All the vulnerabilites related to intel - openattestation
var-201906-0915
Vulnerability from variot
Improper permissions in the installer for Intel(R) Chipset Device Software (INF Update Utility) before version 10.1.1.45 may allow an authenticated user to escalate privilege via local access. Intel Chipset Device Software is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges. Intel Chipset Device Software prior to version 10.1.1.45 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0915", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "chipset device software", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "10.1.1.45" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.0.13" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.44" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.42" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.35" }, { "model": "chipset device software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.1.1.32" }, { "model": "chipset device software", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "10.1.1.45" } ], "sources": [ { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:chipset_device_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.1.45", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0128" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai", "sources": [ { "db": "BID", "id": "108767" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ], "trust": 0.9 }, "cve": "CVE-2019-0128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140159", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0128", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-526", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-140159", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "NVD", "id": "CVE-2019-0128" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for Intel(R) Chipset Device Software (INF Update Utility) before version 10.1.1.45 may allow an authenticated user to escalate privilege via local access. Intel Chipset Device Software is prone to a local privilege-escalation vulnerability. \nA local attacker can exploit this issue to gain elevated privileges. \nIntel Chipset Device Software prior to version 10.1.1.45 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2019-0128" }, { "db": "BID", "id": "108767" }, { "db": "VULHUB", "id": "VHN-140159" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0128", "trust": 2.8 }, { "db": "BID", "id": "108767", "trust": 2.0 }, { "db": "LENOVO", "id": "LEN-27840", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-526", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140159", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0128" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "id": "VAR-201906-0915", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140159" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:15:34.221000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel Chipset Device Software Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93758" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "NVD", "id": "CVE-2019-0128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108767" }, { "trust": 2.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27840" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27840" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0128" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140159" }, { "db": "BID", "id": "108767" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0128" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140159" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108767" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.357000", "db": "NVD", "id": "CVE-2019-0128" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-03T00:00:00", "db": "VULHUB", "id": "VHN-140159" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108767" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-03-03T19:48:50.037000", "db": "NVD", "id": "CVE-2019-0128" }, { "date": "2019-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-526" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108767" }, { "db": "CNNVD", "id": "CNNVD-201906-526" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-526" } ], "trust": 0.6 } }
var-201906-0919
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel OpenAttestation is an open source project of Intel Corporation for managing host integrity verification using the remote attestation protocol defined by TCG. A permissions and access control issue vulnerability exists in the authentication process in Intel OpenAttestation due to the program's failure to adequately authenticate sessions. A local attacker could exploit this vulnerability to elevate privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0919", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0175" } ] }, "cve": "CVE-2019-0175", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140206", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0175", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-569", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140206", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "NVD", "id": "CVE-2019-0175" }, { "db": "CNNVD", "id": "CNNVD-201906-569" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel OpenAttestation is an open source project of Intel Corporation for managing host integrity verification using the remote attestation protocol defined by TCG. A permissions and access control issue vulnerability exists in the authentication process in Intel OpenAttestation due to the program\u0027s failure to adequately authenticate sessions. A local attacker could exploit this vulnerability to elevate privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0175" }, { "db": "VULHUB", "id": "VHN-140206" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0175", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-569", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140206", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0175" }, { "db": "CNNVD", "id": "CNNVD-201906-569" } ] }, "id": "VAR-201906-0919", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140206" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T10:59:12.554000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "NVD", "id": "CVE-2019-0175" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0175" }, { "db": "CNNVD", "id": "CNNVD-201906-569" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140206" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0175" }, { "db": "CNNVD", "id": "CNNVD-201906-569" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140206" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.937000", "db": "NVD", "id": "CVE-2019-0175" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-569" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140206" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-02-27T16:38:39.073000", "db": "NVD", "id": "CVE-2019-0175" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-569" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-569" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-569" } ], "trust": 0.6 } }
var-201906-0922
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security feature issue vulnerability exists in Intel Open CIT where the program does not adequately protect passwords. An attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0922", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0179" } ] }, "cve": "CVE-2019-0179", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140210", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0179", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-566", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140210", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "NVD", "id": "CVE-2019-0179" }, { "db": "CNNVD", "id": "CNNVD-201906-566" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security feature issue vulnerability exists in Intel Open CIT where the program does not adequately protect passwords. An attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0179" }, { "db": "VULHUB", "id": "VHN-140210" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0179", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-566", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140210", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0179" }, { "db": "CNNVD", "id": "CNNVD-201906-566" } ] }, "id": "VAR-201906-0922", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140210" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:29:22.506000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "NVD", "id": "CVE-2019-0179" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0179" }, { "db": "CNNVD", "id": "CNNVD-201906-566" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140210" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0179" }, { "db": "CNNVD", "id": "CNNVD-201906-566" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140210" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.060000", "db": "NVD", "id": "CVE-2019-0179" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-566" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140210" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-02-27T16:38:10.390000", "db": "NVD", "id": "CVE-2019-0179" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-566" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-566" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-566" } ], "trust": 0.6 } }
var-201906-1229
Vulnerability from variot
Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access. Intel RAID Web Console 3 is prone to a privilege-escalation vulnerability. A remote attacker can exploit this issue to gain elevated privileges. Intel RAID Web Console 3 4.186 and prior are vulnerable. There is a security vulnerability in the service API of Intel RWC3 4.186 and earlier versions. The vulnerability is caused by the program not fully authenticating the session
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1229", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "raid web console 3", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "4.186" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "34.186" }, { "model": "raid web console", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "34.185" }, { "model": "raid web console", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "37.009.011.000" } ], "sources": [ { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:raid_web_console_3:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionEndIncluding": "4.186", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11119" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alexander Gutkin", "sources": [ { "db": "BID", "id": "108780" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ], "trust": 0.9 }, "cve": "CVE-2019-11119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-142733", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-11119", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11119", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201906-575", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-142733", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-11119", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "NVD", "id": "CVE-2019-11119" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient session validation in the service API for Intel(R) RWC3 version 4.186 and before may allow an unauthenticated user to potentially enable escalation of privilege via network access. Intel RAID Web Console 3 is prone to a privilege-escalation vulnerability. \nA remote attacker can exploit this issue to gain elevated privileges. \nIntel RAID Web Console 3 4.186 and prior are vulnerable. There is a security vulnerability in the service API of Intel RWC3 4.186 and earlier versions. The vulnerability is caused by the program not fully authenticating the session", "sources": [ { "db": "NVD", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11119", "trust": 2.9 }, { "db": "BID", "id": "108780", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-575", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-18597", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-142733", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11119" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "id": "VAR-201906-1229", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142733" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:44:29.723000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel RAID Web Console 3 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93797" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "NVD", "id": "CVE-2019-11119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/108780" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11119" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142733" }, { "db": "VULMON", "id": "CVE-2019-11119" }, { "db": "BID", "id": "108780" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11119" }, { "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142733" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11119" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108780" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.327000", "db": "NVD", "id": "CVE-2019-11119" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-01T00:00:00", "db": "VULHUB", "id": "VHN-142733" }, { "date": "2023-03-01T00:00:00", "db": "VULMON", "id": "CVE-2019-11119" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108780" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-03-01T18:53:43.570000", "db": "NVD", "id": "CVE-2019-11119" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-575" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-575" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-575" } ], "trust": 0.6 } }
var-201906-1233
Vulnerability from variot
Pointer corruption in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1233", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kits", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11126" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-551" } ], "trust": 0.6 }, "cve": "CVE-2019-11126", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25502", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142741", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11126", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11126", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-25502", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-551", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142741", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11126", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "NVD", "id": "CVE-2019-11126" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pointer corruption in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2019-11126" }, { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11126", "trust": 3.5 }, { "db": "BID", "id": "108766", "trust": 2.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-551", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25502", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142741", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11126", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11126" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "id": "VAR-201906-1233", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" } ], "trust": 1.4243450375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" } ] }, "last_update_date": "2023-12-18T10:53:59.900000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Patch for IntelNUCKit Buffer Overflow Vulnerability (CNVD-2019-25502)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/172809" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93784" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142741" }, { "db": "NVD", "id": "CVE-2019-11126" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 2.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11126" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25502" }, { "db": "VULHUB", "id": "VHN-142741" }, { "db": "VULMON", "id": "CVE-2019-11126" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11126" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25502" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142741" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11126" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.467000", "db": "NVD", "id": "CVE-2019-11126" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25502" }, { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142741" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11126" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:14.400000", "db": "NVD", "id": "CVE-2019-11126" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-551" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-551" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-551" } ], "trust": 0.6 } }
var-201906-0918
Vulnerability from variot
Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access. Intel CoreX-seriesProcessors and so on are products of Intel Corporation of the United States. Intel CoreX-seriesProcessors is an X-Series central processing unit (CPU). 4thGenerationIntelCorei5Processors is a fourth-generation Corei5 series central processing unit (CPU). 4thGenerationIntelCorei3Processors is a fourth-generation Corei3 series central processing unit (CPU). There are information disclosure vulnerabilities in various Intel products that can be exploited by local attackers to disclose some physical addresses. DRAM is prone to an information disclosure vulnerability. The following products and versions are affected: Intel Core X-series Processors; 4th Generation Intel Core i5 Processors; 4th Generation Intel Core i3 Processors; Intel Pentium Processor G Series; Intel Pentium Processor 3000 Series; Intel Celeron Processor 2000 Series; Intel Xeon Processor E7 v3 Family; Intel Xeon Processor E5 v3 Family; Intel Xeon Processor E3 v3 Family
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0918", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "i3-4005u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1230l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4130", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4310u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4648", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3556u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4809", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3561y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4669", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4610", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1276", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4150t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4830", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8893", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4112e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2690", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4460s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1241", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4130t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2980u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2408l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8867", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4300m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1231", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2955u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3550m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8880l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1281", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2981u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2687w", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1220l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4360", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4370", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2683", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4220y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4430s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4000m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4110e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4110m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2961y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2002e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2438l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2658", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4410e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4100m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2623", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4278u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4330m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4030u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9920x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1275l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1226", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4400e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4820", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9940x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4012y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3825u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4300y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4360t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3558u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4120u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2628l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4150", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1286l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4422e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4370t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4210m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4330te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4350t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4158u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4025u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-4850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1286", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1271", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-7980xe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2698", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2957u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4402e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2667", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4402ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4460t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9980xe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4340m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8870", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2697", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8891", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3805u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4302y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2695", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4258u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8890", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3560m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4010y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2950m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2680", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4010u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4308u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i7-7820x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "3560y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4330", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8880", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4170", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9960x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4020y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4288u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4460", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4330t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2618l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4655", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i9-9900x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2970m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i7-7800x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2699", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4627", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1240l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-1680", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "2000e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e7-8860", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4310m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1268l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2658a", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4440s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4170t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2608l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4340te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4160t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1285", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1265l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4202y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1246", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-2670", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e3-1285l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i3-4030y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "e5-4667", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "i5-4200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "core x-series processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "4th generation intel core i5 processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "4th generation intel core i3 processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "pentium processor g series", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "pentium processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3000" }, { "model": "celeron processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "2000" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v30" }, { "model": "pentium processor g series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "30000" }, { "model": "core series processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "x0" }, { "model": "celeron processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "20000" }, { "model": "4th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "4th generation core i3 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "dram", "scope": "eq", "trust": 0.3, "vendor": "dram", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-9900x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-9900x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-9920x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-9920x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-9960x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-9960x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-9980xe_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-9980xe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-9940x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-9940x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-7960x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-7960x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-7980xe_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-7980xe:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-7940x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-7940x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-7920x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-7920x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i9-7900x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i9-7900x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i7-7820x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i7-7820x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i7-7800x_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i7-7800x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4422e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4422e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4410e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4410e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4402ec_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4402ec:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4402e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4402e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4400e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4400e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4460t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4460t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4460s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4460s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4460_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4460:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4440s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4440s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4440_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4440:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4430s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4430s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4300m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4300m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4300u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4300u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4300y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4300y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4302y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4302y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4308u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4308u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4310m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4310m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4310u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4310u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4330m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4330m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4340m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4340m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4350u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4350u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4360u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4360u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4200h_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4200h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4200m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4200m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4200u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4200u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4200y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4200y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4202y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4202y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4210h_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4210h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4210m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4210m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4210u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4210u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4210y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4210y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4220y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4220y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4250u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4250u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4258u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4258u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4260u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4260u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4278u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4278u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i5-4288u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i5-4288u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4330_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4330:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4330t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4330t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4330te_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4330te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4340_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4340te_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4340te:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4350_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4350t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4350t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4360_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4360:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4360t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4360t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4370_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4370:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4370t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4370t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4100e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4100e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4100m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4100u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4100u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4102e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4102e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4110e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4110e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4110m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4110m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4112e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4112e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4120u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4120u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4158u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4158u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4170t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4170t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4170_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4170:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4160t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4160t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4160_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4160:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4150t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4150t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4150_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4130t_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4130t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4130_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4130:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4000m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4005u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4005u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4010u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4010u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4010y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4010y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4012y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4012y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4020y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4020y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4025u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4025u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4030u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4030u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:i3-4030y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i3-4030y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3550m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3550m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3556u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3556u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3558u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3558u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3560m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3560m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3560y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3560y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3561y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3561y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3805u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3805u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:3825u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:3825u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2981u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2981u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2980u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2980u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2970m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2970m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2961y_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2961y:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2957u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2957u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2955u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2955u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2950m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2950m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2002e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2002e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:2000e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:2000e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8893:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8891:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8890:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8880l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8880:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8870:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8867:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-8860:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-4850:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-4830:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-4820:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e7-4809:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2699:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4669:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2438l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-1428l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4667:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2428l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-1620:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4660:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2418l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-1630:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2698:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4655:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2408l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2697:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-1650:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4650:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-1660:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4648:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-1680:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2695:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4640:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2690:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4627:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2687w:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4620:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-4610:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2683:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2680:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2670:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2667:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2660:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2658a:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2658:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2650l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2650:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2648l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2643:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2640:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2637:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2630l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2630:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2628l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2623:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2620:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2618l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2609:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2608l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e5-2603:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1286l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1286:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1285l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1285_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1285:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1281:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1280_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1280:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1276:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1275l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1270_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1270:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1268l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1268l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1271:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1275_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1275:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1265l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1246:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1245_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1245:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1241:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1240l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1240l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1240_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1240:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1231:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1230l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1230_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1230:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1226:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1225_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1225:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1220l:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:e3-1220_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:e3-1220:3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0174" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andrew Kwong and Daniel Genkin from University of Michigan. Daniel Gruss from Graz University of Technology. Yuval Yarom from University of Adelaide.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-527" } ], "trust": 0.6 }, "cve": "CVE-2019-0174", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25499", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140205", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0174", "trust": 1.0, "value": "LOW" }, { "author": "CNVD", "id": "CNVD-2019-25499", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-527", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140205", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "NVD", "id": "CVE-2019-0174" }, { "db": "CNNVD", "id": "CNNVD-201906-527" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access. Intel CoreX-seriesProcessors and so on are products of Intel Corporation of the United States. Intel CoreX-seriesProcessors is an X-Series central processing unit (CPU). 4thGenerationIntelCorei5Processors is a fourth-generation Corei5 series central processing unit (CPU). 4thGenerationIntelCorei3Processors is a fourth-generation Corei3 series central processing unit (CPU). There are information disclosure vulnerabilities in various Intel products that can be exploited by local attackers to disclose some physical addresses. DRAM is prone to an information disclosure vulnerability. The following products and versions are affected: Intel Core X-series Processors; 4th Generation Intel Core i5 Processors; 4th Generation Intel Core i3 Processors; Intel Pentium Processor G Series; Intel Pentium Processor 3000 Series; Intel Celeron Processor 2000 Series; Intel Xeon Processor E7 v3 Family; Intel Xeon Processor E5 v3 Family; Intel Xeon Processor E3 v3 Family", "sources": [ { "db": "NVD", "id": "CVE-2019-0174" }, { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "BID", "id": "108731" }, { "db": "VULHUB", "id": "VHN-140205" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0174", "trust": 3.4 }, { "db": "BID", "id": "108731", "trust": 2.6 }, { "db": "LENOVO", "id": "LEN-27842", "trust": 2.3 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-527", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25499", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-140205", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0174" }, { "db": "CNNVD", "id": "CNNVD-201906-527" } ] }, "id": "VAR-201906-0918", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" } ], "trust": 1.4109250283333332 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" } ] }, "last_update_date": "2023-12-18T10:52:38.377000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140205" }, { "db": "NVD", "id": "CVE-2019-0174" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.securityfocus.com/bid/108731" }, { "trust": 2.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "trust": 2.3, "url": "https://security.netapp.com/advisory/ntap-20190612-0001/" }, { "trust": 1.7, "url": "https://support.f5.com/csp/article/k18165180" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27842" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 1.2, "url": "https://support.lenovo.com/us/zh/product_security/len-27842" }, { "trust": 0.9, "url": "https://rambleed.com/docs/20190603-rambleed-web.pdf" }, { "trust": 0.9, "url": "https://blogs.oracle.com/security/rambleed" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0174" }, { "db": "CNNVD", "id": "CNNVD-201906-527" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25499" }, { "db": "VULHUB", "id": "VHN-140205" }, { "db": "BID", "id": "108731" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0174" }, { "db": "CNNVD", "id": "CNNVD-201906-527" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25499" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140205" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108731" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.887000", "db": "NVD", "id": "CVE-2019-0174" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-527" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25499" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-140205" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108731" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-0174" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-527" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108731" }, { "db": "CNNVD", "id": "CNNVD-201906-527" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-527" } ], "trust": 0.6 } }
var-201906-0916
Vulnerability from variot
Reflected XSS in web interface for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an unauthenticated user to potentially enable denial of service via network access. Intel Rapid Storage Technology Enterprise is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to perform unauthorized actions such as reading, modifying, or deleting content, inject malicious content or cause denial-of-service conditions. Intel Rapid Storage Technology Enterprise version prior 5.5.0.2015 to are vulnerable. Intel Accelerated Storage Manager is one of the accelerated storage managers. An attacker could exploit this vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0916", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "thinkstation p520", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "rapid storage technology enterprise", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "5.5.0.2015" }, { "model": "thinkstation p720", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p520c", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p920", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "rapid storage technology enterprise", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "5.5.0.2013" }, { "model": "rapid storage technology enterprise", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "5.5.0.2015" } ], "sources": [ { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:rapid_storage_technology_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.5.0.2015", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p520_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p520:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p520c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p520c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p720_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p720:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p920_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0130" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai.", "sources": [ { "db": "BID", "id": "108775" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ], "trust": 0.9 }, "cve": "CVE-2019-0130", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-140161", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0130", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-529", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-140161", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "NVD", "id": "CVE-2019-0130" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reflected XSS in web interface for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an unauthenticated user to potentially enable denial of service via network access. Intel Rapid Storage Technology Enterprise is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to perform unauthorized actions such as reading, modifying, or deleting content, inject malicious content or cause denial-of-service conditions. \nIntel Rapid Storage Technology Enterprise version prior 5.5.0.2015 to are vulnerable. Intel Accelerated Storage Manager is one of the accelerated storage managers. An attacker could exploit this vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2019-0130" }, { "db": "BID", "id": "108775" }, { "db": "VULHUB", "id": "VHN-140161" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0130", "trust": 2.8 }, { "db": "BID", "id": "108775", "trust": 2.0 }, { "db": "LENOVO", "id": "LEN-27843", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-529", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140161", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0130" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "id": "VAR-201906-0916", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140161" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:15:55.394000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel Rapid Storage Technology Enterprise Intel Accelerated Storage Manager Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93760" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "NVD", "id": "CVE-2019-0130" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108775" }, { "trust": 2.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27843" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.9, "url": "http://www.intel.com/content/www/us/en/homepage.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27843" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0130" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140161" }, { "db": "BID", "id": "108775" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0130" }, { "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140161" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108775" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.403000", "db": "NVD", "id": "CVE-2019-0130" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-140161" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108775" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-03-02T16:15:19.037000", "db": "NVD", "id": "CVE-2019-0130" }, { "date": "2019-07-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-529" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-529" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-529" } ], "trust": 0.6 } }
var-201906-1236
Vulnerability from variot
Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1236", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11129" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-554" } ], "trust": 0.6 }, "cve": "CVE-2019-11129", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142744", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11129", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11129", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-554", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142744", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11129", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "NVD", "id": "CVE-2019-11129" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc", "sources": [ { "db": "NVD", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11129", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-554", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142744", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11129", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11129" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "id": "VAR-201906-1236", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142744" } ], "trust": 0.8385371857142857 }, "last_update_date": "2023-12-18T11:03:10.925000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93787" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "NVD", "id": "CVE-2019-11129" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11129" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142744" }, { "db": "VULMON", "id": "CVE-2019-11129" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11129" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142744" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11129" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.577000", "db": "NVD", "id": "CVE-2019-11129" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-20T00:00:00", "db": "VULHUB", "id": "VHN-142744" }, { "date": "2019-06-20T00:00:00", "db": "VULMON", "id": "CVE-2019-11129" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-20T23:15:09.673000", "db": "NVD", "id": "CVE-2019-11129" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-554" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-554" } ], "trust": 0.6 } }
var-201906-0920
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An input validation error vulnerability exists in the authentication process in Intel Open CIT. A local attacker could exploit this vulnerability to elevate privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0177" } ] }, "cve": "CVE-2019-0177", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140208", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0177", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-567", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140208", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "NVD", "id": "CVE-2019-0177" }, { "db": "CNNVD", "id": "CNNVD-201906-567" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An input validation error vulnerability exists in the authentication process in Intel Open CIT. A local attacker could exploit this vulnerability to elevate privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0177" }, { "db": "VULHUB", "id": "VHN-140208" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0177", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-567", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140208", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0177" }, { "db": "CNNVD", "id": "CNNVD-201906-567" } ] }, "id": "VAR-201906-0920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140208" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:24:00.472000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "NVD", "id": "CVE-2019-0177" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0177" }, { "db": "CNNVD", "id": "CNNVD-201906-567" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140208" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0177" }, { "db": "CNNVD", "id": "CNNVD-201906-567" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140208" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.983000", "db": "NVD", "id": "CVE-2019-0177" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-567" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140208" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-02-27T16:38:26.337000", "db": "NVD", "id": "CVE-2019-0177" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-567" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-567" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-567" } ], "trust": 0.6 } }
var-201906-0925
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. WordPress for FooGallery The plugin contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A path traversal vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0925", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "foogallery", "scope": "eq", "trust": 0.8, "vendor": "fooplugins", "version": "1.8.12" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0182" } ] }, "cve": "CVE-2019-0182", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-0182", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140213", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-0182", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-0182", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0182", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2019-0182", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201906-571", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140213", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2019-0182", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" }, { "db": "CNNVD", "id": "CNNVD-201906-571" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. WordPress for FooGallery The plugin contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A path traversal vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0182", "trust": 3.4 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-014034", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-571", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140213", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-0182", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" }, { "db": "CNNVD", "id": "CNNVD-201906-571" } ] }, "id": "VAR-201906-0925", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140213" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:26:35.988000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "FooGallery - Image Gallery WordPress Plugin", "trust": 0.8, "url": "https://wordpress.org/plugins/foogallery/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-79", "trust": 0.8 }, { "problemtype": "CWE-22", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-20182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20182" }, { "trust": 0.8, "url": "https://medium.com/@pablo0xsantiago/cve-2019-20182-foogallery-image-gallery-wordpress-plugin-1-8-12-stored-cross-site-scripting-d5864f1259f" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/522.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" }, { "db": "CNNVD", "id": "CNNVD-201906-571" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140213" }, { "db": "VULMON", "id": "CVE-2019-0182" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "db": "NVD", "id": "CVE-2019-0182" }, { "db": "CNNVD", "id": "CNNVD-201906-571" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140213" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-0182" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "date": "2019-06-13T16:29:01.187000", "db": "NVD", "id": "CVE-2019-0182" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-571" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-03T00:00:00", "db": "VULHUB", "id": "VHN-140213" }, { "date": "2020-08-24T00:00:00", "db": "VULMON", "id": "CVE-2019-0182" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2020-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014034" }, { "date": "2023-03-03T19:47:51.517000", "db": "NVD", "id": "CVE-2019-0182" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-571" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-571" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-571" } ], "trust": 0.6 } }
var-201906-0924
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Both Intel Open Cloud Integrity Technology (CIT) and Intel OpenAttestation are products of Intel Corporation. Intel Open Cloud Integrity Technology is a set of solutions for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. Intel OpenAttestation is an open source project for managing host integrity verification using the remote attestation protocol defined by the TCG. Input validation error vulnerabilities exist in Intel Open CIT and OpenAttestation. A local attacker could exploit this vulnerability to elevate privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0924", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0181" } ] }, "cve": "CVE-2019-0181", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140212", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0181", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-570", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140212", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "NVD", "id": "CVE-2019-0181" }, { "db": "CNNVD", "id": "CNNVD-201906-570" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Both Intel Open Cloud Integrity Technology (CIT) and Intel OpenAttestation are products of Intel Corporation. Intel Open Cloud Integrity Technology is a set of solutions for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. Intel OpenAttestation is an open source project for managing host integrity verification using the remote attestation protocol defined by the TCG. Input validation error vulnerabilities exist in Intel Open CIT and OpenAttestation. A local attacker could exploit this vulnerability to elevate privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0181" }, { "db": "VULHUB", "id": "VHN-140212" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0181", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-570", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140212", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0181" }, { "db": "CNNVD", "id": "CNNVD-201906-570" } ] }, "id": "VAR-201906-0924", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140212" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:47:38.429000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "NVD", "id": "CVE-2019-0181" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0181" }, { "db": "CNNVD", "id": "CNNVD-201906-570" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140212" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0181" }, { "db": "CNNVD", "id": "CNNVD-201906-570" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140212" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.137000", "db": "NVD", "id": "CVE-2019-0181" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-570" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140212" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-02-27T16:38:46.587000", "db": "NVD", "id": "CVE-2019-0181" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-570" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-570" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-570" } ], "trust": 0.6 } }
var-201906-0921
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A race condition issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0921", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0178" } ] }, "cve": "CVE-2019-0178", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-140209", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.0, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0178", "trust": 1.0, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-568", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140209", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "NVD", "id": "CVE-2019-0178" }, { "db": "CNNVD", "id": "CNNVD-201906-568" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A race condition issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0178" }, { "db": "VULHUB", "id": "VHN-140209" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0178", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-568", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140209", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0178" }, { "db": "CNNVD", "id": "CNNVD-201906-568" } ] }, "id": "VAR-201906-0921", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140209" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:33:16.738000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.0 }, { "problemtype": "CWE-362", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "NVD", "id": "CVE-2019-0178" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0178" }, { "db": "CNNVD", "id": "CNNVD-201906-568" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140209" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0178" }, { "db": "CNNVD", "id": "CNNVD-201906-568" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140209" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.013000", "db": "NVD", "id": "CVE-2019-0178" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-568" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-140209" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2022-04-18T17:16:22.733000", "db": "NVD", "id": "CVE-2019-0178" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-568" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-568" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-568" } ], "trust": 0.6 } }
var-201906-0926
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An information disclosure vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0926", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0183" } ] }, "cve": "CVE-2019-0183", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140214", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0183", "trust": 1.0, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-574", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-140214", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "NVD", "id": "CVE-2019-0183" }, { "db": "CNNVD", "id": "CNNVD-201906-574" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. An information disclosure vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0183" }, { "db": "VULHUB", "id": "VHN-140214" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0183", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-574", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140214", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0183" }, { "db": "CNNVD", "id": "CNNVD-201906-574" } ] }, "id": "VAR-201906-0926", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140214" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:20:15.100000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "NVD", "id": "CVE-2019-0183" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0183" }, { "db": "CNNVD", "id": "CNNVD-201906-574" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140214" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0183" }, { "db": "CNNVD", "id": "CNNVD-201906-574" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140214" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.233000", "db": "NVD", "id": "CVE-2019-0183" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-574" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140214" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-02-27T16:36:56.903000", "db": "NVD", "id": "CVE-2019-0183" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-574" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-574" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-574" } ], "trust": 0.6 } }
var-201906-1234
Vulnerability from variot
Buffer overflow in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1234", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11127" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-552" } ], "trust": 0.6 }, "cve": "CVE-2019-11127", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142742", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11127", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11127", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-552", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142742", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11127", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "NVD", "id": "CVE-2019-11127" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc", "sources": [ { "db": "NVD", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11127", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-552", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142742", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11127", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11127" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "id": "VAR-201906-1234", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142742" } ], "trust": 0.8385371857142857 }, "last_update_date": "2023-12-18T10:47:01.084000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93785" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "NVD", "id": "CVE-2019-11127" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11127" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142742" }, { "db": "VULMON", "id": "CVE-2019-11127" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11127" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142742" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11127" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.497000", "db": "NVD", "id": "CVE-2019-11127" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142742" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11127" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:14.570000", "db": "NVD", "id": "CVE-2019-11127" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-552" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-552" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-552" } ], "trust": 0.6 } }
var-201906-0914
Vulnerability from variot
Improper permissions in the installer for Intel(R) Turbo Boost Max Technology 3.0 driver version 1.0.0.1035 and before may allow an authenticated user to potentially enable escalation of privilege via local access. A local attacker can exploit this issue to gain elevated privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0914", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "thinkstation p710", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p510", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "turbo boost max technology 3.0", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "1.0.0.1035" }, { "model": "thinkstation p410", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "thinkstation p910", "scope": "eq", "trust": 1.0, "vendor": "lenovo", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "3.01.0.0.1035" } ], "sources": [ { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:turbo_boost_max_technology_3.0:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.0.1035", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p410_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p410:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p510_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p510:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p710_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p710:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:lenovo:thinkstation_p910_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:lenovo:thinkstation_p910:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0164" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai.", "sources": [ { "db": "BID", "id": "108770" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ], "trust": 0.9 }, "cve": "CVE-2019-0164", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-140195", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.3, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0164", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-532", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-140195", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "NVD", "id": "CVE-2019-0164" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for Intel(R) Turbo Boost Max Technology 3.0 driver version 1.0.0.1035 and before may allow an authenticated user to potentially enable escalation of privilege via local access. \nA local attacker can exploit this issue to gain elevated privileges", "sources": [ { "db": "NVD", "id": "CVE-2019-0164" }, { "db": "BID", "id": "108770" }, { "db": "VULHUB", "id": "VHN-140195" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0164", "trust": 2.8 }, { "db": "BID", "id": "108770", "trust": 2.0 }, { "db": "LENOVO", "id": "LEN-27841", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-532", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140195", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0164" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ] }, "id": "VAR-201906-0914", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140195" } ], "trust": 0.4319270433333333 }, "last_update_date": "2023-12-18T10:55:08.542000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "NVD", "id": "CVE-2019-0164" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108770" }, { "trust": 2.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "trust": 1.7, "url": "https://support.lenovo.com/us/en/product_security/len-27841" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27841" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0164" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140195" }, { "db": "BID", "id": "108770" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0164" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140195" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108770" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.840000", "db": "NVD", "id": "CVE-2019-0164" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-532" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-140195" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108770" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-03-02T16:12:04.287000", "db": "NVD", "id": "CVE-2019-0164" }, { "date": "2019-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-532" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108770" }, { "db": "CNNVD", "id": "CNNVD-201906-532" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-532" } ], "trust": 0.6 } }
var-201906-1230
Vulnerability from variot
Insufficient session validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1230", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kits", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11123" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 0.6 }, "cve": "CVE-2019-11123", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25503", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142738", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11123", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11123", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-25503", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-549", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142738", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11123", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "NVD", "id": "CVE-2019-11123" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient session validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2019-11123" }, { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11123", "trust": 3.5 }, { "db": "BID", "id": "108766", "trust": 2.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-549", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25503", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142738", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11123", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11123" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "id": "VAR-201906-1230", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" } ], "trust": 1.4243450375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" } ] }, "last_update_date": "2023-12-18T11:48:04.066000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "IntelNUCKit enters a patch to verify the error vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/172811" }, { "title": "Intel NUC Kit Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93782" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142738" }, { "db": "NVD", "id": "CVE-2019-11123" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 2.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11123" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "VULHUB", "id": "VHN-142738" }, { "db": "VULMON", "id": "CVE-2019-11123" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11123" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25503" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142738" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11123" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.357000", "db": "NVD", "id": "CVE-2019-11123" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25503" }, { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142738" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11123" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:13.837000", "db": "NVD", "id": "CVE-2019-11123" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-549" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel NUC Kit Input Validation Error Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-25503" }, { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-549" } ], "trust": 0.6 } }
var-201906-1227
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11092" } ] }, "cve": "CVE-2019-11092", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142704", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11092", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-573", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142704", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "NVD", "id": "CVE-2019-11092" }, { "db": "CNNVD", "id": "CNNVD-201906-573" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-11092" }, { "db": "VULHUB", "id": "VHN-142704" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11092", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-573", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-142704", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11092" }, { "db": "CNNVD", "id": "CNNVD-201906-573" } ] }, "id": "VAR-201906-1227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142704" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:21:49.222000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "NVD", "id": "CVE-2019-11092" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11092" }, { "db": "CNNVD", "id": "CNNVD-201906-573" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142704" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11092" }, { "db": "CNNVD", "id": "CNNVD-201906-573" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142704" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.263000", "db": "NVD", "id": "CVE-2019-11092" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-573" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-142704" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-03-24T18:07:34.690000", "db": "NVD", "id": "CVE-2019-11092" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-573" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-573" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-573" } ], "trust": 0.6 } }
var-201906-1235
Vulnerability from variot
Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11128" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.6 }, "cve": "CVE-2019-11128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142743", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11128", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11128", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-553", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142743", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11128", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11128", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-553", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142743", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11128", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "id": "VAR-201906-1235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142743" } ], "trust": 0.8385371857142857 }, "last_update_date": "2023-12-18T11:20:15.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93786" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142743" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11128" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.543000", "db": "NVD", "id": "CVE-2019-11128" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142743" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11128" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:14.727000", "db": "NVD", "id": "CVE-2019-11128" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.6 } }
var-201906-0953
Vulnerability from variot
Improper permissions in the installer for the ITE Tech* Consumer Infrared Driver for Windows 10 versions before 5.4.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. A local attacker can exploit this issue to gain elevated privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0953", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ite tech consumer infrared driver", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "5.4.3.0" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.2.2" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.4.2.0" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.4.1.0" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.3.2.0" }, { "model": "ite tech consumer infrared driver for windows", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "105.1.0.7" }, { "model": "ite tech consumer infrared driver for windows", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "105.4.3.0" } ], "sources": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2018-3702" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:ite_tech_consumer_infrared_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.4.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-3702" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SaifAllah benMassaoud", "sources": [ { "db": "BID", "id": "108782" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ], "trust": 0.9 }, "cve": "CVE-2018-3702", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-3702", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-564", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-3702" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for the ITE Tech* Consumer Infrared Driver for Windows 10 versions before 5.4.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. \nA local attacker can exploit this issue to gain elevated privileges", "sources": [ { "db": "NVD", "id": "CVE-2018-3702" }, { "db": "BID", "id": "108782" } ], "trust": 1.17 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3702", "trust": 2.7 }, { "db": "BID", "id": "108782", "trust": 1.9 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-564", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2018-3702" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "id": "VAR-201906-0953", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25292397 }, "last_update_date": "2023-12-18T11:09:28.221000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel ITE Tech* Consumer Infrared Driver Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2018-3702" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/108782" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2018-3702" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "108782" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2018-3702" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108782" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.310000", "db": "NVD", "id": "CVE-2018-3702" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108782" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-03-04T01:47:53.700000", "db": "NVD", "id": "CVE-2018-3702" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-564" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108782" }, { "db": "CNNVD", "id": "CNNVD-201906-564" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-564" } ], "trust": 0.6 } }
var-201906-0917
Vulnerability from variot
Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel Dual Band Wireless-AC 8260 contains a denial-of-service (DoS) vulnerability (CWE-400). Yusuke Ogawa of Cisco Systems G.K. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to cause a denial-of-service (DoS). IntelPROSet/WirelessWiFiSoftwaredriver is a wireless network card driver from Intel Corporation of the United States. The vulnerability stems from a network system or product that does not properly restrict access to resources from unauthorized roles that an attacker could use to cause a denial of service. Intel PROSet/Wireless WiFi Software driver是美国英特尔(Intel)公司的一款无线网卡驱动程序. Intel PROSet/Wireless WiFi Software driver 21.10之前版本中存在访问控制错误漏洞。该漏洞源于网络系统或产品未正确限制来自未授权角色的资源访问。以下产品及版本受到影响:Intel Dual Band Wireless-AC 3160;Dual Band Wireless-AC 7260;Dual Band Wireless-N 7260;Wireless-N 7260;Dual Band Wireless-AC 7260 for Desktop;Dual Band Wireless-AC 7265 (Rev. C);Dual Band Wireless-N 7265 (Rev. C);Wireless-N 7265 (Rev. C);Dual Band Wireless-AC 3165;Dual Band Wireless-AC 7265 (Rev. D);Dual Band Wireless-N 7265 (Rev. D);Wireless-N 7265 (Rev. D);Dual Band Wireless-AC 3168;Tri-Band Wireless-AC 17265;Dual Band Wireless-AC 8260;Tri-Band Wireless-AC 18260;Dual Band Wireless-AC 8265;Dual Band Wireless-AC 8265 Desktop Kit;Tri-Band Wireless-AC 18265;Wireless-AC 9560;Wireless-AC 9461;Wireless-AC 9462;Wireless-AC 9260;Wi-Fi 6 AX200;Wi-Fi 6 AX201. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. (CVE-2019-11477)
Jonathan Looney discovered that the TCP retransmission queue implementation in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. (CVE-2019-14835)
Update instructions:
The problem can be corrected by updating your livepatches to the following versions:
| Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 58.1 | lowlatency, generic | | 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-150.176 | 58.1 | generic, lowlatency | | 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-151.178 | 58.1 | lowlatency, generic | | 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-154.181 | 58.1 | lowlatency, generic | | 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-157.185 | 58.1 | lowlatency, generic | | 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-159.187 | 58.1 | lowlatency, generic | | 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-161.189 | 58.1 | lowlatency, generic | | 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-164.192 | 58.1 | lowlatency, generic | | 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-165.193 | 58.1 | generic, lowlatency | | 4.4.0-1083.93 | 58.1 | aws | | 4.4.0-1084.94 | 58.1 | aws | | 4.4.0-1085.96 | 58.1 | aws | | 4.4.0-1087.98 | 58.1 | aws | | 4.4.0-1088.99 | 58.1 | aws | | 4.4.0-1090.101 | 58.1 | aws | | 4.4.0-1092.103 | 58.1 | aws | | 4.4.0-1094.105 | 58.1 | aws | | 4.15.0-50.54 | 58.1 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-51.55 | 58.1 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-52.56 | 58.1 | lowlatency, generic | | 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-54.58 | 58.1 | generic, lowlatency | | 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-55.60 | 58.1 | generic, lowlatency | | 4.15.0-58.64 | 58.1 | generic, lowlatency | | 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-60.67 | 58.1 | lowlatency, generic | | 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-62.69 | 58.1 | generic, lowlatency | | 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-64.73 | 58.1 | generic, lowlatency | | 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-65.74 | 58.1 | lowlatency, generic | | 4.15.0-1038.43 | 58.1 | oem | | 4.15.0-1039.41 | 58.1 | aws | | 4.15.0-1039.44 | 58.1 | oem | | 4.15.0-1040.42 | 58.1 | aws | | 4.15.0-1041.43 | 58.1 | aws | | 4.15.0-1043.45 | 58.1 | aws | | 4.15.0-1043.48 | 58.1 | oem | | 4.15.0-1044.46 | 58.1 | aws | | 4.15.0-1045.47 | 58.1 | aws | | 4.15.0-1045.50 | 58.1 | oem | | 4.15.0-1047.49 | 58.1 | aws | | 4.15.0-1047.51 | 58.1 | azure | | 4.15.0-1048.50 | 58.1 | aws | | 4.15.0-1049.54 | 58.1 | azure | | 4.15.0-1050.52 | 58.1 | aws | | 4.15.0-1050.55 | 58.1 | azure | | 4.15.0-1050.57 | 58.1 | oem | | 4.15.0-1051.53 | 58.1 | aws | | 4.15.0-1051.56 | 58.1 | azure | | 4.15.0-1052.57 | 58.1 | azure | | 4.15.0-1055.60 | 58.1 | azure | | 4.15.0-1056.61 | 58.1 | azure | | 4.15.0-1056.65 | 58.1 | oem | | 4.15.0-1057.62 | 58.1 | azure | | 4.15.0-1057.66 | 58.1 | oem | | 4.15.0-1059.64 | 58.1 | azure | | 5.0.0-1014.14~18.04.1 | 58.1 | azure | | 5.0.0-1016.17~18.04.1 | 58.1 | azure | | 5.0.0-1018.19~18.04.1 | 58.1 | azure | | 5.0.0-1020.21~18.04.1 | 58.1 | azure |
Support Information:
Kernels older than the levels listed below do not receive livepatch updates. Please upgrade your kernel as soon as possible.
