cve-2018-3682
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Server Boards, Compute Modules and Systems |
Version: BMC Equipped |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Server Boards, Compute Modules and Systems", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "BMC Equipped" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\\writes to the SMBUS." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-10T20:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2018-3682", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Server Boards, Compute Modules and Systems", "version": { "version_data": [ { "version_value": "BMC Equipped" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\\writes to the SMBUS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3682", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:bmc_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46F5C6D3-58EB-4243-BEBD-93912CAA7DC6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B49A0E57-126A-4C60-A748-5D357E7B4670\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34BB3CD5-DF01-40A8-9906-5C5B306C1B85\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B3CC4D7-1756-44DB-814D-57106E6826C6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7819ABC6-800C-4141-A31F-14CBE788EF62\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"106C758A-F23A-48B3-8360-A10212AF50E3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bbs7200ap:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D299D95-DA1B-4EB0-B424-367223B1728C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bbs7200apl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD07AA71-7FDA-4FF9-AFE9-E5F4797FAC63\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:dbs2600cw2r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41FC06AE-A60D-4A9D-9EC9-5E0B55098CFC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:dbs2600cw2sr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAEE9115-02E3-451B-B102-32DD51CB890B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:dbs2600cwtr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90B4B99C-FCA8-496A-9673-F665C909D578\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:dbs2600cwtsr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CB91448-FA68-4D4F-9432-F38ACD8C6591\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F002684-C456-40F0-AA2A-97C79AE5EECA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"796E437A-B972-4D30-B0A4-53366693C7DF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9CC284-540E-492A-A0E6-A193DEAD3102\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24786B0E-36AC-4DBD-8778-DC836CF81CB1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9EADDC0-0AAE-4445-9764-1C54E3898FFD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E09B1290-FAD0-4869-A1FA-A4D12BB602CD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4561DCAF-5A12-4A35-93A0-8F097D22F275\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2A50B12-5F1A-4F42-807A-EE73668C9690\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12F99059-4FE6-49AB-AA9D-4890C2D747FC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD725F8F-76BC-4A20-A02D-0A68B67CA401\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"635E397E-BB32-4C2F-A19F-7C1219A726D3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6507AB9B-5925-4F6C-9641-9806A226B3CC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F01C4D33-AED6-427D-8631-E4763410C93F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B69B157-19C4-4CF4-8762-97030DD01A15\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE3E826A-6B5B-4445-9D09-0D3C65276259\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F95ADEA-F861-45B2-AE47-390C311FC97F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"254CB73B-6A91-408F-A3C9-D3259BC2EF9F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BCA0A87-6776-4711-8692-03C0DFD01779\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1DD69C7-9E7C-4569-9971-A06F77028BB7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r1208wt2gsr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3F0A597-424D-47D0-BEA5-C92952331B65\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r1208wttgsr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABA90242-9E50-4B94-ACCC-9DAC55170A90\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DEF6206-E94C-4C16-8D91-AD776D62F79F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A47AC30-315C-4E4B-BBBB-305FA5131281\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r1304wt2gsr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ADAC3B8-CBDC-4AF5-9C16-D90E6E4D1D5B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r1304wttgsr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FD433E7-99ED-4354-BC25-577F65A387D2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF575955-C7E1-4DD6-8AAE-5930EDFEDA93\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B83196F-06BD-41D6-A6B8-C7ABD25CA238\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30E49457-D38D-4145-81F2-7FA4D463CD24\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2208wt2ysr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DF49DB1-997F-4FF3-989F-7CCC3D328C33\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2208wttyc1r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3087F420-9904-4FA8-9D29-433A3F7838B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2208wttysr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C15931E-37B8-420E-8252-2311329DD187\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13C6540A-C5E4-46E5-BB7C-E4C53904AE68\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D952C1D5-581F-4ADC-8DB5-3682DC8588CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2224wttysr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B3FEDE2-915F-4691-B3A5-14EE27D95167\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31EF6A93-7FDE-43A7-BB5D-1DD52318F60D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2308wttysr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"717726C8-2648-4A98-8B9A-5999F68AEC6A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98B6DF59-DF1E-4D9C-B574-37DC398B16AB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6982CB5F-4448-48D4-BD3A-782874AB2304\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B14E3D1D-B614-458D-8F78-E25CC89B311E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:r2312wttysr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CE3087A-A327-46B9-BE16-4C1A57FAEE3F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D9C9254-43DE-4DC9-A246-75C76B4C45B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"540DFDF8-E420-45E9-8E81-BAE9EAE3D1C8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40EE02E9-BE39-425A-82CB-1BD4C5D9B899\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A08E8AD9-CA53-4F39-820E-D4A4D2D319EB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DDFAF1C-E386-4F35-8A81-492713F10A92\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDF6DBFD-8223-4EAC-B6B0-F721C91727A2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C911A0CB-EF89-4295-9761-AAF687E2F8CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A2DBEFE-CFBF-4424-A12B-C3A4C49E594C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600tptr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B737A9A-A013-4AFB-A355-6FF96AACBAA1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CDAD0D9-C4DD-42B5-AC7F-4C53F406B762\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F105271A-9DC1-42CE-9D19-E4A55BE1F04E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12161640-C1D6-49A7-840C-5E3DCC0B5707\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D97AAF4-938D-4B28-BEF1-D5F978AE3B7D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1993088-729D-477E-9210-E49432177C57\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:s7200apr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F73E6B49-70E1-4FC0-9349-9EAFA9B622BA\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\\\\writes to the SMBUS.\"}, {\"lang\": \"es\", \"value\": \"El firmware BMC en las placas para servidores, los m\\u00f3dulos de computaci\\u00f3n y los sistemas Intel podr\\u00edan permitir que un atacante con privilegios administrativos realice lecturas/escrituras no autorizadas al SMBUS.\"}]", "id": "CVE-2018-3682", "lastModified": "2024-11-21T04:05:53.010", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.5, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2018-07-10T21:29:01.107", "references": "[{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2018-3682\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2018-07-10T21:29:01.107\",\"lastModified\":\"2024-11-21T04:05:53.010\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\\\\writes to the SMBUS.\"},{\"lang\":\"es\",\"value\":\"El firmware BMC en las placas para servidores, los m\u00f3dulos de computaci\u00f3n y los sistemas Intel podr\u00edan permitir que un atacante con privilegios administrativos realice lecturas/escrituras no autorizadas al SMBUS.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:bmc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F5C6D3-58EB-4243-BEBD-93912CAA7DC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B49A0E57-126A-4C60-A748-5D357E7B4670\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34BB3CD5-DF01-40A8-9906-5C5B306C1B85\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CC4D7-1756-44DB-814D-57106E6826C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7819ABC6-800C-4141-A31F-14CBE788EF62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"106C758A-F23A-48B3-8360-A10212AF50E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bbs7200ap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D299D95-DA1B-4EB0-B424-367223B1728C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bbs7200apl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD07AA71-7FDA-4FF9-AFE9-E5F4797FAC63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:dbs2600cw2r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FC06AE-A60D-4A9D-9EC9-5E0B55098CFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:dbs2600cw2sr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEE9115-02E3-451B-B102-32DD51CB890B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:dbs2600cwtr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B4B99C-FCA8-496A-9673-F665C909D578\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:dbs2600cwtsr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CB91448-FA68-4D4F-9432-F38ACD8C6591\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F002684-C456-40F0-AA2A-97C79AE5EECA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"796E437A-B972-4D30-B0A4-53366693C7DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CC284-540E-492A-A0E6-A193DEAD3102\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24786B0E-36AC-4DBD-8778-DC836CF81CB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9EADDC0-0AAE-4445-9764-1C54E3898FFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09B1290-FAD0-4869-A1FA-A4D12BB602CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4561DCAF-5A12-4A35-93A0-8F097D22F275\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A50B12-5F1A-4F42-807A-EE73668C9690\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F99059-4FE6-49AB-AA9D-4890C2D747FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD725F8F-76BC-4A20-A02D-0A68B67CA401\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635E397E-BB32-4C2F-A19F-7C1219A726D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6507AB9B-5925-4F6C-9641-9806A226B3CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F01C4D33-AED6-427D-8631-E4763410C93F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B69B157-19C4-4CF4-8762-97030DD01A15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE3E826A-6B5B-4445-9D09-0D3C65276259\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F95ADEA-F861-45B2-AE47-390C311FC97F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"254CB73B-6A91-408F-A3C9-D3259BC2EF9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BCA0A87-6776-4711-8692-03C0DFD01779\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1DD69C7-9E7C-4569-9971-A06F77028BB7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1208wt2gsr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3F0A597-424D-47D0-BEA5-C92952331B65\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1208wttgsr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABA90242-9E50-4B94-ACCC-9DAC55170A90\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DEF6206-E94C-4C16-8D91-AD776D62F79F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A47AC30-315C-4E4B-BBBB-305FA5131281\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304wt2gsr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADAC3B8-CBDC-4AF5-9C16-D90E6E4D1D5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304wttgsr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD433E7-99ED-4354-BC25-577F65A387D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF575955-C7E1-4DD6-8AAE-5930EDFEDA93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B83196F-06BD-41D6-A6B8-C7ABD25CA238\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E49457-D38D-4145-81F2-7FA4D463CD24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2208wt2ysr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF49DB1-997F-4FF3-989F-7CCC3D328C33\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2208wttyc1r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3087F420-9904-4FA8-9D29-433A3F7838B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2208wttysr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C15931E-37B8-420E-8252-2311329DD187\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C6540A-C5E4-46E5-BB7C-E4C53904AE68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D952C1D5-581F-4ADC-8DB5-3682DC8588CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2224wttysr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3FEDE2-915F-4691-B3A5-14EE27D95167\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31EF6A93-7FDE-43A7-BB5D-1DD52318F60D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2308wttysr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717726C8-2648-4A98-8B9A-5999F68AEC6A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98B6DF59-DF1E-4D9C-B574-37DC398B16AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6982CB5F-4448-48D4-BD3A-782874AB2304\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14E3D1D-B614-458D-8F78-E25CC89B311E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r2312wttysr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE3087A-A327-46B9-BE16-4C1A57FAEE3F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9C9254-43DE-4DC9-A246-75C76B4C45B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540DFDF8-E420-45E9-8E81-BAE9EAE3D1C8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40EE02E9-BE39-425A-82CB-1BD4C5D9B899\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A08E8AD9-CA53-4F39-820E-D4A4D2D319EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDFAF1C-E386-4F35-8A81-492713F10A92\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDF6DBFD-8223-4EAC-B6B0-F721C91727A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C911A0CB-EF89-4295-9761-AAF687E2F8CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2DBEFE-CFBF-4424-A12B-C3A4C49E594C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600tptr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B737A9A-A013-4AFB-A355-6FF96AACBAA1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CDAD0D9-C4DD-42B5-AC7F-4C53F406B762\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F105271A-9DC1-42CE-9D19-E4A55BE1F04E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12161640-C1D6-49A7-840C-5E3DCC0B5707\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D97AAF4-938D-4B28-BEF1-D5F978AE3B7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1993088-729D-477E-9210-E49432177C57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s7200apr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73E6B49-70E1-4FC0-9349-9EAFA9B622BA\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.