cve-2019-14610
Vulnerability from cvelistv5
Published
2019-12-16 19:11
Modified
2024-08-05 00:19
Severity ?
Summary
Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:19:41.422Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) NUC(R)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See References"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-16T19:11:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-14610",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) NUC(R)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See References"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-14610",
    "datePublished": "2019-12-16T19:11:14",
    "dateReserved": "2019-08-03T00:00:00",
    "dateUpdated": "2024-08-05T00:19:41.422Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0036\", \"matchCriteriaId\": \"2CBFF7E0-4BC0-4E68-82A5-B278ECEB1122\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"365D716A-73F7-4F20-A4F5-0FE53E08E014\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0036\", \"matchCriteriaId\": \"B4B5CC5A-30B0-4AA7-805E-05F70C39E0B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFC228AB-19E6-4C1E-82D7-113CB02CB9B4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0077\", \"matchCriteriaId\": \"03D6FF33-3832-40A1-8E5F-900D3C32B350\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03975E45-3940-404E-94FA-61C37DD6DA32\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0053\", \"matchCriteriaId\": \"BAF2A976-4171-43C1-8B3E-1985B98F8AD2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D70643B-FE67-40CA-B63F-825E78D7D670\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0043\", \"matchCriteriaId\": \"4D658393-6F10-4883-804B-A2B84625958D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70041B5F-C057-49F8-B949-B5F690680893\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0059\", \"matchCriteriaId\": \"6A654417-AF25-4BCC-8965-ADA5B3B9C060\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57B1FC17-80E8-432B-8757-9522D6433800\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0067\", \"matchCriteriaId\": \"27C41138-573B-43DE-83F6-C760ECF6D6E5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CDBA0B8-C076-43B1-AB5A-509DCDCB2932\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0067\", \"matchCriteriaId\": \"0F987C74-0FF8-48FD-AECC-5F90AB02A968\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28CCB3FE-E248-4765-B630-5AC815D8C1F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0067\", \"matchCriteriaId\": \"18E04AAD-D2D3-4973-8C26-14C2A77084B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AD25295-C0A4-45CD-9EA0-0C4594A08076\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0061\", \"matchCriteriaId\": \"8FF27C3F-0F41-4DAE-8972-52CDB0E0BC57\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9497CA1C-A3CA-4CC4-8192-69DF58630575\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0062\", \"matchCriteriaId\": \"B13F6B0D-1DF1-493D-82F6-F88442807E67\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"123782EB-5B44-492A-86B1-D10C03C89D64\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0066\", \"matchCriteriaId\": \"9D7C10A5-D65B-4AF1-B200-BFC6B5E5BFE0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC196D3E-062A-4301-BAA8-51FAF153F2EB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0072\", \"matchCriteriaId\": \"A6ED9789-5524-40BC-A5B6-9E90AD7CDAC3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EFD543E-DD44-403D-A81F-9F7668F9A473\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0053\", \"matchCriteriaId\": \"99394CE6-5D41-4856-BE47-AAE11D2845BB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64DA446C-B6D3-44AA-A5DE-ADDB6D879010\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0058\", \"matchCriteriaId\": \"43FAC38A-198A-445B-BBEF-7F5C733AD912\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9290D1EF-ADCC-428B-A6B6-DD204A660A32\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0038\", \"matchCriteriaId\": \"17FAF1D5-59AD-478D-A21B-1FDFD35AC9F3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A488AFAB-566C-44EF-B211-38F87EF2164D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0064\", \"matchCriteriaId\": \"B6425331-88CE-42C6-9C8E-9CAFB16A25E4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8285608B-66BB-47F7-AD2F-F9FC6ECB2FE0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0024\", \"matchCriteriaId\": \"DFF6A0FB-8392-4A7B-93DE-CD6398016C8B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A0221B0-3D61-45A2-AF5D-9D4E947C1E16\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0054\", \"matchCriteriaId\": \"42BCF873-1788-4670-A29F-72A464C77228\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09E95BD4-13B0-4687-89F2-0CFA0366E9FD\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.\"}, {\"lang\": \"es\", \"value\": \"Un control de acceso inapropiado en el firmware para Intel(R) NUC(R) puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local.\"}]",
      "id": "CVE-2019-14610",
      "lastModified": "2024-11-21T04:27:02.127",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-12-16T20:15:15.337",
      "references": "[{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "secure@intel.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-14610\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-12-16T20:15:15.337\",\"lastModified\":\"2024-11-21T04:27:02.127\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Un control de acceso inapropiado en el firmware para Intel(R) NUC(R) puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0036\",\"matchCriteriaId\":\"2CBFF7E0-4BC0-4E68-82A5-B278ECEB1122\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"365D716A-73F7-4F20-A4F5-0FE53E08E014\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0036\",\"matchCriteriaId\":\"B4B5CC5A-30B0-4AA7-805E-05F70C39E0B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC228AB-19E6-4C1E-82D7-113CB02CB9B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0077\",\"matchCriteriaId\":\"03D6FF33-3832-40A1-8E5F-900D3C32B350\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03975E45-3940-404E-94FA-61C37DD6DA32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0053\",\"matchCriteriaId\":\"BAF2A976-4171-43C1-8B3E-1985B98F8AD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D70643B-FE67-40CA-B63F-825E78D7D670\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0043\",\"matchCriteriaId\":\"4D658393-6F10-4883-804B-A2B84625958D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70041B5F-C057-49F8-B949-B5F690680893\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0059\",\"matchCriteriaId\":\"6A654417-AF25-4BCC-8965-ADA5B3B9C060\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B1FC17-80E8-432B-8757-9522D6433800\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0067\",\"matchCriteriaId\":\"27C41138-573B-43DE-83F6-C760ECF6D6E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CDBA0B8-C076-43B1-AB5A-509DCDCB2932\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0067\",\"matchCriteriaId\":\"0F987C74-0FF8-48FD-AECC-5F90AB02A968\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CCB3FE-E248-4765-B630-5AC815D8C1F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0067\",\"matchCriteriaId\":\"18E04AAD-D2D3-4973-8C26-14C2A77084B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD25295-C0A4-45CD-9EA0-0C4594A08076\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0061\",\"matchCriteriaId\":\"8FF27C3F-0F41-4DAE-8972-52CDB0E0BC57\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9497CA1C-A3CA-4CC4-8192-69DF58630575\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0062\",\"matchCriteriaId\":\"B13F6B0D-1DF1-493D-82F6-F88442807E67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123782EB-5B44-492A-86B1-D10C03C89D64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0066\",\"matchCriteriaId\":\"9D7C10A5-D65B-4AF1-B200-BFC6B5E5BFE0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC196D3E-062A-4301-BAA8-51FAF153F2EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0072\",\"matchCriteriaId\":\"A6ED9789-5524-40BC-A5B6-9E90AD7CDAC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EFD543E-DD44-403D-A81F-9F7668F9A473\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0053\",\"matchCriteriaId\":\"99394CE6-5D41-4856-BE47-AAE11D2845BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64DA446C-B6D3-44AA-A5DE-ADDB6D879010\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0058\",\"matchCriteriaId\":\"43FAC38A-198A-445B-BBEF-7F5C733AD912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9290D1EF-ADCC-428B-A6B6-DD204A660A32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0038\",\"matchCriteriaId\":\"17FAF1D5-59AD-478D-A21B-1FDFD35AC9F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A488AFAB-566C-44EF-B211-38F87EF2164D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0064\",\"matchCriteriaId\":\"B6425331-88CE-42C6-9C8E-9CAFB16A25E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8285608B-66BB-47F7-AD2F-F9FC6ECB2FE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0024\",\"matchCriteriaId\":\"DFF6A0FB-8392-4A7B-93DE-CD6398016C8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A0221B0-3D61-45A2-AF5D-9D4E947C1E16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0054\",\"matchCriteriaId\":\"42BCF873-1788-4670-A29F-72A464C77228\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E95BD4-13B0-4687-89F2-0CFA0366E9FD\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.