Search criteria

78 vulnerabilities found for thunderbolt_dch_driver by intel

FKIE_CVE-2023-27308

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:52
Summary
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Las restricciones inadecuadas del b\u00fafer en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 pueden permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-27308",
  "lastModified": "2024-11-21T07:52:37.180",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 2.7,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:47.120",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-92"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-27307

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:52
Summary
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Las restricciones inadecuadas del b\u00fafer en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 pueden permitir que un usuario autenticado potencialmente habilite la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-27307",
  "lastModified": "2024-11-21T07:52:37.050",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:46.887",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-92"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-27301

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:52
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-27301",
  "lastModified": "2024-11-21T07:52:36.463",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.1,
        "impactScore": 2.7,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.1,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:46.227",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-27303

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:52
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado potencialmente habilite la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-27303",
  "lastModified": "2024-11-21T07:52:36.580",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:46.663",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-26592

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:51
Summary
Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access."
    },
    {
      "lang": "es",
      "value": "La deserializaci\u00f3n de datos que no son de confianza en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente una denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-26592",
  "lastModified": "2024-11-21T07:51:49.167",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:45.140",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-26596

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:51
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-26596",
  "lastModified": "2024-11-21T07:51:49.530",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 2.5,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 2.5,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:45.380",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-27300

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:52
Summary
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Las restricciones inadecuadas del b\u00fafer en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 pueden permitir que un usuario autenticado potencialmente habilite la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-27300",
  "lastModified": "2024-11-21T07:52:36.353",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:45.740",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-92"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-26591

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:51
Summary
Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access."
    },
    {
      "lang": "es",
      "value": "El valor de retorno no verificado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio mediante acceso f\u00edsico."
    }
  ],
  "id": "CVE-2023-26591",
  "lastModified": "2024-11-21T07:51:49.050",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "LOW",
          "baseScore": 2.0,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "LOW",
          "baseScore": 2.0,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:44.893",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-252"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-252"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-26585

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:51
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-26585",
  "lastModified": "2024-11-21T07:51:48.260",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 3.6,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:44.230",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-25779

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:50
Summary
Uncontrolled search path element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncontrolled search path element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "El elemento de ruta de b\u00fasqueda no controlado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-25779",
  "lastModified": "2024-11-21T07:50:11.240",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:43.500",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-25777

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:50
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-25777",
  "lastModified": "2024-11-21T07:50:11.117",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.9,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 5.3,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.9,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 5.3,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:43.270",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-25769

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:50
Summary
Uncontrolled resource consumption in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncontrolled resource consumption in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "El consumo descontrolado de recursos en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-25769",
  "lastModified": "2024-11-21T07:50:09.847",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:42.970",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-24589

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:48
Summary
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Las restricciones inadecuadas del b\u00fafer en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 pueden permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local. "
    }
  ],
  "id": "CVE-2023-24589",
  "lastModified": "2024-11-21T07:48:11.503",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 4.7,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 4.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:40.717",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-92"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-24481

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:47
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-24481",
  "lastModified": "2024-11-21T07:47:56.813",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 3.7,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 3.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:40.327",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-24463

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:47
Summary
Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable information disclosure via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario no autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s de un acceso adyacente. "
    }
  ],
  "id": "CVE-2023-24463",
  "lastModified": "2024-11-21T07:47:54.737",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:40.127",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-24542

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2025-05-12 15:15
Summary
Unquoted search path or element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unquoted search path or element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La ruta o elemento de b\u00fasqueda sin comillas en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-24542",
  "lastModified": "2025-05-12T15:15:56.367",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:40.513",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-428"
        }
      ],
      "source": "secure@intel.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-428"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-428"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-22390

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:44
Summary
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Las restricciones inadecuadas del b\u00fafer en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 pueden permitir que un usuario autenticado potencialmente habilite la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-22390",
  "lastModified": "2024-11-21T07:44:42.980",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:39.433",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-92"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-22342

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2025-05-12 15:15
Summary
Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-22342",
  "lastModified": "2025-05-12T15:15:56.163",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.1,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.1,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:39.063",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-22848

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:45
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en algunos controladores Intel(R) Thunderbolt(TM) DCH para Windows anteriores a la versi\u00f3n 88 puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-22848",
  "lastModified": "2024-11-21T07:45:31.037",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:39.757",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-22293

Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2024-11-21 07:44
Summary
Improper access control in the Intel(R) Thunderbolt(TM) DCH drivers for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel thunderbolt_dch_driver *
intel core_i3-6006u -
intel core_i3-6098p -
intel core_i3-6100 -
intel core_i3-6100e -
intel core_i3-6100h -
intel core_i3-6100t -
intel core_i3-6100te -
intel core_i3-6100u -
intel core_i3-6102e -
intel core_i3-6157u -
intel core_i3-6167u -
intel core_i3-6300 -
intel core_i3-6300t -
intel core_i3-6320 -
intel core_i3-7020u -
intel core_i3-7100 -
intel core_i3-7100e -
intel core_i3-7100h -
intel core_i3-7100t -
intel core_i3-7100u -
intel core_i3-7101e -
intel core_i3-7101te -
intel core_i3-7102e -
intel core_i3-7130u -
intel core_i3-7167u -
intel core_i3-7300 -
intel core_i3-7300t -
intel core_i3-7320 -
intel core_i3-7350k -
intel core_i3-8100 -
intel core_i3-8100b -
intel core_i3-8100h -
intel core_i3-8100t -
intel core_i3-8109u -
intel core_i3-8130u -
intel core_i3-8140u -
intel core_i3-8145u -
intel core_i3-8145ue -
intel core_i3-8300 -
intel core_i3-8300t -
intel core_i3-8350k -
intel core_i3-9100 -
intel core_i3-9100e -
intel core_i3-9100f -
intel core_i3-9100hl -
intel core_i3-9100t -
intel core_i3-9100te -
intel core_i3-9300 -
intel core_i3-9300t -
intel core_i3-9320 -
intel core_i3-9350k -
intel core_i3-9350kf -
intel core_i5-6200u -
intel core_i5-6260u -
intel core_i5-6267u -
intel core_i5-6287u -
intel core_i5-6300hq -
intel core_i5-6300u -
intel core_i5-6350hq -
intel core_i5-6360u -
intel core_i5-6400 -
intel core_i5-6400t -
intel core_i5-6402p -
intel core_i5-6440eq -
intel core_i5-6440hq -
intel core_i5-6442eq -
intel core_i5-6500 -
intel core_i5-6500t -
intel core_i5-6500te -
intel core_i5-6585r -
intel core_i5-6600 -
intel core_i5-6600k -
intel core_i5-6600t -
intel core_i5-6685r -
intel core_i5-7200u -
intel core_i5-7260u -
intel core_i5-7267u -
intel core_i5-7287u -
intel core_i5-7300hq -
intel core_i5-7300u -
intel core_i5-7360u -
intel core_i5-7400 -
intel core_i5-7400t -
intel core_i5-7440eq -
intel core_i5-7440hq -
intel core_i5-7442eq -
intel core_i5-7500 -
intel core_i5-7500t -
intel core_i5-7600 -
intel core_i5-7600k -
intel core_i5-7600t -
intel core_i5-7y54 -
intel core_i5-7y57 -
intel core_i5-8200y -
intel core_i5-8210y -
intel core_i5-8250u -
intel core_i5-8257u -
intel core_i5-8259u -
intel core_i5-8260u -
intel core_i5-8265u -
intel core_i5-8269u -
intel core_i5-8279u -
intel core_i5-8300h -
intel core_i5-8305g -
intel core_i5-8310y -
intel core_i5-8350u -
intel core_i5-8365u -
intel core_i5-8365ue -
intel core_i5-8400 -
intel core_i5-8400b -
intel core_i5-8400h -
intel core_i5-8400t -
intel core_i5-8500 -
intel core_i5-8500b -
intel core_i5-8500t -
intel core_i5-8600 -
intel core_i5-8600k -
intel core_i5-8600t -
intel core_i5-9300h -
intel core_i5-9300hf -
intel core_i5-9400 -
intel core_i5-9400f -
intel core_i5-9400h -
intel core_i5-9400t -
intel core_i5-9500 -
intel core_i5-9500e -
intel core_i5-9500f -
intel core_i5-9500t -
intel core_i5-9500te -
intel core_i5-9600 -
intel core_i5-9600k -
intel core_i5-9600kf -
intel core_i5-9600t -
intel core_i7\+8700 -
intel core_i7-6500u -
intel core_i7-6560u -
intel core_i7-6567u -
intel core_i7-6600u -
intel core_i7-6650u -
intel core_i7-6660u -
intel core_i7-6700 -
intel core_i7-6700hq -
intel core_i7-6700k -
intel core_i7-6700t -
intel core_i7-6700te -
intel core_i7-6770hq -
intel core_i7-6785r -
intel core_i7-6820eq -
intel core_i7-6820hk -
intel core_i7-6820hq -
intel core_i7-6822eq -
intel core_i7-6870hq -
intel core_i7-6920hq -
intel core_i7-6970hq -
intel core_i7-7500u -
intel core_i7-7560u -
intel core_i7-7567u -
intel core_i7-7600u -
intel core_i7-7660u -
intel core_i7-7700 -
intel core_i7-7700hq -
intel core_i7-7700k -
intel core_i7-7700t -
intel core_i7-7820eq -
intel core_i7-7820hk -
intel core_i7-7820hq -
intel core_i7-7920hq -
intel core_i7-7y75 -
intel core_i7-8086k -
intel core_i7-8500y -
intel core_i7-8550u -
intel core_i7-8557u -
intel core_i7-8559u -
intel core_i7-8565u -
intel core_i7-8569u -
intel core_i7-8650u -
intel core_i7-8665u -
intel core_i7-8665ue -
intel core_i7-8700 -
intel core_i7-8700b -
intel core_i7-8700k -
intel core_i7-8700t -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel core_i7-8750h -
intel core_i7-8809g -
intel core_i7-8850h -
intel core_i7-9700 -
intel core_i7-9700e -
intel core_i7-9700f -
intel core_i7-9700k -
intel core_i7-9700kf -
intel core_i7-9700t -
intel core_i7-9700te -
intel core_i7-9750h -
intel core_i7-9750hf -
intel core_i7-9850h -
intel core_i7-9850he -
intel core_i7-9850hl -
intel core_i9-8950hk -
intel core_i9-9880h -
intel core_i9-9900 -
intel core_i9-9900k -
intel core_i9-9900kf -
intel core_i9-9900ks -
intel core_i9-9900t -
intel core_i9-9980hk -
intel core_m3-6y30 -
intel core_m3-7y30 -
intel core_m3-7y32 -
intel core_m3-8100y -
intel core_m5-6y54 -
intel core_m5-6y57 -
intel core_m7-6y75 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183",
              "versionEndExcluding": "88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47568A4-117D-4E76-88DA-F8A4139A83D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F3324D-6E58-4233-A0C4-4F2C058E8D43",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6E16A4-5B81-412F-9B02-D15288F0EB52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8448F47A-F956-4228-9A13-24AE86C532CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C4115F-E374-47E9-A81F-CC06FA72C67F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE81958E-5DFA-424C-9662-ECB1D9B738D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE0F2403-8146-4CA0-9E89-04022B375CEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD67C284-EFCE-4530-8E68-42BB1B6F15C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C38AF3E-4547-4CA3-9078-6CBD372331AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B1E424-885F-4BB0-9257-8284A18B1655",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BADEBE08-1478-4B88-9E06-5164BA0517DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D672383-B9AD-466E-8D6C-68DEC432B9A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D16BDFF3-4CC0-4423-8385-C5E49C941F49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5523F4AF-8CCF-41B1-ADC8-D8363CE0A9D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53F1B439-37B2-4425-8359-D3C86CD76BBE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A121388-F0FF-420E-98E2-B6F4B53FF88F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83D5E36-BCA6-47A6-9C78-5A5FAD89F95F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F611716-F3D6-4187-AE71-4FF87C95C18E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F67974-81B3-43C2-8DAE-A66C6A876B7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1054FBFC-1609-4301-A0D0-B78878FB2427",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7F9109E-EADD-40F4-8360-BF7E37433E2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F7C959-BC66-40AB-8038-D37181A4CE5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B9B3858-E58D-471E-8F12-DC109A133B81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D37104E-78E5-4368-B67F-1F8C63873C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F01770-A6AD-4F7B-8FD6-C066241A139B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30DFA368-60E2-42D7-9C59-04F61F1A1FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0974E563-6326-4E79-95FF-40625440696E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E904FB93-EFF6-4E8E-92F2-95C4952B0240",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B232290-B3AD-4BB5-80B8-4CB3E6259A44",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2607AB1-D851-4D83-9198-5B9A148E9B5F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772568B9-C502-4154-9320-16D78BF60B34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "912614A7-45BA-411D-AE77-610EFE8D2A35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FBD651A-306D-4341-8DEE-2E928CA6E0EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61D61E39-79F5-4606-B196-D79A9C2C738C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8CE3D72-A3E6-4E8C-8673-D9265D66A449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A72E6F1-5A3C-4D8E-8F5F-0D92BC1CD8CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24A5BA20-2193-4C17-BBDC-8615D9333D96",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55240EF3-B56C-45DF-B868-6DF59A349E23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A0BDFFB-638F-4FB7-A43A-812874D8774A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD7CD68D-6177-4F61-ABAF-C88453BD6C52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "419680D5-21E0-491C-98AA-9D079213A020",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3625E5-4583-4F38-B6E3-68FD20E54ACB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C365D42-1DEA-4FF2-86E4-1CC27E52E40E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "831048A2-657F-4F2C-83AC-802DF45204A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC6872D8-0625-4404-866D-6592319E513C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0504478A-E635-4A8B-A3F2-BE0E5908A7AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFFF65E-6576-41A5-82E0-F2EECDC64743",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E29F8E70-5429-4756-A574-C7B60BE74A86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in the Intel(R) Thunderbolt(TM) DCH drivers for Windows may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en los controladores Intel(R) Thunderbolt(TM) DCH para Windows puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-22293",
  "lastModified": "2024-11-21T07:44:28.207",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:38.193",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-26591 (GCVE-0-2023-26591)

Vulnerability from cvelistv5 – Published: 2024-02-14 13:37 – Updated: 2024-08-07 18:33
VLAI?
Summary
Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access.
CWE
  • denial of service
  • CWE-252 - Unchecked return value
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:54.241Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26591",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T18:19:10.735700Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:33:16.843Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "LOW",
            "baseScore": 2,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-252",
              "description": "Unchecked return value",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:49.450Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26591",
    "datePublished": "2024-02-14T13:37:49.450Z",
    "dateReserved": "2023-03-01T18:23:25.238Z",
    "dateUpdated": "2024-08-07T18:33:16.843Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-26596 (GCVE-0-2023-26596)

Vulnerability from cvelistv5 – Published: 2024-02-14 13:37 – Updated: 2024-08-15 19:12
VLAI?
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access.
CWE
  • denial of service
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:53.875Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26596",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-15T19:11:50.609567Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T19:12:01.342Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:48.889Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26596",
    "datePublished": "2024-02-14T13:37:48.889Z",
    "dateReserved": "2023-03-01T18:23:25.224Z",
    "dateUpdated": "2024-08-15T19:12:01.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-27303 (GCVE-0-2023-27303)

Vulnerability from cvelistv5 – Published: 2024-02-14 13:37 – Updated: 2024-08-14 19:14
VLAI?
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
CWE
  • information disclosure
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:09:43.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-27303",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T19:14:13.101399Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T19:14:22.968Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:48.307Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-27303",
    "datePublished": "2024-02-14T13:37:48.307Z",
    "dateReserved": "2023-03-01T18:23:25.252Z",
    "dateUpdated": "2024-08-14T19:14:22.968Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-27300 (GCVE-0-2023-27300)

Vulnerability from cvelistv5 – Published: 2024-02-14 13:37 – Updated: 2024-08-08 13:43
VLAI?
Summary
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
CWE
  • information disclosure
  • CWE-92 - Improper buffer restrictions
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:09:42.398Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-27300",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T13:42:55.579265Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-08T13:43:16.354Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-92",
              "description": "Improper buffer restrictions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:47.252Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-27300",
    "datePublished": "2024-02-14T13:37:47.252Z",
    "dateReserved": "2023-03-01T04:00:04.883Z",
    "dateUpdated": "2024-08-08T13:43:16.354Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-26592 (GCVE-0-2023-26592)

Vulnerability from cvelistv5 – Published: 2024-02-14 13:37 – Updated: 2024-08-08 13:39
VLAI?
Summary
Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access.
CWE
  • denial of service
  • CWE-502 - Deserialization of untrusted data
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:53.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26592",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T13:39:17.882642Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-08T13:39:31.707Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-502",
              "description": "Deserialization of untrusted data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:47.762Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26592",
    "datePublished": "2024-02-14T13:37:47.762Z",
    "dateReserved": "2023-03-01T18:23:25.233Z",
    "dateUpdated": "2024-08-08T13:39:31.707Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-26591 (GCVE-0-2023-26591)

Vulnerability from nvd – Published: 2024-02-14 13:37 – Updated: 2024-08-07 18:33
VLAI?
Summary
Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access.
CWE
  • denial of service
  • CWE-252 - Unchecked return value
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:54.241Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26591",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T18:19:10.735700Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:33:16.843Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "LOW",
            "baseScore": 2,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-252",
              "description": "Unchecked return value",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:49.450Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26591",
    "datePublished": "2024-02-14T13:37:49.450Z",
    "dateReserved": "2023-03-01T18:23:25.238Z",
    "dateUpdated": "2024-08-07T18:33:16.843Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-26596 (GCVE-0-2023-26596)

Vulnerability from nvd – Published: 2024-02-14 13:37 – Updated: 2024-08-15 19:12
VLAI?
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access.
CWE
  • denial of service
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:53.875Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26596",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-15T19:11:50.609567Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T19:12:01.342Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:48.889Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26596",
    "datePublished": "2024-02-14T13:37:48.889Z",
    "dateReserved": "2023-03-01T18:23:25.224Z",
    "dateUpdated": "2024-08-15T19:12:01.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-27303 (GCVE-0-2023-27303)

Vulnerability from nvd – Published: 2024-02-14 13:37 – Updated: 2024-08-14 19:14
VLAI?
Summary
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
CWE
  • information disclosure
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:09:43.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-27303",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T19:14:13.101399Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T19:14:22.968Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:48.307Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-27303",
    "datePublished": "2024-02-14T13:37:48.307Z",
    "dateReserved": "2023-03-01T18:23:25.252Z",
    "dateUpdated": "2024-08-14T19:14:22.968Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-27300 (GCVE-0-2023-27300)

Vulnerability from nvd – Published: 2024-02-14 13:37 – Updated: 2024-08-08 13:43
VLAI?
Summary
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access.
CWE
  • information disclosure
  • CWE-92 - Improper buffer restrictions
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:09:42.398Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-27300",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T13:42:55.579265Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-08T13:43:16.354Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en"
            },
            {
              "cweId": "CWE-92",
              "description": "Improper buffer restrictions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:47.252Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-27300",
    "datePublished": "2024-02-14T13:37:47.252Z",
    "dateReserved": "2023-03-01T04:00:04.883Z",
    "dateUpdated": "2024-08-08T13:43:16.354Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-26592 (GCVE-0-2023-26592)

Vulnerability from nvd – Published: 2024-02-14 13:37 – Updated: 2024-08-08 13:39
VLAI?
Summary
Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access.
CWE
  • denial of service
  • CWE-502 - Deserialization of untrusted data
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Thunderbolt(TM) DCH drivers for Windows Affected: before version 88
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:53.989Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26592",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T13:39:17.882642Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-08T13:39:31.707Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Thunderbolt(TM) DCH drivers for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 88"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-502",
              "description": "Deserialization of untrusted data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:47.762Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26592",
    "datePublished": "2024-02-14T13:37:47.762Z",
    "dateReserved": "2023-03-01T18:23:25.233Z",
    "dateUpdated": "2024-08-08T13:39:31.707Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}