| Series | Version | Flavors | |------------------+------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1039 | aws | | Ubuntu 16.04 LTS | 4.4.0-1083 | aws | | Ubuntu 18.04 LTS | 5.0.0-1000 | azure | | Ubuntu 16.04 LTS | 4.15.0-1047 | azure | | Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1038 | oem | | Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency |
References: CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . ========================================================================= Ubuntu Security Notice USN-4118-1 September 02, 2019
linux-aws vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
Details:
It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability. (CVE-2018-13053)
Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly track inode validations. (CVE-2018-13093)
Wen Xu discovered that the f2fs file system implementation in the Linux kernel did not properly validate metadata. (CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616)
Wen Xu and Po-Ning Tseng discovered that btrfs file system implementation in the Linux kernel did not properly validate metadata. (CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613)
Wen Xu discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations. (CVE-2018-14617)
Vasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem of the Linux kernel did not properly initialize new files in some situations. A local attacker could use this to expose sensitive information. (CVE-2018-16862)
Hui Peng and Mathias Payer discovered that the Option USB High Speed driver in the Linux kernel did not properly validate metadata received from the device. (CVE-2018-19985)
Hui Peng and Mathias Payer discovered that the USB subsystem in the Linux kernel did not properly handle size checks when handling an extra USB descriptor. (CVE-2018-20169)
Zhipeng Xie discovered that an infinite loop could triggered in the CFS Linux kernel process scheduler. (CVE-2018-20784)
It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856)
Eli Biham and Lior Neumann discovered that the Bluetooth implementation in the Linux kernel did not properly validate elliptic curve parameters during Diffie-Hellman key exchange in some situations. An attacker could use this to expose sensitive information. (CVE-2018-5383)
It was discovered that the Intel wifi device driver in the Linux kernel did not properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136)
It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. (CVE-2019-10126)
It was discovered that the Bluetooth UART implementation in the Linux kernel did not properly check for missing tty operations. (CVE-2019-10207)
Amit Klein and Benny Pinkas discovered that the Linux kernel did not sufficiently randomize IP ID values generated for connectionless networking protocols. A remote attacker could use this to track particular Linux devices. (CVE-2019-10638)
Amit Klein and Benny Pinkas discovered that the location of kernel addresses could exposed by the implementation of connection-less network protocols in the Linux kernel. A remote attacker could possibly use this to assist in the exploitation of another vulnerability in the Linux kernel. (CVE-2019-10639)
Adam Zabrocki discovered that the Intel i915 kernel mode graphics driver in the Linux kernel did not properly restrict mmap() ranges in some situations. (CVE-2019-11085)
It was discovered that an integer overflow existed in the Linux kernel when reference counting pages, leading to potential use-after-free issues. (CVE-2019-11487)
Jann Horn discovered that a race condition existed in the Linux kernel when performing core dumps. (CVE-2019-11599)
It was discovered that a null pointer dereference vulnerability existed in the LSI Logic MegaRAID driver in the Linux kernel. (CVE-2019-11810)
It was discovered that a race condition leading to a use-after-free existed in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel. The RDS protocol is blacklisted by default in Ubuntu. (CVE-2019-11815)
It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833)
It was discovered that the Bluetooth Human Interface Device Protocol (HIDP) implementation in the Linux kernel did not properly verify strings were NULL terminated in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11884)
It was discovered that a NULL pointer dereference vulnerabilty existed in the Near-field communication (NFC) implementation in the Linux kernel. (CVE-2019-12818)
It was discovered that the MDIO bus devices subsystem in the Linux kernel improperly dropped a device reference in an error condition, leading to a use-after-free. (CVE-2019-12819)
It was discovered that a NULL pointer dereference vulnerability existed in the Near-field communication (NFC) implementation in the Linux kernel. (CVE-2019-12984)
Jann Horn discovered a use-after-free vulnerability in the Linux kernel when accessing LDT entries in some situations. (CVE-2019-13233)
Jann Horn discovered that the ptrace implementation in the Linux kernel did not properly record credentials in some situations. (CVE-2019-13272)
It was discovered that the GTCO tablet input driver in the Linux kernel did not properly bounds check the initial HID report sent by the device. (CVE-2019-13631)
It was discovered that the floppy driver in the Linux kernel did not properly validate meta data, leading to a buffer overread. (CVE-2019-14283)
It was discovered that the floppy driver in the Linux kernel did not properly validate ioctl() calls, leading to a division-by-zero. (CVE-2019-14284)
Tuba Yavuz discovered that a race condition existed in the DesignWare USB3 DRD Controller device driver in the Linux kernel. (CVE-2019-14763)
It was discovered that an out-of-bounds read existed in the QLogic QEDI iSCSI Initiator Driver in the Linux kernel. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2019-15090)
It was discovered that the Raremono AM/FM/SW radio device driver in the Linux kernel did not properly allocate memory, leading to a use-after-free. (CVE-2019-15211)
It was discovered at a double-free error existed in the USB Rio 500 device driver for the Linux kernel. (CVE-2019-15212)
It was discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) subsystem of the Linux kernel, leading to a potential use-after-free. (CVE-2019-15214)
It was discovered that a race condition existed in the CPiA2 video4linux device driver for the Linux kernel, leading to a use-after-free. (CVE-2019-15215)
It was discovered that a race condition existed in the Softmac USB Prism54 device driver in the Linux kernel. (CVE-2019-15220)
It was discovered that a use-after-free vulnerability existed in the Appletalk implementation in the Linux kernel if an error occurs during initialization. (CVE-2019-15292)
It was discovered that the Empia EM28xx DVB USB device driver implementation in the Linux kernel contained a use-after-free vulnerability when disconnecting the device. (CVE-2019-2024)
It was discovered that the USB video device class implementation in the Linux kernel did not properly validate control bits, resulting in an out of bounds buffer read. A local attacker could use this to possibly expose sensitive information (kernel memory). (CVE-2019-2101)
It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. (CVE-2019-3846)
Jason Wang discovered that an infinite loop vulnerability existed in the virtio net driver in the Linux kernel. (CVE-2019-3900)
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen discovered that the Bluetooth protocol BR/EDR specification did not properly require sufficiently strong encryption key lengths. A physicall proximate attacker could use this to expose sensitive information. (CVE-2019-9506)
It was discovered that the Appletalk IP encapsulation driver in the Linux kernel did not properly prevent kernel addresses from being copied to user space. A local attacker with the CAP_NET_ADMIN capability could use this to expose sensitive information. (CVE-2018-20511)
It was discovered that a race condition existed in the USB YUREX device driver in the Linux kernel. (CVE-2019-15216)
It was discovered that the Siano USB MDTV receiver device driver in the Linux kernel made improper assumptions about the device characteristics. (CVE-2019-15218)
It was discovered that the Line 6 POD USB device driver in the Linux kernel did not properly validate data size information from the device. (CVE-2019-15221)
Muyu Yu discovered that the CAN implementation in the Linux kernel in some situations did not properly restrict the field size when processing outgoing frames. A local attacker with CAP_NET_ADMIN privileges could use this to execute arbitrary code. (CVE-2019-3701)
Vladis Dronov discovered that the debug interface for the Linux kernel's HID subsystem did not properly validate passed parameters in some situations. (CVE-2019-3819)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: linux-image-4.15.0-1047-aws 4.15.0-1047.49 linux-image-aws 4.15.0.1047.46
Ubuntu 16.04 LTS: linux-image-4.15.0-1047-aws 4.15.0-1047.49~16.04.1 linux-image-aws-hwe 4.15.0.1047.47
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4118-1 CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097, CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617, CVE-2018-16862, CVE-2018-19985, CVE-2018-20169, CVE-2018-20511, CVE-2018-20784, CVE-2018-20856, CVE-2018-5383, CVE-2019-0136, CVE-2019-10126, CVE-2019-10207, CVE-2019-10638, CVE-2019-10639, CVE-2019-11085, CVE-2019-11487, CVE-2019-11599, CVE-2019-11810, CVE-2019-11815, CVE-2019-11833, CVE-2019-11884, CVE-2019-12818, CVE-2019-12819, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272, CVE-2019-13631, CVE-2019-14283, CVE-2019-14284, CVE-2019-14763, CVE-2019-15090, CVE-2019-15211, CVE-2019-15212, CVE-2019-15214, CVE-2019-15215, CVE-2019-15216, CVE-2019-15218, CVE-2019-15220, CVE-2019-15221, CVE-2019-15292, CVE-2019-2024, CVE-2019-2101, CVE-2019-3701, CVE-2019-3819, CVE-2019-3846, CVE-2019-3900, CVE-2019-9506
Package Information: https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49 https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1 . Unfortunately, as part of the update, a regression was introduced that caused a kernel crash when handling fragmented packets in some situations. This update addresses the issue.
We apologize for the inconvenience
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0917", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dual band wireless-ac", "scope": "eq", "trust": 1.2, "vendor": "intel", "version": "7265" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 1.2, "vendor": "intel", "version": "7265" }, { "model": "wireless-n", "scope": "eq", "trust": 1.2, "vendor": "intel", "version": "7265" }, { "model": "proset\\/wireless wifi", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "21.10" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "dual band wireless-ac 8260", "scope": "lte", "trust": 0.8, "vendor": "intel", "version": "windows10 driver version 20.50.1.1" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3160" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "dual band wireless-ac for desktop", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3165" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "3168" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "8260" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "8265" }, { "model": "dual band wireless-ac desktop kit", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "8265" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "18265" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "17265" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "18260" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9560" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9461" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9462" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "9260" }, { "model": "wireless-n", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "7260" }, { "model": "wi-fi ax200", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "6" }, { "model": "wi-fi ax201", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "6" }, { "model": "wireless-n", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "95600" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "94620" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "94610" }, { "model": "wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "92600" }, { "model": "wi-fi ax201", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "60" }, { "model": "wi-fi ax200", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "60" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "182650" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "182600" }, { "model": "tri-band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "172650" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "20.120.1" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "17.16" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "16.1.1" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "15.8" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "21.0" }, { "model": "proset/wireless wifi software", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "20.100" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72650" }, { "model": "dual band wireless-n", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "dual band wireless-ac desktop kit", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "82650" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "82650" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "82600" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72650" }, { "model": "dual band wireless-ac for desktop", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "72600" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "31680" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "31650" }, { "model": "dual band wireless-ac", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "31600" }, { "model": "proset/wireless wifi software", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "21.10" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0136" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu,JPCERT", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 0.6 }, "cve": "CVE-2019-0136", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-000046", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2019-25748", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA", "availabilityImpact": "Low", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-000046", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0136", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2019-000046", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-25748", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201906-530", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "NVD", "id": "CVE-2019-0136" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel Dual Band Wireless-AC 8260 contains a denial-of-service (DoS) vulnerability (CWE-400). Yusuke Ogawa of Cisco Systems G.K. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to cause a denial-of-service (DoS). IntelPROSet/WirelessWiFiSoftwaredriver is a wireless network card driver from Intel Corporation of the United States. The vulnerability stems from a network system or product that does not properly restrict access to resources from unauthorized roles that an attacker could use to cause a denial of service. Intel PROSet/Wireless WiFi Software driver\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u65e0\u7ebf\u7f51\u5361\u9a71\u52a8\u7a0b\u5e8f. \nIntel PROSet/Wireless WiFi Software driver 21.10\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u9650\u5236\u6765\u81ea\u672a\u6388\u6743\u89d2\u8272\u7684\u8d44\u6e90\u8bbf\u95ee\u3002\u4ee5\u4e0b\u4ea7\u54c1\u53ca\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aIntel Dual Band Wireless-AC 3160\uff1bDual Band Wireless-AC 7260\uff1bDual Band Wireless-N 7260\uff1bWireless-N 7260\uff1bDual Band Wireless-AC 7260 for Desktop\uff1bDual Band Wireless-AC 7265 (Rev. C)\uff1bDual Band Wireless-N 7265 (Rev. C)\uff1bWireless-N 7265 (Rev. C)\uff1bDual Band Wireless-AC 3165\uff1bDual Band Wireless-AC 7265 (Rev. D)\uff1bDual Band Wireless-N 7265 (Rev. D)\uff1bWireless-N 7265 (Rev. D)\uff1bDual Band Wireless-AC 3168\uff1bTri-Band Wireless-AC 17265\uff1bDual Band Wireless-AC 8260\uff1bTri-Band Wireless-AC 18260\uff1bDual Band Wireless-AC 8265\uff1bDual Band Wireless-AC 8265 Desktop Kit\uff1bTri-Band Wireless-AC 18265\uff1bWireless-AC 9560\uff1bWireless-AC 9461\uff1bWireless-AC 9462\uff1bWireless-AC 9260\uff1bWi-Fi 6 AX200\uff1bWi-Fi 6 AX201. \nAn attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. \n(CVE-2019-11477)\n\nJonathan Looney discovered that the TCP retransmission queue implementation\nin the Linux kernel could be fragmented when handling certain TCP Selective\nAcknowledgment (SACK) sequences. (CVE-2019-14835)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel | Version | flavors |\n|--------------------------+----------+--------------------------|\n| 4.4.0-148.174 | 58.1 | lowlatency, generic |\n| 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-150.176 | 58.1 | generic, lowlatency |\n| 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-151.178 | 58.1 | lowlatency, generic |\n| 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-154.181 | 58.1 | lowlatency, generic |\n| 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-157.185 | 58.1 | lowlatency, generic |\n| 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-159.187 | 58.1 | lowlatency, generic |\n| 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency |\n| 4.4.0-161.189 | 58.1 | lowlatency, generic |\n| 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-164.192 | 58.1 | lowlatency, generic |\n| 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic |\n| 4.4.0-165.193 | 58.1 | generic, lowlatency |\n| 4.4.0-1083.93 | 58.1 | aws |\n| 4.4.0-1084.94 | 58.1 | aws |\n| 4.4.0-1085.96 | 58.1 | aws |\n| 4.4.0-1087.98 | 58.1 | aws |\n| 4.4.0-1088.99 | 58.1 | aws |\n| 4.4.0-1090.101 | 58.1 | aws |\n| 4.4.0-1092.103 | 58.1 | aws |\n| 4.4.0-1094.105 | 58.1 | aws |\n| 4.15.0-50.54 | 58.1 | generic, lowlatency |\n| 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-51.55 | 58.1 | generic, lowlatency |\n| 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-52.56 | 58.1 | lowlatency, generic |\n| 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-54.58 | 58.1 | generic, lowlatency |\n| 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-55.60 | 58.1 | generic, lowlatency |\n| 4.15.0-58.64 | 58.1 | generic, lowlatency |\n| 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic |\n| 4.15.0-60.67 | 58.1 | lowlatency, generic |\n| 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency |\n| 4.15.0-62.69 | 58.1 | generic, lowlatency |\n| 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic |\n| 4.15.0-64.73 | 58.1 | generic, lowlatency |\n| 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic |\n| 4.15.0-65.74 | 58.1 | lowlatency, generic |\n| 4.15.0-1038.43 | 58.1 | oem |\n| 4.15.0-1039.41 | 58.1 | aws |\n| 4.15.0-1039.44 | 58.1 | oem |\n| 4.15.0-1040.42 | 58.1 | aws |\n| 4.15.0-1041.43 | 58.1 | aws |\n| 4.15.0-1043.45 | 58.1 | aws |\n| 4.15.0-1043.48 | 58.1 | oem |\n| 4.15.0-1044.46 | 58.1 | aws |\n| 4.15.0-1045.47 | 58.1 | aws |\n| 4.15.0-1045.50 | 58.1 | oem |\n| 4.15.0-1047.49 | 58.1 | aws |\n| 4.15.0-1047.51 | 58.1 | azure |\n| 4.15.0-1048.50 | 58.1 | aws |\n| 4.15.0-1049.54 | 58.1 | azure |\n| 4.15.0-1050.52 | 58.1 | aws |\n| 4.15.0-1050.55 | 58.1 | azure |\n| 4.15.0-1050.57 | 58.1 | oem |\n| 4.15.0-1051.53 | 58.1 | aws |\n| 4.15.0-1051.56 | 58.1 | azure |\n| 4.15.0-1052.57 | 58.1 | azure |\n| 4.15.0-1055.60 | 58.1 | azure |\n| 4.15.0-1056.61 | 58.1 | azure |\n| 4.15.0-1056.65 | 58.1 | oem |\n| 4.15.0-1057.62 | 58.1 | azure |\n| 4.15.0-1057.66 | 58.1 | oem |\n| 4.15.0-1059.64 | 58.1 | azure |\n| 5.0.0-1014.14~18.04.1 | 58.1 | azure |\n| 5.0.0-1016.17~18.04.1 | 58.1 | azure |\n| 5.0.0-1018.19~18.04.1 | 58.1 | azure |\n| 5.0.0-1020.21~18.04.1 | 58.1 | azure |\n\nSupport Information:\n\nKernels older than the levels listed below do not receive livepatch\nupdates. Please upgrade your kernel as soon as possible. \n\n| Series | Version | Flavors |\n|------------------+------------------+--------------------------|\n| Ubuntu 18.04 LTS | 4.15.0-1039 | aws |\n| Ubuntu 16.04 LTS | 4.4.0-1083 | aws |\n| Ubuntu 18.04 LTS | 5.0.0-1000 | azure |\n| Ubuntu 16.04 LTS | 4.15.0-1047 | azure |\n| Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency |\n| Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency |\n| Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency |\n| Ubuntu 18.04 LTS | 4.15.0-1038 | oem |\n| Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency |\n\nReferences:\n CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, \n CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, \n CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, \n CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, \n CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, \n CVE-2019-14821, CVE-2019-14835\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. =========================================================================\nUbuntu Security Notice USN-4118-1\nSeptember 02, 2019\n\nlinux-aws vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux-aws: Linux kernel for Amazon Web Services (AWS) systems\n- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems\n\nDetails:\n\nIt was discovered that the alarmtimer implementation in the Linux kernel\ncontained an integer overflow vulnerability. (CVE-2018-13053)\n\nWen Xu discovered that the XFS filesystem implementation in the Linux\nkernel did not properly track inode validations. (CVE-2018-13093)\n\nWen Xu discovered that the f2fs file system implementation in the Linux\nkernel did not properly validate metadata. (CVE-2018-13096, CVE-2018-13097, CVE-2018-13098,\nCVE-2018-13099, CVE-2018-13100, CVE-2018-14614, CVE-2018-14615,\nCVE-2018-14616)\n\nWen Xu and Po-Ning Tseng discovered that btrfs file system implementation\nin the Linux kernel did not properly validate metadata. (CVE-2018-14609, CVE-2018-14610,\nCVE-2018-14611, CVE-2018-14612, CVE-2018-14613)\n\nWen Xu discovered that the HFS+ filesystem implementation in the Linux\nkernel did not properly handle malformed catalog data in some situations. (CVE-2018-14617)\n\nVasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem\nof the Linux kernel did not properly initialize new files in some\nsituations. A local attacker could use this to expose sensitive\ninformation. (CVE-2018-16862)\n\nHui Peng and Mathias Payer discovered that the Option USB High Speed driver\nin the Linux kernel did not properly validate metadata received from the\ndevice. (CVE-2018-19985)\n\nHui Peng and Mathias Payer discovered that the USB subsystem in the Linux\nkernel did not properly handle size checks when handling an extra USB\ndescriptor. (CVE-2018-20169)\n\nZhipeng Xie discovered that an infinite loop could triggered in the CFS\nLinux kernel process scheduler. (CVE-2018-20784)\n\nIt was discovered that a use-after-free error existed in the block layer\nsubsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856)\n\nEli Biham and Lior Neumann discovered that the Bluetooth implementation in\nthe Linux kernel did not properly validate elliptic curve parameters during\nDiffie-Hellman key exchange in some situations. An attacker could use this\nto expose sensitive information. (CVE-2018-5383)\n\nIt was discovered that the Intel wifi device driver in the Linux kernel did\nnot properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136)\n\nIt was discovered that a heap buffer overflow existed in the Marvell\nWireless LAN device driver for the Linux kernel. (CVE-2019-10126)\n\nIt was discovered that the Bluetooth UART implementation in the Linux\nkernel did not properly check for missing tty operations. (CVE-2019-10207)\n\nAmit Klein and Benny Pinkas discovered that the Linux kernel did not\nsufficiently randomize IP ID values generated for connectionless networking\nprotocols. A remote attacker could use this to track particular Linux\ndevices. (CVE-2019-10638)\n\nAmit Klein and Benny Pinkas discovered that the location of kernel\naddresses could exposed by the implementation of connection-less network\nprotocols in the Linux kernel. A remote attacker could possibly use this to\nassist in the exploitation of another vulnerability in the Linux kernel. \n(CVE-2019-10639)\n\nAdam Zabrocki discovered that the Intel i915 kernel mode graphics driver in\nthe Linux kernel did not properly restrict mmap() ranges in some\nsituations. (CVE-2019-11085)\n\nIt was discovered that an integer overflow existed in the Linux kernel when\nreference counting pages, leading to potential use-after-free issues. (CVE-2019-11487)\n\nJann Horn discovered that a race condition existed in the Linux kernel when\nperforming core dumps. (CVE-2019-11599)\n\nIt was discovered that a null pointer dereference vulnerability existed in\nthe LSI Logic MegaRAID driver in the Linux kernel. (CVE-2019-11810)\n\nIt was discovered that a race condition leading to a use-after-free existed\nin the Reliable Datagram Sockets (RDS) protocol implementation in the Linux\nkernel. The RDS protocol is blacklisted by default in Ubuntu. (CVE-2019-11815)\n\nIt was discovered that the ext4 file system implementation in the Linux\nkernel did not properly zero out memory in some situations. A local\nattacker could use this to expose sensitive information (kernel memory). \n(CVE-2019-11833)\n\nIt was discovered that the Bluetooth Human Interface Device Protocol (HIDP)\nimplementation in the Linux kernel did not properly verify strings were\nNULL terminated in certain situations. A local attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2019-11884)\n\nIt was discovered that a NULL pointer dereference vulnerabilty existed in\nthe Near-field communication (NFC) implementation in the Linux kernel. \n(CVE-2019-12818)\n\nIt was discovered that the MDIO bus devices subsystem in the Linux kernel\nimproperly dropped a device reference in an error condition, leading to a\nuse-after-free. (CVE-2019-12819)\n\nIt was discovered that a NULL pointer dereference vulnerability existed in\nthe Near-field communication (NFC) implementation in the Linux kernel. \n(CVE-2019-12984)\n\nJann Horn discovered a use-after-free vulnerability in the Linux kernel\nwhen accessing LDT entries in some situations. (CVE-2019-13233)\n\nJann Horn discovered that the ptrace implementation in the Linux kernel did\nnot properly record credentials in some situations. (CVE-2019-13272)\n\nIt was discovered that the GTCO tablet input driver in the Linux kernel did\nnot properly bounds check the initial HID report sent by the device. (CVE-2019-13631)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate meta data, leading to a buffer overread. \n(CVE-2019-14283)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate ioctl() calls, leading to a division-by-zero. \n(CVE-2019-14284)\n\nTuba Yavuz discovered that a race condition existed in the DesignWare USB3\nDRD Controller device driver in the Linux kernel. (CVE-2019-14763)\n\nIt was discovered that an out-of-bounds read existed in the QLogic QEDI\niSCSI Initiator Driver in the Linux kernel. A local attacker could possibly\nuse this to expose sensitive information (kernel memory). (CVE-2019-15090)\n\nIt was discovered that the Raremono AM/FM/SW radio device driver in the\nLinux kernel did not properly allocate memory, leading to a use-after-free. (CVE-2019-15211)\n\nIt was discovered at a double-free error existed in the USB Rio 500 device\ndriver for the Linux kernel. (CVE-2019-15212)\n\nIt was discovered that a race condition existed in the Advanced Linux Sound\nArchitecture (ALSA) subsystem of the Linux kernel, leading to a potential\nuse-after-free. \n(CVE-2019-15214)\n\nIt was discovered that a race condition existed in the CPiA2 video4linux\ndevice driver for the Linux kernel, leading to a use-after-free. (CVE-2019-15215)\n\nIt was discovered that a race condition existed in the Softmac USB Prism54\ndevice driver in the Linux kernel. (CVE-2019-15220)\n\nIt was discovered that a use-after-free vulnerability existed in the\nAppletalk implementation in the Linux kernel if an error occurs during\ninitialization. (CVE-2019-15292)\n\nIt was discovered that the Empia EM28xx DVB USB device driver\nimplementation in the Linux kernel contained a use-after-free vulnerability\nwhen disconnecting the device. (CVE-2019-2024)\n\nIt was discovered that the USB video device class implementation in the\nLinux kernel did not properly validate control bits, resulting in an out of\nbounds buffer read. A local attacker could use this to possibly expose\nsensitive information (kernel memory). (CVE-2019-2101)\n\nIt was discovered that the Marvell Wireless LAN device driver in the Linux\nkernel did not properly validate the BSS descriptor. (CVE-2019-3846)\n\nJason Wang discovered that an infinite loop vulnerability existed in the\nvirtio net driver in the Linux kernel. \n(CVE-2019-3900)\n\nDaniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen discovered\nthat the Bluetooth protocol BR/EDR specification did not properly require\nsufficiently strong encryption key lengths. A physicall proximate attacker\ncould use this to expose sensitive information. (CVE-2019-9506)\n\nIt was discovered that the Appletalk IP encapsulation driver in the Linux\nkernel did not properly prevent kernel addresses from being copied to user\nspace. A local attacker with the CAP_NET_ADMIN capability could use this to\nexpose sensitive information. (CVE-2018-20511)\n\nIt was discovered that a race condition existed in the USB YUREX device\ndriver in the Linux kernel. (CVE-2019-15216)\n\nIt was discovered that the Siano USB MDTV receiver device driver in the\nLinux kernel made improper assumptions about the device characteristics. (CVE-2019-15218)\n\nIt was discovered that the Line 6 POD USB device driver in the Linux kernel\ndid not properly validate data size information from the device. (CVE-2019-15221)\n\nMuyu Yu discovered that the CAN implementation in the Linux kernel in some\nsituations did not properly restrict the field size when processing\noutgoing frames. A local attacker with CAP_NET_ADMIN privileges could use\nthis to execute arbitrary code. (CVE-2019-3701)\n\nVladis Dronov discovered that the debug interface for the Linux kernel\u0027s\nHID subsystem did not properly validate passed parameters in some\nsituations. (CVE-2019-3819)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n linux-image-4.15.0-1047-aws 4.15.0-1047.49\n linux-image-aws 4.15.0.1047.46\n\nUbuntu 16.04 LTS:\n linux-image-4.15.0-1047-aws 4.15.0-1047.49~16.04.1\n linux-image-aws-hwe 4.15.0.1047.47\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4118-1\n CVE-2018-13053, CVE-2018-13093, CVE-2018-13096, CVE-2018-13097,\n CVE-2018-13098, CVE-2018-13099, CVE-2018-13100, CVE-2018-14609,\n CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613,\n CVE-2018-14614, CVE-2018-14615, CVE-2018-14616, CVE-2018-14617,\n CVE-2018-16862, CVE-2018-19985, CVE-2018-20169, CVE-2018-20511,\n CVE-2018-20784, CVE-2018-20856, CVE-2018-5383, CVE-2019-0136,\n CVE-2019-10126, CVE-2019-10207, CVE-2019-10638, CVE-2019-10639,\n CVE-2019-11085, CVE-2019-11487, CVE-2019-11599, CVE-2019-11810,\n CVE-2019-11815, CVE-2019-11833, CVE-2019-11884, CVE-2019-12818,\n CVE-2019-12819, CVE-2019-12984, CVE-2019-13233, CVE-2019-13272,\n CVE-2019-13631, CVE-2019-14283, CVE-2019-14284, CVE-2019-14763,\n CVE-2019-15090, CVE-2019-15211, CVE-2019-15212, CVE-2019-15214,\n CVE-2019-15215, CVE-2019-15216, CVE-2019-15218, CVE-2019-15220,\n CVE-2019-15221, CVE-2019-15292, CVE-2019-2024, CVE-2019-2101,\n CVE-2019-3701, CVE-2019-3819, CVE-2019-3846, CVE-2019-3900,\n CVE-2019-9506\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49\n https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1\n. Unfortunately, as part of the update,\na regression was introduced that caused a kernel crash when handling\nfragmented packets in some situations. This update addresses the issue. \n\nWe apologize for the inconvenience", "sources": [ { "db": "NVD", "id": "CVE-2019-0136" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "CNNVD", "id": "CNNVD-201906-530" }, { "db": "BID", "id": "108777" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0136", "trust": 4.7 }, { "db": "BID", "id": "108777", "trust": 2.5 }, { "db": "JVN", "id": "JVN75617741", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2019-000046", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "154951", "trust": 1.7 }, { "db": "LENOVO", "id": "LEN-27828", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "154326", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25748", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-27701", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0766", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0615", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3334", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201906-530", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "154315", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154695", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154740", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154446", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" }, { "db": "NVD", "id": "CVE-2019-0136" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "id": "VAR-201906-0917", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" } ], "trust": 1.1401698649999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" } ] }, "last_update_date": "2023-12-22T21:37:22.289000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Downloads for Intel Dual Band Wireless-AC 8260", "trust": 0.8, "url": "https://downloadcenter.intel.com/en/product/86068" }, { "title": "IntelPROSet/WirelessWiFiSoftwaredriver Access Control Error Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/173035" }, { "title": "Intel PROSet/Wireless WiFi Software driver Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93761" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "NVD", "id": "CVE-2019-0136" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.securityfocus.com/bid/108777" }, { "trust": 2.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 2.4, "url": "http://jvn.jp/en/jp/jvn75617741/index.html" }, { "trust": 2.2, "url": "https://usn.ubuntu.com/4115-1/" }, { "trust": 2.2, "url": "https://usn.ubuntu.com/4147-1/" }, { "trust": 1.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "trust": 1.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 1.6, "url": "http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html" }, { "trust": 1.6, "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" }, { "trust": 1.6, "url": "https://support.lenovo.com/us/en/product_security/len-27828" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4118-1/" }, { "trust": 1.6, "url": "https://usn.ubuntu.com/4145-1/" }, { "trust": 1.2, "url": "https://jvndb.jvn.jp/en/contents/2019/jvndb-2019-000046.html" }, { "trust": 1.2, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10207" }, { "trust": 0.6, "url": "https://usn.ubuntu.com/4116-1/" }, { "trust": 0.6, "url": "https://usn.ubuntu.com/4114-1/" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/zh/product_security/len-27828" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-27701" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3334/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0766/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0615" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/154326/ubuntu-security-notice-usn-4118-1.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13631" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11487" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15211" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15215" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14284" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14283" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15221" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11599" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15090" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20784" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15220" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19985" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10639" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10638" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15218" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15212" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20856" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10905" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10126" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20976" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20961" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11810" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3819" }, { "trust": 0.2, "url": "https://usn.ubuntu.com/4115-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13648" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15292" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3701" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3900" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15216" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14763" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15214" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15926" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14815" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11478" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2181" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14821" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14835" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11477" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3846" }, { "trust": 0.1, "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12614" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-21008" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11833" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2054" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14814" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1022.25~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1022.25" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-60.67~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1043.43" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1041.43" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-60.67" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1056.61" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1041.43" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1044.47" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1095.106" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1123.132" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18509" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1059.66" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-165.193" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4145-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1127.135" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16862" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14610" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4118-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14616" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13098" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13093" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20169" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14614" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11085" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14611" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13053" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1047.49" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14612" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13099" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20511" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13100" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14617" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1047.49~16.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5383" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15223" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.0.0-31.33" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15538" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4147-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15118" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15217" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15925" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1023.24" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-31.33~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1020.20" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15117" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1019.19" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9506" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1018.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1022.23" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1020.20~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1019.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-62.69" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1023.26" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1842447" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1044.44" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1042.44" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1057.62" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1045.49" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1023.26~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1042.44" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4115-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-62.69~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1048.50" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1048.50~16.04.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" }, { "db": "NVD", "id": "CVE-2019-0136" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "BID", "id": "108777" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "db": "PACKETSTORM", "id": "154951" }, { "db": "PACKETSTORM", "id": "154315" }, { "db": "PACKETSTORM", "id": "154695" }, { "db": "PACKETSTORM", "id": "154326" }, { "db": "PACKETSTORM", "id": "154740" }, { "db": "PACKETSTORM", "id": "154446" }, { "db": "NVD", "id": "CVE-2019-0136" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-04T00:00:00", "db": "CNVD", "id": "CNVD-2019-25748" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108777" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "date": "2019-10-23T18:32:10", "db": "PACKETSTORM", "id": "154951" }, { "date": "2019-09-02T23:48:23", "db": "PACKETSTORM", "id": "154315" }, { "date": "2019-10-01T20:45:14", "db": "PACKETSTORM", "id": "154695" }, { "date": "2019-09-03T16:47:23", "db": "PACKETSTORM", "id": "154326" }, { "date": "2019-10-05T14:13:57", "db": "PACKETSTORM", "id": "154740" }, { "date": "2019-09-11T13:57:38", "db": "PACKETSTORM", "id": "154446" }, { "date": "2019-06-13T16:29:00.763000", "db": "NVD", "id": "CVE-2019-0136" }, { "date": "2019-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-04T00:00:00", "db": "CNVD", "id": "CNVD-2019-25748" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108777" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-000046" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-0136" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-530" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel PROSet/Wireless WiFi Software driver Access Control Error Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-25748" }, { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-530" } ], "trust": 0.6 } }
var-201906-1231
Vulnerability from variot
Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. A buffer overflow vulnerability exists in the system firmware in IntelNUCKit. This vulnerability is caused when the network system or product performs operations on the memory and does not correctly verify the data boundary, resulting in incorrect read and write operations to other associated memory locations. This vulnerability can be exploited to cause buffer overflows or heap overflows. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1231", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kits", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11124" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-555" } ], "trust": 0.6 }, "cve": "CVE-2019-11124", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2019-25504", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142739", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11124", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11124", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-25504", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-555", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142739", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11124", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "NVD", "id": "CVE-2019-11124" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. A buffer overflow vulnerability exists in the system firmware in IntelNUCKit. This vulnerability is caused when the network system or product performs operations on the memory and does not correctly verify the data boundary, resulting in incorrect read and write operations to other associated memory locations. This vulnerability can be exploited to cause buffer overflows or heap overflows. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2019-11124" }, { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11124", "trust": 3.5 }, { "db": "BID", "id": "108766", "trust": 2.7 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-555", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-25504", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142739", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11124", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11124" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "id": "VAR-201906-1231", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" } ], "trust": 1.4243450375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" } ] }, "last_update_date": "2023-12-18T11:34:10.052000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "IntelNUCKit Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/172797" }, { "title": "Intel NUC Kit Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93788" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142739" }, { "db": "NVD", "id": "CVE-2019-11124" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 2.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11124" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-25504" }, { "db": "VULHUB", "id": "VHN-142739" }, { "db": "VULMON", "id": "CVE-2019-11124" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11124" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25504" }, { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142739" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11124" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.387000", "db": "NVD", "id": "CVE-2019-11124" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-02T00:00:00", "db": "CNVD", "id": "CNVD-2019-25504" }, { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142739" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11124" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:14.057000", "db": "NVD", "id": "CVE-2019-11124" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-555" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-555" } ], "trust": 0.6 } }
var-201906-0923
Vulnerability from variot
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0923", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openattestation", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "open cloud integrity tehnology", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0180" } ] }, "cve": "CVE-2019-0180", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-140211", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0180", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-572", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-140211", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "NVD", "id": "CVE-2019-0180" }, { "db": "CNNVD", "id": "CNNVD-201906-572" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access. Intel Open Cloud Integrity Technology (CIT) is a set of solutions from Intel Corporation for establishing a hardware root of trust and building a chain of trust between hardware, operating systems, hypervisors, virtual machines, and Docker containers. A security signature issue vulnerability exists in Intel Open CIT. A local attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2019-0180" }, { "db": "VULHUB", "id": "VHN-140211" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0180", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-572", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140211", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0180" }, { "db": "CNNVD", "id": "CNNVD-201906-572" } ] }, "id": "VAR-201906-0923", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140211" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T11:22:13.142000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "NVD", "id": "CVE-2019-0180" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0180" }, { "db": "CNNVD", "id": "CNNVD-201906-572" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140211" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0180" }, { "db": "CNNVD", "id": "CNNVD-201906-572" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-140211" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.107000", "db": "NVD", "id": "CVE-2019-0180" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-572" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-27T00:00:00", "db": "VULHUB", "id": "VHN-140211" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-02-27T16:37:36.037000", "db": "NVD", "id": "CVE-2019-0180" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-572" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-572" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-572" } ], "trust": 0.6 } }
var-201906-1228
Vulnerability from variot
Improper permissions in the installer for Intel(R) Omni-Path Fabric Manager GUI before version 10.9.2.1.1 may allow an authenticated user to potentially enable escalation of privilege via local attack. Intel Omni-Path Fabric Manager GUI is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges. Versions prior to Intel Omni-Path Fabric Manager GUI prior to 10.9.2.1.1 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1228", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "omni-path fabric manager gui", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "10.9.2.1.1" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.9.2.0.7" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.9.0.0.208" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.9.0.0.206" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.7.0.0.145" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.0.1.0.45" }, { "model": "omni-path fabric manager gui", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "10.0.0.0.691" }, { "model": "omni-path fabric manager gui", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "10.9.2.1.1" } ], "sources": [ { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:omni-path_fabric_manager_gui:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.9.2.1.1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11117" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marius Gabriel Mihai.", "sources": [ { "db": "BID", "id": "108788" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ], "trust": 0.9 }, "cve": "CVE-2019-11117", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142731", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11117", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201906-576", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-142731", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "NVD", "id": "CVE-2019-11117" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permissions in the installer for Intel(R) Omni-Path Fabric Manager GUI before version 10.9.2.1.1 may allow an authenticated user to potentially enable escalation of privilege via local attack. Intel Omni-Path Fabric Manager GUI is prone to a local privilege-escalation vulnerability. \nA local attacker can exploit this issue to gain elevated privileges. \nVersions prior to Intel Omni-Path Fabric Manager GUI prior to 10.9.2.1.1 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2019-11117" }, { "db": "BID", "id": "108788" }, { "db": "VULHUB", "id": "VHN-142731" } ], "trust": 1.26 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11117", "trust": 2.8 }, { "db": "BID", "id": "108788", "trust": 2.0 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-576", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-18596", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-142731", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11117" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "id": "VAR-201906-1228", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142731" } ], "trust": 0.35292397 }, "last_update_date": "2023-12-18T10:51:34.942000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel Omni-Path Fabric Manager GUI Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93798" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-275", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "NVD", "id": "CVE-2019-11117" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/108788" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11117" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142731" }, { "db": "BID", "id": "108788" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11117" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142731" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108788" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.293000", "db": "NVD", "id": "CVE-2019-11117" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-02T00:00:00", "db": "VULHUB", "id": "VHN-142731" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108788" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2023-03-02T16:10:15.220000", "db": "NVD", "id": "CVE-2019-11117" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-576" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108788" }, { "db": "CNNVD", "id": "CNNVD-201906-576" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-576" } ], "trust": 0.6 } }
var-201906-0913
Vulnerability from variot
Insufficient input validation in the Intel(R) SGX driver for Linux may allow an authenticated user to potentially enable a denial of service via local access. Intel SGX Driver for Linux is prone to a local denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition. The following products are affected: Intel SGX Linux client driver prior to 2.5 Intel SGX DCAP Linux driver prior to 1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0913", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "software guard extensions", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "2.5" }, { "model": "software guard extensions data center attestation primitives", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "1.1" }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "software guard extensions linux", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "2.4" }, { "model": "software guard extensions dcap linux", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "1.0" }, { "model": "software guard extensions linux", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "2.5" }, { "model": "software guard extensions dcap linux", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "1.1" } ], "sources": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0157" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:intel:software_guard_extensions:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:intel:software_guard_extensions_data_center_attestation_primitives:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0157" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "108771" } ], "trust": 0.3 }, "cve": "CVE-2019-0157", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0157", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-565", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0157" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in the Intel(R) SGX driver for Linux may allow an authenticated user to potentially enable a denial of service via local access. Intel SGX Driver for Linux is prone to a local denial-of-service vulnerability. \nAttackers can exploit this issue to cause a denial-of-service condition. \nThe following products are affected:\nIntel SGX Linux client driver prior to 2.5\nIntel SGX DCAP Linux driver prior to 1.1", "sources": [ { "db": "NVD", "id": "CVE-2019-0157" }, { "db": "BID", "id": "108771" } ], "trust": 1.17 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0157", "trust": 2.7 }, { "db": "BID", "id": "108771", "trust": 1.9 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-565", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0157" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "id": "VAR-201906-0913", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25292397 }, "last_update_date": "2023-12-18T11:25:13.062000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel SGX Driver input verification error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93796" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0157" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/108771" }, { "trust": 1.6, "url": "https://support.f5.com/csp/article/k10244523" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 1.0, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.9, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html?wapkw=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" } ], "sources": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0157" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "108771" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-0157" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108771" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:00.810000", "db": "NVD", "id": "CVE-2019-0157" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108771" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:10.883000", "db": "NVD", "id": "CVE-2019-0157" }, { "date": "2019-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-565" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108771" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "108771" }, { "db": "CNNVD", "id": "CNNVD-201906-565" } ], "trust": 0.9 } }
var-201906-1232
Vulnerability from variot
Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1232", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11125" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-550" } ], "trust": 0.6 }, "cve": "CVE-2019-11125", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142740", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11125", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11125", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-550", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142740", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11125", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "NVD", "id": "CVE-2019-11125" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11125", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-550", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142740", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11125", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11125" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "id": "VAR-201906-1232", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142740" } ], "trust": 0.8385371857142857 }, "last_update_date": "2023-12-18T10:50:14.152000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93783" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "NVD", "id": "CVE-2019-11125" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11125" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142740" }, { "db": "VULMON", "id": "CVE-2019-11125" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11125" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142740" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11125" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.420000", "db": "NVD", "id": "CVE-2019-11125" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142740" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11125" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:14.227000", "db": "NVD", "id": "CVE-2019-11125" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-550" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-550" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-550" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Protecci\u00f3n de contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para abrir la CIT puede permitir un usuario identificado para habilitar potencialmente la revelaci\u00f3n mediante el acceso local." } ], "id": "CVE-2019-0181", "lastModified": "2024-11-21T04:16:25.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:01.137", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Protecci\u00f3n de contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para abrir CIT puede permitir a un usuario identificado para habilitar potencialmente la revelaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local" } ], "id": "CVE-2019-0178", "lastModified": "2024-11-21T04:16:25.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:01.013", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "La protecci\u00f3n de contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para Open CIT puede permitir a un usuario autenticado habilitar potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio del acceso local." } ], "id": "CVE-2019-11092", "lastModified": "2024-11-21T04:20:31.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:01.263", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Protecci\u00f3n de contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para abrir CIT puede permitir a un usuario identificado para habilitar potencialmente la revelaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local" } ], "id": "CVE-2019-0175", "lastModified": "2024-11-21T04:16:24.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:00.937", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Protecci\u00f3n de contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para abrir CIT puede permitir a un usuario identificado para habilitar potencialmente la revelaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local" } ], "id": "CVE-2019-0179", "lastModified": "2024-11-21T04:16:25.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:01.060", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Protecci\u00f3n de contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para abrir CIT puede permitir a un usuario identificado para habilitar potencialmente la revelaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local" } ], "id": "CVE-2019-0177", "lastModified": "2024-11-21T04:16:24.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:00.983", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Protecci\u00f3n de la contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para abrir CIT puede permitir un usuario identificado para habilitar potencialmente la revelaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local" } ], "id": "CVE-2019-0180", "lastModified": "2024-11-21T04:16:25.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:01.107", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Insuficiente protecci\u00f3n de contrase\u00f1a en la base de datos de atestaci\u00f3n para abrir CIT puede permitir un usuario identificado para habilitar potencialmente la revelaci\u00f3n de informaci\u00f3n mediante el acceso local" } ], "id": "CVE-2019-0182", "lastModified": "2024-11-21T04:16:25.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:01.187", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | open_cloud_integrity_tehnology | - | |
intel | openattestation | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*", "matchCriteriaId": "2286603F-73B7-4D14-AEF5-6994CC3D9772", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*", "matchCriteriaId": "350B549B-6825-43AE-9754-65F04045E0DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Protecci\u00f3n de contrase\u00f1a insuficiente en la base de datos de atestaci\u00f3n para abrir CIT puede permitir a un usuario identificado para habilitar potencialmente revelar informaci\u00f3n mediante el acceso local ." } ], "id": "CVE-2019-0183", "lastModified": "2024-11-21T04:16:25.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-13T16:29:01.233", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-0183
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:40:17", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0183", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0183", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11092
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:16.238Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-14T19:59:32", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11092", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:40:16.238Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0177
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/in | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.809Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:25:13", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/in", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0177", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0180
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:24:02", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0180", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0180", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0179
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:19:51", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0179", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0179", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0178
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:24:34", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0178", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0181
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:29:13", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0181", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0181", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0182
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.735Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:30:34", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0182", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.735Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0175
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Open Cloud Integrity Technology and OpenAttestation |
Version: All versions of Open CIT and OpenAttestation. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.749Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Open Cloud Integrity Technology and OpenAttestation", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of Open CIT and OpenAttestation." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-24T15:28:26", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0175", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Open Cloud Integrity Technology and OpenAttestation", "version": { "version_data": [ { "version_value": "All versions of Open CIT and OpenAttestation." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0175", "datePublished": "2019-06-13T15:36:25", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }