
netapp | data_availability_services | - | |
netapp | steelstore_cloud_integrated_storage | - | |
netapp | solidfire_baseboard_management_controller_firmware | - | |
netapp | solidfire_baseboard_management_controller | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "378FC31D-33FF-4607-A818-4604A9E98655", "versionEndExcluding": "25.20.100.6618", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.22.54.64.2622:*:*:*:*:windows:*:*", "matchCriteriaId": "9C595E84-D8E9-4E46-BB72-B85E2D9B94E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.22.54.2622:*:*:*:*:windows:*:*", "matchCriteriaId": "7E1110C3-3BBC-412C-8D1F-E1B51669227A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.22.58.64.2993:*:*:*:*:windows:*:*", "matchCriteriaId": "6AB512E2-C4A7-4841-8EFD-FC1C98816F08", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.22.58.2993:*:*:*:*:windows:*:*", "matchCriteriaId": "98978C8A-B949-4F82-AE3B-FB69C77CF5B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.28.24.64.4229:*:*:*:*:windows:*:*", "matchCriteriaId": "76C4842C-5A90-4E32-8C72-418E33028568", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.28.24.4229:*:*:*:*:windows:*:*", "matchCriteriaId": "697F5FED-EE68-4F14-B29E-094981811708", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.48.5069:*:*:*:*:windows:*:*", "matchCriteriaId": "1882348F-5F4B-4CDE-9BC3-8213AAAAB01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.36.5067:*:*:*:*:windows:*:*", "matchCriteriaId": "697DFDD9-E9EA-42EE-954C-5097B519C67C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.37.5074:*:*:*:*:windows:*:*", "matchCriteriaId": "520A4675-7507-4833-9B3E-78ACDCEC1B34", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.1.64.4256:*:*:*:*:windows:*:*", "matchCriteriaId": "8627B6D2-D584-46E4-85DE-15193D241D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.7.64.4279:*:*:*:*:windows:*:*", "matchCriteriaId": "FF6E65E4-8386-49D3-AC62-937733A4F51B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.14.4352:*:*:*:*:windows:*:*", "matchCriteriaId": "442682EC-1F78-4143-B7D0-73CC6E14EBFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.26.4474:*:*:*:*:windows:*:*", "matchCriteriaId": "DEFF6687-84C6-4E9B-A813-01CEA7552959", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.42.5063:*:*:*:*:windows:*:*", "matchCriteriaId": "38E85AF2-BA8A-45B8-9D6F-F8AC4EB80DBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.26.5065:*:*:*:*:windows:*:*", "matchCriteriaId": "18483DF6-2866-41DA-974F-59E4AAA86CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.27.5068:*:*:*:*:windows:*:*", "matchCriteriaId": "1116694E-C681-4F52-8345-687A540E6696", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.29.5077:*:*:*:*:windows:*:*", "matchCriteriaId": "2F87B518-5CA4-414A-BD81-8D903AEE9723", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en el m\u00f3dulo Kernel Mode para Intel\u00ae Graphics Driver versiones anteriores a 25.20.100.6618 (DCH) o 21.20.x.5077 (tambi\u00e9n se conoce como 15.45.5077), puede habilitar a un usuario privilegiado para permitir una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local." } ], "id": "CVE-2019-11113", "lastModified": "2024-11-21T04:20:33.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T20:15:11.807", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-11 13:15
Modified
2024-11-21 05:41
Severity ?
Summary
Use after free in some Intel(R) Graphics Driver before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_drivers | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADF23CBE-D75F-44CC-90E9-3DFFCB626563", "versionEndExcluding": "15.40.47.5166", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FB68BA4-6BFD-4535-9C41-BB9609B19B21", "versionEndExcluding": "15.45.33.5164", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*", "matchCriteriaId": "462EECB9-DB9F-46D7-955F-C6A63D2A404F", "versionEndExcluding": "27.20.100.9030", "versionStartIncluding": "27.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in some Intel(R) Graphics Driver before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Un uso de memoria previamente liberada en algunos Controladores de Gr\u00e1ficos Intel(R) versiones anteriores a 27.20.100.8336, 15.45.33.5164 y 15.40.47.5166, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso local" } ], "id": "CVE-2021-0012", "lastModified": "2024-11-21T05:41:42.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-11T13:15:15.817", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html" }, { "source": "secure@intel.com", "tags": [ "Not Applicable" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 18:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E14AC99-60EC-4A7C-9F25-C9A270C1A27A", "versionEndExcluding": "26.20.100.7212", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Un control de acceso inapropiado en Intel(R) Graphics Drivers versiones anteriores a 26.20.100.7212, puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local." } ], "id": "CVE-2020-0503", "lastModified": "2024-11-21T04:53:37.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T18:15:11.947", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Buffer leakage in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:*:*:*", "matchCriteriaId": "34E5968D-A8DF-48A4-8B2D-3FD3D4CAA33B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:*:*:*", "matchCriteriaId": "BD8D4743-2DA3-4638-956D-CD816C063D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:*:*:*", "matchCriteriaId": "FFF3AA02-FA3E-407E-9DAB-D849B3192226", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*", "matchCriteriaId": "1E25D2E3-B3C5-4D54-AC38-51EA755753DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*", "matchCriteriaId": "565BC82E-A142-4660-B14A-E6D53FFCB39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*", "matchCriteriaId": "116D57F0-4884-4545-BDDA-2C97474DD95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*", "matchCriteriaId": "E9875754-1D9E-4547-B6F8-35D49EF10A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*", "matchCriteriaId": "24752A43-443A-434A-AE3C-3FC6537FCAA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "E9DB6338-23B0-4C1D-97C2-345A22EDCFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*", "matchCriteriaId": "8D7C8297-0E65-4659-8049-34401194D0FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*", "matchCriteriaId": "58D10DEC-49BC-4226-83CE-0C4B805CD296", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:*:*:*", "matchCriteriaId": "F1FDD8D7-E7EA-4758-A8FA-8B0D038485B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:*:*:*", "matchCriteriaId": "EBCDCF96-ACF9-4074-AEC0-2EA9CAE43577", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:*:*:*", "matchCriteriaId": "BA3A67F6-415F-4B0E-AA2B-40286CC492A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:*:*:*", "matchCriteriaId": "2B637567-0958-488D-ACCA-E5A61D71433A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:*:*:*", "matchCriteriaId": "9579A4DB-D506-4570-9C40-1CB4BD666A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:*:*:*", "matchCriteriaId": "09F53D97-D600-4AB1-8898-2491AC8B90A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:*:*:*", "matchCriteriaId": "9BD4933D-2CE7-43C5-A69F-564FA426C44A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:*:*:*", "matchCriteriaId": "2B4B7AE8-F258-4C7A-B148-E04ED1291159", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:*:*:*", "matchCriteriaId": "7243B482-C7F0-4168-9F8A-22872E141513", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:*:*:*", "matchCriteriaId": "A5C5C641-583B-4B90-BD70-59AC5B9996E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:*:*:*", "matchCriteriaId": "979DC154-CCE0-429B-A70E-AFD9F8CA5DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:*:*:*", "matchCriteriaId": "FCAEB64E-D941-41F9-B88D-603B53039A66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer leakage in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Filtrado de b\u00fafer en igdkm64.sys en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario autenticado provoque una divulgaci\u00f3n de informaci\u00f3n mediante acceso local." } ], "id": "CVE-2018-12224", "lastModified": "2024-11-21T03:44:48.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.380", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D014D7-B878-4DD8-A1D3-82FC177B819C", "versionEndExcluding": "15.33.49.5100", "versionStartIncluding": "15.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAB4DEB-3BCE-48A0-AAB9-842129D5DEC5", "versionEndExcluding": "15.36.38.5117", "versionStartIncluding": "15.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7250C6F-1E48-4E0B-AACB-52D4FC3F494D", "versionEndExcluding": "15.40.44.5107", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB43B202-E327-43C3-8F68-A1CC5E6C8300", "versionEndExcluding": "15.45.30.5103", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B60CA50-4975-4295-99F7-D14A1C401776", "versionEndExcluding": "26.20.100.7584", "versionStartIncluding": "26.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access" }, { "lang": "es", "value": "El elemento de ruta de b\u00fasqueda no controlada en el instalador para Intel(R) Graphics Drivers versiones anteriores a 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 y 15.33.49.5100, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-0515", "lastModified": "2024-11-21T04:53:39.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.643", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access." }, { "lang": "es", "value": "Posible corrupci\u00f3n de memoria en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00edan permitir que un usuario privilegiado ejecute c\u00f3digo arbitrario mediante acceso local." } ], "id": "CVE-2018-12214", "lastModified": "2024-11-21T03:44:47.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.067", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 20:15
Modified
2024-11-21 04:26
Severity ?
Summary
Improper access control in the API for the Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9B5A438B-28FF-4FB8-A209-11DF240B9DC5", "versionEndExcluding": "26.20.100.7209", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in the API for the Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Un control de acceso inapropiado en la API para Intel\u00ae Graphics Driver versiones anteriores a la versi\u00f3n 26.20.100.7209 puede habilitar a un usuario autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local." } ], "id": "CVE-2019-14590", "lastModified": "2024-11-21T04:26:59.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T20:15:11.913", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "C455EB37-2C1B-4892-85A1-DDDCBDE22F2A", "versionEndExcluding": "15.40.44.5107", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access." }, { "lang": "es", "value": "Una excepci\u00f3n no capturada en el controlador del sistema para Intel(R) Graphics Drivers versiones anteriores a 15.40.44.5107, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0511", "lastModified": "2024-11-21T04:53:38.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.520", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read memory via local access via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read memory via local access via local access." }, { "lang": "es", "value": "Validaci\u00f3n de entradas insuficiente en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario sin privilegios lea memoria mediante acceso local." } ], "id": "CVE-2018-12219", "lastModified": "2024-11-21T03:44:48.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.240", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Unhandled exception in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a memory leak via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unhandled exception in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a memory leak via local access." }, { "lang": "es", "value": "Excepci\u00f3n sin gestionar en el controlador del modo de usuario en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario sin privilegios provoque un filtrado mediante acceso local." } ], "id": "CVE-2018-12218", "lastModified": "2024-11-21T03:44:48.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.210", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-12-13 18:59
Modified
2024-11-21 02:54
Severity ?
Summary
The igdkmd64 module in the Intel Graphics Driver through 15.33.42.435, 15.36.x through 15.36.30.4385, and 15.40.x through 15.40.4404 on Windows allows local users to cause a denial of service (crash) or gain privileges via a crafted D3DKMTEscape request.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/91708 | Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.talosintelligence.com/reports/TALOS-2016-0087/ | Exploit, Third Party Advisory | |
cret@cert.org | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054&languageid=en-fr | Patch, Vendor Advisory | |
cret@cert.org | https://support.lenovo.com/us/en/product_security/ps500068 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91708 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.talosintelligence.com/reports/TALOS-2016-0087/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054&languageid=en-fr | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/us/en/product_security/ps500068 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8D7ADC7-629C-4BFE-98E8-E4875961E080", "versionEndIncluding": "15.33.42.4358", "versionStartIncluding": "15.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F0C2BC8-4981-4082-AE5E-7B0A5D3A9020", "versionEndIncluding": "15.36.30.4385", "versionStartIncluding": "15.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7768E2B-FFD9-4EBE-A429-D543656B140C", "versionEndIncluding": "15.40.4404", "versionStartIncluding": "15.40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The igdkmd64 module in the Intel Graphics Driver through 15.33.42.435, 15.36.x through 15.36.30.4385, and 15.40.x through 15.40.4404 on Windows allows local users to cause a denial of service (crash) or gain privileges via a crafted D3DKMTEscape request." }, { "lang": "es", "value": "El m\u00f3dulo igdkmd64 en el Intel Graphics Driver hasta la versi\u00f3n 15.33.42.435, 15.36.x hasta la versi\u00f3n 15.36.30.4385 y 15.40.x hasta la versi\u00f3n 15.40.4404 en Windows pernute a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda) u obtener privilegios a trav\u00e9s de una petici\u00f3n D3DKMTEscape manipulada." } ], "id": "CVE-2016-5647", "lastModified": "2024-11-21T02:54:45.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-12-13T18:59:00.197", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91708" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.talosintelligence.com/reports/TALOS-2016-0087/" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054\u0026languageid=en-fr" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/product_security/ps500068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.talosintelligence.com/reports/TALOS-2016-0087/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/product_security/ps500068" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-18 01:29
Modified
2024-11-21 03:28
Severity ?
Summary
Untrusted search path in Intel Graphics Driver 15.40.x.x, 15.45.x.x, and 21.20.x.x allows unprivileged user to elevate privileges via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | 15.40.1.64.4256 | |
intel | graphics_driver | 15.40.4.64.4256 | |
intel | graphics_driver | 15.40.7.64.4279 | |
intel | graphics_driver | 15.40.14.4352 | |
intel | graphics_driver | 15.40.26.4474 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D838FFC-C618-4AC2-B761-0CE558EDEF30", "versionEndExcluding": "21.20.16.4860", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.1.64.4256:*:*:*:*:*:*:*", "matchCriteriaId": "17C2024D-1B35-44CD-8918-3549D92D8B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.4.64.4256:*:*:*:*:*:*:*", "matchCriteriaId": "6A142D12-514E-4B13-A77E-A63D2525A2DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.7.64.4279:*:*:*:*:*:*:*", "matchCriteriaId": "DE08572D-F0E3-4F5E-A5E1-D69486E87129", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.14.4352:*:*:*:*:*:*:*", "matchCriteriaId": "30B59E90-097C-4BF8-BCDE-321C810D1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.26.4474:*:*:*:*:*:*:*", "matchCriteriaId": "61E584F3-65D0-4D38-ABBB-83C86CDF169D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "E9DB6338-23B0-4C1D-97C2-345A22EDCFEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*", "matchCriteriaId": "8D7C8297-0E65-4659-8049-34401194D0FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*", "matchCriteriaId": "58D10DEC-49BC-4226-83CE-0C4B805CD296", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:*:*:*", "matchCriteriaId": "BA3A67F6-415F-4B0E-AA2B-40286CC492A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:*:*:*", "matchCriteriaId": "2B637567-0958-488D-ACCA-E5A61D71433A", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:*:*:*", "matchCriteriaId": "9579A4DB-D506-4570-9C40-1CB4BD666A69", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:*:*:*", "matchCriteriaId": "09F53D97-D600-4AB1-8898-2491AC8B90A8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path in Intel Graphics Driver 15.40.x.x, 15.45.x.x, and 21.20.x.x allows unprivileged user to elevate privileges via local access." }, { "lang": "es", "value": "Una ruta de b\u00fasqueda no fiable en Intel Graphics Driver 15.40.x.x, 15.45.x.x y 21.20.x.x permite que un usuario sin privilegios eleve sus privilegios mediante acceso local." } ], "id": "CVE-2017-5696", "lastModified": "2024-11-21T03:28:14.463", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-18T01:29:00.617", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00080\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00080\u0026languageid=en-fr" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D014D7-B878-4DD8-A1D3-82FC177B819C", "versionEndExcluding": "15.33.49.5100", "versionStartIncluding": "15.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAB4DEB-3BCE-48A0-AAB9-842129D5DEC5", "versionEndExcluding": "15.36.38.5117", "versionStartIncluding": "15.36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." }, { "lang": "es", "value": "Un control de acceso inapropiado para Intel(R) Graphics Drivers versiones anteriores a 15.33.49.5100 y 15.36.38.5117, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios o una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0519", "lastModified": "2024-11-21T04:53:39.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.893", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:55
Severity ?
Summary
Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 | |
intel | graphics_driver | 15.40.41.5058 | |
intel | graphics_driver | 15.45.18.4664 | |
intel | graphics_driver | 15.45.19.4678 | |
intel | graphics_driver | 15.45.21.4821 | |
intel | graphics_driver | 15.45.23.4860 | |
intel | graphics_driver | 24.20.100.6025 | |
intel | graphics_driver | 24.20.100.6094 | |
intel | graphics_driver | 24.20.100.6136 | |
intel | graphics_driver | 24.20.100.6194 | |
intel | graphics_driver | 24.20.100.6229 | |
intel | graphics_driver | 24.20.100.6286 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*", "matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*", "matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*", "matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*", "matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*", "matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*", "matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*", "matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*", "matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*", "matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*", "matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*", "matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*", "matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*", "matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*", "matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*", "matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*", "matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*", "matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*", "matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*", "matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*", "matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*", "matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*", "matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*", "matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "M\u00faltiples lecturas fuera de l\u00edmites en igdkm64.sys en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00edan permitir que un usuario autenticado provoque una divulgaci\u00f3n de informaci\u00f3n mediante acceso local." } ], "id": "CVE-2018-18089", "lastModified": "2024-11-21T03:55:27.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:01.427", "references": [ { "source": "secure@intel.com", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-10-15 18:29
Modified
2024-11-21 03:44
Severity ?
Summary
Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | 15.33.43.4425 | |
intel | graphics_driver | 15.33.45.4653 | |
intel | graphics_driver | 15.33.46.4885 | |
intel | graphics_driver | 15.36.26.4294 | |
intel | graphics_driver | 15.36.28.4332 | |
intel | graphics_driver | 15.36.31.4414 | |
intel | graphics_driver | 15.36.33.4578 | |
intel | graphics_driver | 15.36.34.4889 | |
intel | graphics_driver | 15.40.34.4624 | |
intel | graphics_driver | 15.40.36.4703 | |
intel | graphics_driver | 15.40.37.4835 | |
intel | graphics_driver | 15.40.38.4963 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:graphics_driver:15.33.43.4425:*:*:*:*:*:*:*", "matchCriteriaId": "7847862C-9367-42E2-B178-D09345F416EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.33.45.4653:*:*:*:*:*:*:*", "matchCriteriaId": "2F600263-6180-4777-B4C7-E6CCC17B2C60", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.33.46.4885:*:*:*:*:*:*:*", "matchCriteriaId": "01081B49-332E-41B3-9869-B7DF5C0310D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.36.26.4294:*:*:*:*:*:*:*", "matchCriteriaId": "1A612C80-E552-4862-9414-4A35CBF16913", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.36.28.4332:*:*:*:*:*:*:*", "matchCriteriaId": "F74D3784-D9CF-4840-9D19-ABC7C5E4383D", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.36.31.4414:*:*:*:*:*:*:*", "matchCriteriaId": "92AF2FDB-2D26-4F6D-972E-414DECD1EF02", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.36.33.4578:*:*:*:*:*:*:*", "matchCriteriaId": "F9B2C1C4-8708-4E3C-A67F-CDBA429FBE4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.36.34.4889:*:*:*:*:*:*:*", "matchCriteriaId": "D86EC210-6789-4115-9B3E-9D1D30CDB38B", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*", "matchCriteriaId": "F7222C2E-A27E-41EF-A05B-D5EEB8574CC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*", "matchCriteriaId": "13843BEF-EB51-41ED-AC47-1A51E04DC0E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*", "matchCriteriaId": "61D9C958-53FF-4AE5-8BC9-6B262E1A286F", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:graphics_driver:15.40.38.4963:*:*:*:*:*:*:*", "matchCriteriaId": "540034FE-5215-46E0-8F5F-2C816A67BFF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access." }, { "lang": "es", "value": "Denegaci\u00f3n de servicio (DoS) en Unified Shader Compiler en Intel Graphics Drivers en versiones anteriores a la 10.18.x.5056 (tambi\u00e9n conocida como 15.33.x.5056), 10.18.x.5057 (tambi\u00e9n conocida como 15.36.x.5057) y 20.19.x.5058 (tambi\u00e9n conocida como 15.40.x.5058) podr\u00eda permitir que un usuario sin privilegios cree un bucle infinito y provoque el cierre inesperado de una aplicaci\u00f3n mediante acceso local." } ], "id": "CVE-2018-12154", "lastModified": "2024-11-21T03:44:40.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-15T18:29:10.997", "references": [ { "source": "secure@intel.com", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" }, { "source": "secure@intel.com", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105582" }, { "source": "secure@intel.com", "url": "https://support.apple.com/kb/HT210634" }, { "source": "secure@intel.com", "url": "https://support.apple.com/kb/HT210722" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Incorrect default permissions in the installer for Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D014D7-B878-4DD8-A1D3-82FC177B819C", "versionEndExcluding": "15.33.49.5100", "versionStartIncluding": "15.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAB4DEB-3BCE-48A0-AAB9-842129D5DEC5", "versionEndExcluding": "15.36.38.5117", "versionStartIncluding": "15.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7250C6F-1E48-4E0B-AACB-52D4FC3F494D", "versionEndExcluding": "15.40.44.5107", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB43B202-E327-43C3-8F68-A1CC5E6C8300", "versionEndExcluding": "15.45.30.5103", "versionStartIncluding": "15.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8DA53F9-E6E1-41B2-979B-4237C42E5860", "versionEndExcluding": "26.20.100.7212", "versionStartIncluding": "26.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions in the installer for Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unos permisos predeterminados incorrectos en el instalador para Intel(R) Graphics Drivers versiones anteriores a 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103 y 26.20.100.7212, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2020-0508", "lastModified": "2024-11-21T04:53:38.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.457", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 20:15
Modified
2024-11-21 04:26
Severity ?
Summary
Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9B5A438B-28FF-4FB8-A209-11DF240B9DC5", "versionEndExcluding": "26.20.100.7209", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Una validaci\u00f3n de entrada inapropiada en la API para Intel\u00ae Graphics Driver versiones anteriores a la versi\u00f3n 26.20.100.7209 puede habilitar a un usuario autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2019-14591", "lastModified": "2024-11-21T04:26:59.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T20:15:11.993", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 20:15
Modified
2024-11-21 04:53
Severity ?
Summary
Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * | |
intel | graphics_driver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D014D7-B878-4DD8-A1D3-82FC177B819C", "versionEndExcluding": "15.33.49.5100", "versionStartIncluding": "15.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DAB4DEB-3BCE-48A0-AAB9-842129D5DEC5", "versionEndExcluding": "15.36.38.5117", "versionStartIncluding": "15.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7250C6F-1E48-4E0B-AACB-52D4FC3F494D", "versionEndExcluding": "15.40.44.5107", "versionStartIncluding": "15.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB43B202-E327-43C3-8F68-A1CC5E6C8300", "versionEndExcluding": "15.45.30.5103", "versionStartIncluding": "15.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." }, { "lang": "es", "value": "Un salto de ruta en la biblioteca igdkmd64.sys para Intel(R) Graphics Drivers versiones anteriores a 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 y 15.33.49.5100, puede permitir a un usuario autentificado habilitar potencialmente una escalada de privilegios o una denegaci\u00f3n de servicio por medio de un acceso local." } ], "id": "CVE-2020-0520", "lastModified": "2024-11-21T04:53:39.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T20:15:12.957", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-0501
Vulnerability from cvelistv5
Published
2020-03-12 17:42
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Buffer overflow in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 26.20.100.691 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 26.20.100.691" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:21", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 26.20.100.691" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0501", "datePublished": "2020-03-12T17:42:56", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12153
Vulnerability from cvelistv5
Published
2018-10-10 18:00
Modified
2024-09-16 23:15
Severity ?
EPSS score ?
Summary
Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105582 | vdb-entry, x_refsource_BID | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT210634 | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT210722 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2019/Oct/56 | mailing-list, x_refsource_FULLDISC | |
http://seclists.org/fulldisclosure/2019/Oct/55 | mailing-list, x_refsource_FULLDISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Graphics Driver |
Version: Various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:57.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105582", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105582" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210634" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Graphics Driver", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Various" } ] } ], "datePublic": "2018-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-01T06:06:42", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "105582", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105582" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210634" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-10-09T00:00:00", "ID": "CVE-2018-12153", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Graphics Driver", "version": { "version_data": [ { "version_value": "Various" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "105582", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105582" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "name": "https://support.apple.com/kb/HT210634", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210634" }, { "name": "https://support.apple.com/kb/HT210722", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12153", "datePublished": "2018-10-10T18:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T23:15:48.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11089
Vulnerability from cvelistv5
Published
2019-11-14 19:05
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:16.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:09", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11089", "datePublished": "2019-11-14T19:05:53", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:40:16.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12217
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 18:59
Severity ?
EPSS score ?
Summary
Insufficient access control in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to read device configuration information via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient access control in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to read device configuration information via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12217", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient access control in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to read device configuration information via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12217", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T18:59:36.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0115
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/108385 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Graphics Driver KMD module |
Version: Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069). |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108385" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver KMD module", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-20T16:06:03", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108385" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver KMD module", "version": { "version_data": [ { "version_value": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108385" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0115", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18090
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 00:51
Severity ?
EPSS score ?
Summary
Out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:01:14.850Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-18090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-18090", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-10-09T00:00:00", "dateUpdated": "2024-09-17T00:51:03.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12214
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 19:05
Severity ?
EPSS score ?
Summary
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12214", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12214", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T19:05:34.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0565
Vulnerability from cvelistv5
Published
2020-03-12 20:49
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Uncontrolled search path in Intel(R) Graphics Drivers before version 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 26.20.100.7158 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 26.20.100.7158" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in Intel(R) Graphics Drivers before version 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:16", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 26.20.100.7158" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Uncontrolled search path in Intel(R) Graphics Drivers before version 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0565", "datePublished": "2020-03-12T20:49:02", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5692
Vulnerability from cvelistv5
Published
2018-08-01 15:00
Modified
2024-09-17 03:48
Severity ?
EPSS score ?
Summary
Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/104957 | vdb-entry, x_refsource_BID | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Mobile, Desktop, Server, Workstation, and Embedded processors based on Intel Core and Atom Processors using an affected driver. |
Version: Multiple |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "104957", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104957" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mobile, Desktop, Server, Workstation, and Embedded processors based on Intel Core and Atom Processors using an affected driver.", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple" } ] } ], "datePublic": "2017-07-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-04T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "104957", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104957" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-07-31T00:00:00", "ID": "CVE-2017-5692", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mobile, Desktop, Server, Workstation, and Embedded processors based on Intel Core and Atom Processors using an affected driver.", "version": { "version_data": [ { "version_value": "Multiple" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read condition in older versions of some Intel Graphics Driver for Windows code branches allows local users to perform a denial of service attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "104957", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104957" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00077.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5692", "datePublished": "2018-08-01T15:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-17T03:48:56.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0502
Vulnerability from cvelistv5
Published
2020-03-12 17:42
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper access control in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 26.20.100.6912 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 26.20.100.6912" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:19", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0502", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 26.20.100.6912" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0502", "datePublished": "2020-03-12T17:42:40", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0507
Vulnerability from cvelistv5
Published
2020-03-12 17:41
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Unquoted service path in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 15.33.49.5100 Version: 15.36.38.5117 Version: 15.40.44.5107 Version: 15.45.30.5103 Version: 26.20.100.7212 - See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 15.33.49.5100" }, { "status": "affected", "version": "15.36.38.5117" }, { "status": "affected", "version": "15.40.44.5107" }, { "status": "affected", "version": "15.45.30.5103" }, { "status": "affected", "version": "26.20.100.7212 - See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Unquoted service path in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:14", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 15.33.49.5100" }, { "version_value": "15.36.38.5117" }, { "version_value": "15.40.44.5107" }, { "version_value": "15.45.30.5103" }, { "version_value": "26.20.100.7212 - See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unquoted service path in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0507", "datePublished": "2020-03-12T17:41:33", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12221
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 16:32
Severity ?
EPSS score ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an integer overflow via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an integer overflow via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12221", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an integer overflow via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12221", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T16:32:35.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14574
Vulnerability from cvelistv5
Published
2019-11-14 19:04
Modified
2024-08-05 00:19
Severity ?
EPSS score ?
Summary
Out of bounds read in a subsystem for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:19:41.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Out of bounds read in a subsystem for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:10", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-14574", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out of bounds read in a subsystem for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-14574", "datePublished": "2019-11-14T19:04:52", "dateReserved": "2019-08-03T00:00:00", "dateUpdated": "2024-08-05T00:19:41.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0511
Vulnerability from cvelistv5
Published
2020-03-12 19:58
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 15.40.44.5107 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 15.40.44.5107" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:25", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 15.40.44.5107" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Uncaught exception in system driver for Intel(R) Graphics Drivers before version 15.40.44.5107 may allow an authenticated user to potentially enable a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0511", "datePublished": "2020-03-12T19:58:16", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12210
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 03:48
Severity ?
EPSS score ?
Summary
Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.596Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:05", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12210", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12210", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-17T03:48:48.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0517
Vulnerability from cvelistv5
Published
2020-03-12 19:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 15.36.38.5117 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 15.36.38.5117" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:23", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0517", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 15.36.38.5117" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0517", "datePublished": "2020-03-12T19:59:58", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0503
Vulnerability from cvelistv5
Published
2020-03-12 17:43
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 26.20.100.7212 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 26.20.100.7212" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:20", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0503", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 26.20.100.7212" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0503", "datePublished": "2020-03-12T17:43:59", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0505
Vulnerability from cvelistv5
Published
2020-03-12 17:43
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper conditions check in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure and denial of service via local
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 15.33.49.5100 Version: 15.36.38.5117 Version: 15.40.44.5107 Version: 15.45.30.5103 Version: 26.20.100.7212 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 15.33.49.5100" }, { "status": "affected", "version": "15.36.38.5117" }, { "status": "affected", "version": "15.40.44.5107" }, { "status": "affected", "version": "15.45.30.5103" }, { "status": "affected", "version": "26.20.100.7212" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper conditions check in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure and denial of service via local" } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:24", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 15.33.49.5100" }, { "version_value": "15.36.38.5117" }, { "version_value": "15.40.44.5107" }, { "version_value": "15.45.30.5103" }, { "version_value": "26.20.100.7212" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper conditions check in Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable information disclosure and denial of service via local" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0505", "datePublished": "2020-03-12T17:43:52", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14591
Vulnerability from cvelistv5
Published
2019-11-14 19:05
Modified
2024-08-05 00:19
Severity ?
EPSS score ?
Summary
Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:19:41.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:10", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-14591", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-14591", "datePublished": "2019-11-14T19:05:29", "dateReserved": "2019-08-03T00:00:00", "dateUpdated": "2024-08-05T00:19:41.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11113
Vulnerability from cvelistv5
Published
2019-11-14 19:06
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Buffer overflow in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:07.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:11", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11113", "datePublished": "2019-11-14T19:06:14", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:48:07.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5727
Vulnerability from cvelistv5
Published
2018-02-02 15:00
Modified
2024-09-17 02:00
Severity ?
EPSS score ?
Summary
Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Graphics Driver |
Version: 15.40.x.x Version: 15.45.x.x Version: 15.46.x.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089\u0026languageid=en-fr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Graphics Driver", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "15.40.x.x" }, { "status": "affected", "version": "15.45.x.x" }, { "status": "affected", "version": "15.46.x.x" } ] } ], "datePublic": "2018-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T14:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089\u0026languageid=en-fr" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-01-31T00:00:00", "ID": "CVE-2017-5727", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Graphics Driver", "version": { "version_data": [ { "version_value": "15.40.x.x" }, { "version_value": "15.45.x.x" }, { "version_value": "15.46.x.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00089\u0026languageid=en-fr" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5727", "datePublished": "2018-02-02T15:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-17T02:00:44.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12152
Vulnerability from cvelistv5
Published
2018-10-10 18:00
Modified
2024-09-16 16:58
Severity ?
EPSS score ?
Summary
Pointer corruption in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unauthenticated remote user to potentially execute arbitrary WebGL code via local access.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105582 | vdb-entry, x_refsource_BID | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT210634 | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT210722 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2019/Oct/56 | mailing-list, x_refsource_FULLDISC | |
http://seclists.org/fulldisclosure/2019/Oct/55 | mailing-list, x_refsource_FULLDISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Graphics Driver |
Version: Various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:57.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105582", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105582" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210634" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Graphics Driver", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Various" } ] } ], "datePublic": "2018-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Pointer corruption in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unauthenticated remote user to potentially execute arbitrary WebGL code via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-01T06:06:39", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "105582", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105582" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210634" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-10-09T00:00:00", "ID": "CVE-2018-12152", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Graphics Driver", "version": { "version_data": [ { "version_value": "Various" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pointer corruption in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unauthenticated remote user to potentially execute arbitrary WebGL code via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "105582", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105582" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "name": "https://support.apple.com/kb/HT210634", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210634" }, { "name": "https://support.apple.com/kb/HT210722", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12152", "datePublished": "2018-10-10T18:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T16:58:35.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5696
Vulnerability from cvelistv5
Published
2018-01-18 01:00
Modified
2024-09-16 18:34
Severity ?
EPSS score ?
Summary
Untrusted search path in Intel Graphics Driver 15.40.x.x, 15.45.x.x, and 21.20.x.x allows unprivileged user to elevate privileges via local access.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00080&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Graphics Driver |
Version: 15.40.x.x Version: 15.45.x.x Version: 21.20.x.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.533Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00080\u0026languageid=en-fr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Graphics Driver", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "15.40.x.x" }, { "status": "affected", "version": "15.45.x.x" }, { "status": "affected", "version": "21.20.x.x" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path in Intel Graphics Driver 15.40.x.x, 15.45.x.x, and 21.20.x.x allows unprivileged user to elevate privileges via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure/Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-18T00:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00080\u0026languageid=en-fr" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-01-16T00:00:00", "ID": "CVE-2017-5696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Graphics Driver", "version": { "version_data": [ { "version_value": "15.40.x.x" }, { "version_value": "15.45.x.x" }, { "version_value": "21.20.x.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path in Intel Graphics Driver 15.40.x.x, 15.45.x.x, and 21.20.x.x allows unprivileged user to elevate privileges via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure/Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00080\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00080\u0026languageid=en-fr" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5696", "datePublished": "2018-01-18T01:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T18:34:32.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5717
Vulnerability from cvelistv5
Published
2017-12-12 20:00
Modified
2024-09-16 20:58
Severity ?
EPSS score ?
Summary
Type Confusion in Content Protection HECI Service in Intel Graphics Driver allows unprivileged user to elevate privileges via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/43373/ | exploit, x_refsource_EXPLOIT-DB | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00095&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Graphics Driver |
Version: 15.49/15.47/15.46/15.45/15.40/15.36/15.33 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43373", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43373/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00095\u0026languageid=en-fr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Graphics Driver", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "15.49/15.47/15.46/15.45/15.40/15.36/15.33" } ] } ], "datePublic": "2017-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Type Confusion in Content Protection HECI Service in Intel Graphics Driver allows unprivileged user to elevate privileges via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-21T10:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "43373", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43373/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00095\u0026languageid=en-fr" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-12-12T00:00:00", "ID": "CVE-2017-5717", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Graphics Driver", "version": { "version_data": [ { "version_value": "15.49/15.47/15.46/15.45/15.40/15.36/15.33" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Type Confusion in Content Protection HECI Service in Intel Graphics Driver allows unprivileged user to elevate privileges via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "43373", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43373/" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00095\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00095\u0026languageid=en-fr" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5717", "datePublished": "2017-12-12T20:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T20:58:05.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0116
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
An out of bound read in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow a privileged user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/108385 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Graphics Driver KMD module |
Version: Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069). |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108385" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver KMD module", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } ], "descriptions": [ { "lang": "en", "value": "An out of bound read in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow a privileged user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-20T16:06:03", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108385" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver KMD module", "version": { "version_data": [ { "version_value": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out of bound read in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow a privileged user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108385" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0116", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0508
Vulnerability from cvelistv5
Published
2020-03-12 19:58
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Incorrect default permissions in the installer for Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 15.33.49.5100 Version: 15.36.38.5117 Version: 15.40.44.5107 Version: 15.45.30.5103 Version: and 26.20.100.7212 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 15.33.49.5100" }, { "status": "affected", "version": "15.36.38.5117" }, { "status": "affected", "version": "15.40.44.5107" }, { "status": "affected", "version": "15.45.30.5103" }, { "status": "affected", "version": "and 26.20.100.7212" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions in the installer for Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:15", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 15.33.49.5100" }, { "version_value": "15.36.38.5117" }, { "version_value": "15.40.44.5107" }, { "version_value": "15.45.30.5103" }, { "version_value": "and 26.20.100.7212" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect default permissions in the installer for Intel(R) Graphics Drivers before versions 15.33.49.5100, 15.36.38.5117, 15.40.44.5107, 15.45.30.5103, and 26.20.100.7212 may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0508", "datePublished": "2020-03-12T19:58:01", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3611
Vulnerability from cvelistv5
Published
2018-05-15 14:00
Modified
2024-09-16 23:36
Severity ?
EPSS score ?
Summary
Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00109.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Graphics Driver |
Version: 15.40.x.4 Version: 21.20.x.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00109.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Graphics Driver", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "15.40.x.4" }, { "status": "affected", "version": "21.20.x.x" } ] } ], "datePublic": "2018-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-15T13:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00109.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-05-14T00:00:00", "ID": "CVE-2018-3611", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Graphics Driver", "version": { "version_data": [ { "version_value": "15.40.x.4" }, { "version_value": "21.20.x.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00109.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00109.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3611", "datePublished": "2018-05-15T14:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T23:36:59.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12223
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 17:42
Severity ?
EPSS score ?
Summary
Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.488Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12223", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T17:42:42.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12218
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 01:36
Severity ?
EPSS score ?
Summary
Unhandled exception in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a memory leak via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unhandled exception in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a memory leak via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unhandled exception in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a memory leak via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12218", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-17T01:36:15.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11111
Vulnerability from cvelistv5
Published
2019-11-14 19:04
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Pointer corruption in the Unified Shader Compiler in Intel(R) Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:08.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Pointer corruption in the Unified Shader Compiler in Intel(R) Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pointer corruption in the Unified Shader Compiler in Intel(R) Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11111", "datePublished": "2019-11-14T19:04:34", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:48:08.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12213
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 22:51
Severity ?
EPSS score ?
Summary
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12213", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T22:51:10.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0520
Vulnerability from cvelistv5
Published
2020-03-12 20:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 15.45.30.5103 Version: 15.40.44.5107 Version: 15.36.38.5117 Version: 15.33.49.5100 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 15.45.30.5103" }, { "status": "affected", "version": "15.40.44.5107" }, { "status": "affected", "version": "15.36.38.5117" }, { "status": "affected", "version": "15.33.49.5100" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:18", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0520", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 15.45.30.5103" }, { "version_value": "15.40.44.5107" }, { "version_value": "15.36.38.5117" }, { "version_value": "15.33.49.5100" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0520", "datePublished": "2020-03-12T20:00:37", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12211
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 20:48
Severity ?
EPSS score ?
Summary
Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12211", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12211", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T20:48:22.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12212
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 22:15
Severity ?
EPSS score ?
Summary
Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12212", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T22:15:46.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18089
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 20:17
Severity ?
EPSS score ?
Summary
Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:01:14.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-18089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-18089", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-10-09T00:00:00", "dateUpdated": "2024-09-16T20:17:14.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0506
Vulnerability from cvelistv5
Published
2020-03-12 17:41
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper initialization in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.29.5077, and 26.20.100.7000 may allow a privileged user to potentially enable a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Driver |
Version: before versions 15.40.44.5107 Version: 15.45.29.5077 Version: 26.20.100.7000 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 15.40.44.5107" }, { "status": "affected", "version": "15.45.29.5077" }, { "status": "affected", "version": "26.20.100.7000" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper initialization in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.29.5077, and 26.20.100.7000 may allow a privileged user to potentially enable a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:16", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0506", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver", "version": { "version_data": [ { "version_value": "before versions 15.40.44.5107" }, { "version_value": "15.45.29.5077" }, { "version_value": "26.20.100.7000" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper initialization in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.29.5077, and 26.20.100.7000 may allow a privileged user to potentially enable a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0506", "datePublished": "2020-03-12T17:41:46", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18091
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 02:36
Severity ?
EPSS score ?
Summary
Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:01:14.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-18091", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-18091", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-10-09T00:00:00", "dateUpdated": "2024-09-17T02:36:54.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12220
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 18:39
Severity ?
EPSS score ?
Summary
Logic bug in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.600Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Logic bug in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Logic bug in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12220", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T18:39:17.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0514
Vulnerability from cvelistv5
Published
2020-03-12 19:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper default permissions in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7463 and 15.45.30.5103 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 26.20.100.7463 Version: 15.45.30.5103 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 26.20.100.7463" }, { "status": "affected", "version": "15.45.30.5103" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper default permissions in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7463 and 15.45.30.5103 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:17", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 26.20.100.7463" }, { "version_value": "15.45.30.5103" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper default permissions in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7463 and 15.45.30.5103 may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0514", "datePublished": "2020-03-12T19:59:19", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0114
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/108385 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Graphics Drivers |
Version: Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069). |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108385" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } ], "descriptions": [ { "lang": "en", "value": "A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-20T16:06:03", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108385" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108385" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0114", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5647
Vulnerability from cvelistv5
Published
2016-12-13 18:00
Modified
2024-08-06 01:07
Severity ?
EPSS score ?
Summary
The igdkmd64 module in the Intel Graphics Driver through 15.33.42.435, 15.36.x through 15.36.30.4385, and 15.40.x through 15.40.4404 on Windows allows local users to cause a denial of service (crash) or gain privileges via a crafted D3DKMTEscape request.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/91708 | vdb-entry, x_refsource_BID | |
http://www.talosintelligence.com/reports/TALOS-2016-0087/ | x_refsource_MISC | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054&languageid=en-fr | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/ps500068 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:07:59.837Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "91708", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91708" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.talosintelligence.com/reports/TALOS-2016-0087/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/ps500068" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The igdkmd64 module in the Intel Graphics Driver through 15.33.42.435, 15.36.x through 15.36.30.4385, and 15.40.x through 15.40.4404 on Windows allows local users to cause a denial of service (crash) or gain privileges via a crafted D3DKMTEscape request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-13T17:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "91708", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91708" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.talosintelligence.com/reports/TALOS-2016-0087/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/ps500068" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-5647", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The igdkmd64 module in the Intel Graphics Driver through 15.33.42.435, 15.36.x through 15.36.30.4385, and 15.40.x through 15.40.4404 on Windows allows local users to cause a denial of service (crash) or gain privileges via a crafted D3DKMTEscape request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91708", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91708" }, { "name": "http://www.talosintelligence.com/reports/TALOS-2016-0087/", "refsource": "MISC", "url": "http://www.talosintelligence.com/reports/TALOS-2016-0087/" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00054\u0026languageid=en-fr" }, { "name": "https://support.lenovo.com/us/en/product_security/ps500068", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/ps500068" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-5647", "datePublished": "2016-12-13T18:00:00", "dateReserved": "2016-06-16T00:00:00", "dateUpdated": "2024-08-06T01:07:59.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12222
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 17:59
Severity ?
EPSS score ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an out of bound memory read via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an out of bound memory read via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12222", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an out of bound memory read via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12222", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T17:59:23.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0516
Vulnerability from cvelistv5
Published
2020-03-12 19:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7463 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 26.20.100.7463 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 26.20.100.7463" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7463 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:13", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0516", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 26.20.100.7463" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control in Intel(R) Graphics Drivers before version 26.20.100.7463 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156761/ShaderCache-Arbitrary-File-Creation-Privilege-Escalation.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0516", "datePublished": "2020-03-12T19:59:47", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12219
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 16:53
Severity ?
EPSS score ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read memory via local access via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read memory via local access via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12219", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read memory via local access via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12219", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T16:53:11.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42879
Vulnerability from cvelistv5
Published
2023-11-14 19:04
Modified
2024-08-30 17:57
Severity ?
EPSS score ?
Summary
NULL pointer dereference in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Arc(TM) Control software |
Version: before version 1.73.5335.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-42879", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-30T17:57:33.160691Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-30T17:57:43.884Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) Arc(TM) Control software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 1.73.5335.2" } ] } ], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable denial of service via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en" }, { "cweId": "CWE-395", "description": "NULL pointer dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-16T20:47:34.203Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-42879", "datePublished": "2023-11-14T19:04:22.757Z", "dateReserved": "2022-12-07T04:00:07.253Z", "dateUpdated": "2024-08-30T17:57:43.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12154
Vulnerability from cvelistv5
Published
2018-10-15 18:00
Modified
2024-09-16 19:05
Severity ?
EPSS score ?
Summary
Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105582 | vdb-entry, x_refsource_BID | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT210634 | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT210722 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2019/Oct/56 | mailing-list, x_refsource_FULLDISC | |
http://seclists.org/fulldisclosure/2019/Oct/55 | mailing-list, x_refsource_FULLDISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Graphics Driver |
Version: Various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:57.450Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105582", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105582" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210634" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Graphics Driver", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Various" } ] } ], "datePublic": "2018-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-01T06:06:47", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "105582", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105582" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210634" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-10-09T00:00:00", "ID": "CVE-2018-12154", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Graphics Driver", "version": { "version_data": [ { "version_value": "Various" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user to potentially create an infinite loop and crash an application via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "105582", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105582" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html" }, { "name": "https://support.apple.com/kb/HT210634", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210634" }, { "name": "https://support.apple.com/kb/HT210722", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210722" }, { "name": "20191031 APPLE-SA-2019-10-29-2 macOS Catalina 10.15.1, Security Update 2019-001 Mojave, Security Update 2019-006 High Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Oct/56" }, { "name": "20191031 APPLE-SA-2019-10-29-10 Additional information for APPLE-SA-2019-10-07-1 macOS Catalina 10.15", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Oct/55" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12154", "datePublished": "2018-10-15T18:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T19:05:22.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12224
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 20:16
Severity ?
EPSS score ?
Summary
Buffer leakage in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer leakage in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer leakage in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12224", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T20:16:38.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14590
Vulnerability from cvelistv5
Published
2019-11-14 19:05
Modified
2024-08-05 00:19
Severity ?
EPSS score ?
Summary
Improper access control in the API for the Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:19:41.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in the API for the Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-14590", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control in the API for the Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-14590", "datePublished": "2019-11-14T19:05:12", "dateReserved": "2019-08-03T00:00:00", "dateUpdated": "2024-08-05T00:19:41.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-0120
Vulnerability from cvelistv5
Published
2021-11-17 19:01
Modified
2024-08-03 15:32
Severity ?
EPSS score ?
Summary
Improper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Graphics DCH Drivers for Windows 10 |
Version: before version 27.20.100.9316 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:32:09.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics DCH Drivers for Windows 10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 27.20.100.9316" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-17T19:01:48", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2021-0120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics DCH Drivers for Windows 10", "version": { "version_data": [ { "version_value": "before version 27.20.100.9316" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-0120", "datePublished": "2021-11-17T19:01:48", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-03T15:32:09.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12216
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 23:15
Severity ?
EPSS score ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12216", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12216", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T23:15:31.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0113
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/108385 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Graphics Drivers |
Version: Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069). |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108385" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-20T16:06:03", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108385" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "Versions before 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069)." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient bounds checking in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00218.html" }, { "name": "108385", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108385" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0113", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12209
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 16:58
Severity ?
EPSS score ?
Summary
Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read device configuration information via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read device configuration information via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12209", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read device configuration information via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12209", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-16T16:58:34.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0519
Vulnerability from cvelistv5
Published
2020-03-12 20:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 15.33.49.5100 Version: 15.36.38.5117 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 15.33.49.5100" }, { "status": "affected", "version": "15.36.38.5117" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:22", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0519", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 15.33.49.5100" }, { "version_value": "15.36.38.5117" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0519", "datePublished": "2020-03-12T20:00:12", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0567
Vulnerability from cvelistv5
Published
2020-03-12 20:51
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before version 26.20.100.7212 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before version 26.20.100.7212" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:24", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before version 26.20.100.7212" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in Intel(R) Graphics Drivers before version 26.20.100.7212 may allow an authenticated user to enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0567", "datePublished": "2020-03-12T20:51:09", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0515
Vulnerability from cvelistv5
Published
2020-03-12 19:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 26.20.100.7584 Version: 15.45.30.5103 Version: 15.40.44.5107 Version: 15.36.38.5117 Version: 15.33.49.5100 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 26.20.100.7584" }, { "status": "affected", "version": "15.45.30.5103" }, { "status": "affected", "version": "15.40.44.5107" }, { "status": "affected", "version": "15.36.38.5117" }, { "status": "affected", "version": "15.33.49.5100" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access" } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-17T21:06:08", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0515", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 26.20.100.7584" }, { "version_value": "15.45.30.5103" }, { "version_value": "15.40.44.5107" }, { "version_value": "15.36.38.5117" }, { "version_value": "15.33.49.5100" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0515", "datePublished": "2020-03-12T19:59:32", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12215
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 01:31
Severity ?
EPSS score ?
Summary
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-25084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Graphics Driver for Windows |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver for Windows", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-04T18:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver for Windows", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-25084", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-25084" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12215", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-17T01:31:10.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11112
Vulnerability from cvelistv5
Published
2019-11-14 18:41
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:08.765Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11112", "datePublished": "2019-11-14T18:41:06", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:48:08.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0155
Vulnerability from cvelistv5
Published
2019-11-14 18:42
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:3841 | vendor-advisory, x_refsource_REDHAT | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:3889 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:3887 | vendor-advisory, x_refsource_REDHAT | |
https://seclists.org/bugtraq/2019/Nov/26 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:3908 | vendor-advisory, x_refsource_REDHAT | |
https://support.f5.com/csp/article/K73659122?utm_source=f5support&%3Butm_medium=RSS | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4186-2/ | vendor-advisory, x_refsource_UBUNTU | |
https://access.redhat.com/errata/RHSA-2020:0204 | vendor-advisory, x_refsource_REDHAT | |
https://security.netapp.com/advisory/ntap-20200320-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | 2019.2 IPU – Intel(R) Graphics Driver for Windows* and Linux |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.748Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2019:3841", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3841" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "RHSA-2019:3889", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3889" }, { "name": "RHSA-2019:3887", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3887" }, { "name": "20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Nov/26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "RHSA-2019:3908", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3908" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K73659122?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "USN-4186-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4186-2/" }, { "name": "RHSA-2020:0204", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0204" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:08", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "RHSA-2019:3841", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3841" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "RHSA-2019:3889", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3889" }, { "name": "RHSA-2019:3887", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3887" }, { "name": "20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Nov/26" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "RHSA-2019:3908", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3908" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K73659122?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "USN-4186-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4186-2/" }, { "name": "RHSA-2020:0204", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0204" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2019.2 IPU \u2013 Intel(R) Graphics Driver for Windows* and Linux", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2019:3841", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3841" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html" }, { "name": "RHSA-2019:3889", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3889" }, { "name": "RHSA-2019:3887", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3887" }, { "name": "20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Nov/26" }, { "name": "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "RHSA-2019:3908", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3908" }, { "name": "https://support.f5.com/csp/article/K73659122?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K73659122?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "USN-4186-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4186-2/" }, { "name": "RHSA-2020:0204", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0204" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0155", "datePublished": "2019-11-14T18:42:54", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.748Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-0012
Vulnerability from cvelistv5
Published
2021-08-11 12:47
Modified
2024-08-03 15:25
Severity ?
EPSS score ?
Summary
Use after free in some Intel(R) Graphics Driver before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Graphics Driver |
Version: before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:25:01.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Driver", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166" } ] } ], "descriptions": [ { "lang": "en", "value": "Use after free in some Intel(R) Graphics Driver before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166 may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T19:06:13", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2021-0012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Driver", "version": { "version_data": [ { "version_value": "before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use after free in some Intel(R) Graphics Driver before version 27.20.100.8336, 15.45.33.5164, and 15.40.47.5166 may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00508.html" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-0012", "datePublished": "2021-08-11T12:47:42", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-03T15:25:01.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0504
Vulnerability from cvelistv5
Published
2020-03-12 17:42
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200320-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) Graphics Drivers |
Version: before versions 15.40.44.5107 Version: 15.45.30.5103 Version: 26.20.100.7158 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Graphics Drivers", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before versions 15.40.44.5107" }, { "status": "affected", "version": "15.45.30.5103" }, { "status": "affected", "version": "26.20.100.7158" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T09:06:18", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Graphics Drivers", "version": { "version_data": [ { "version_value": "before versions 15.40.44.5107" }, { "version_value": "15.45.30.5103" }, { "version_value": "26.20.100.7158" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200320-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200320-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0504", "datePublished": "2020-03-12T17:42:16", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }