cve-2019-14611
Vulnerability from cvelistv5
Published
2019-12-16 19:11
Modified
2024-08-05 00:19
Severity ?
EPSS score ?
Summary
Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC(R) |
Version: See References |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:19:41.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUC(R)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See References" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-16T19:11:44", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-14611", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUC(R)", "version": { "version_data": [ { "version_value": "See References" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-14611", "datePublished": "2019-12-16T19:11:44", "dateReserved": "2019-08-03T00:00:00", "dateUpdated": "2024-08-05T00:19:41.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0036\", \"matchCriteriaId\": \"2CBFF7E0-4BC0-4E68-82A5-B278ECEB1122\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"365D716A-73F7-4F20-A4F5-0FE53E08E014\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0036\", \"matchCriteriaId\": \"B4B5CC5A-30B0-4AA7-805E-05F70C39E0B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFC228AB-19E6-4C1E-82D7-113CB02CB9B4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0077\", \"matchCriteriaId\": \"03D6FF33-3832-40A1-8E5F-900D3C32B350\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03975E45-3940-404E-94FA-61C37DD6DA32\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0053\", \"matchCriteriaId\": \"BAF2A976-4171-43C1-8B3E-1985B98F8AD2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D70643B-FE67-40CA-B63F-825E78D7D670\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0043\", \"matchCriteriaId\": \"4D658393-6F10-4883-804B-A2B84625958D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70041B5F-C057-49F8-B949-B5F690680893\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0059\", \"matchCriteriaId\": \"6A654417-AF25-4BCC-8965-ADA5B3B9C060\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57B1FC17-80E8-432B-8757-9522D6433800\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0067\", \"matchCriteriaId\": \"27C41138-573B-43DE-83F6-C760ECF6D6E5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CDBA0B8-C076-43B1-AB5A-509DCDCB2932\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0067\", \"matchCriteriaId\": \"0F987C74-0FF8-48FD-AECC-5F90AB02A968\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28CCB3FE-E248-4765-B630-5AC815D8C1F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0067\", \"matchCriteriaId\": \"18E04AAD-D2D3-4973-8C26-14C2A77084B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AD25295-C0A4-45CD-9EA0-0C4594A08076\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0061\", \"matchCriteriaId\": \"8FF27C3F-0F41-4DAE-8972-52CDB0E0BC57\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9497CA1C-A3CA-4CC4-8192-69DF58630575\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0062\", \"matchCriteriaId\": \"B13F6B0D-1DF1-493D-82F6-F88442807E67\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"123782EB-5B44-492A-86B1-D10C03C89D64\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0066\", \"matchCriteriaId\": \"9D7C10A5-D65B-4AF1-B200-BFC6B5E5BFE0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC196D3E-062A-4301-BAA8-51FAF153F2EB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0072\", \"matchCriteriaId\": \"A6ED9789-5524-40BC-A5B6-9E90AD7CDAC3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EFD543E-DD44-403D-A81F-9F7668F9A473\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0053\", \"matchCriteriaId\": \"99394CE6-5D41-4856-BE47-AAE11D2845BB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64DA446C-B6D3-44AA-A5DE-ADDB6D879010\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0058\", \"matchCriteriaId\": \"43FAC38A-198A-445B-BBEF-7F5C733AD912\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9290D1EF-ADCC-428B-A6B6-DD204A660A32\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0038\", \"matchCriteriaId\": \"17FAF1D5-59AD-478D-A21B-1FDFD35AC9F3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A488AFAB-566C-44EF-B211-38F87EF2164D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0064\", \"matchCriteriaId\": \"B6425331-88CE-42C6-9C8E-9CAFB16A25E4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8285608B-66BB-47F7-AD2F-F9FC6ECB2FE0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0024\", \"matchCriteriaId\": \"DFF6A0FB-8392-4A7B-93DE-CD6398016C8B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A0221B0-3D61-45A2-AF5D-9D4E947C1E16\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0054\", \"matchCriteriaId\": \"42BCF873-1788-4670-A29F-72A464C77228\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09E95BD4-13B0-4687-89F2-0CFA0366E9FD\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento de enteros en el firmware para Intel(R) NUC(R), puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local.\"}]", "id": "CVE-2019-14611", "lastModified": "2024-11-21T04:27:02.317", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2019-12-16T20:15:15.413", "references": "[{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]", "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-14611\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-12-16T20:15:15.413\",\"lastModified\":\"2024-11-21T04:27:02.317\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en el firmware para Intel(R) NUC(R), puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0036\",\"matchCriteriaId\":\"2CBFF7E0-4BC0-4E68-82A5-B278ECEB1122\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"365D716A-73F7-4F20-A4F5-0FE53E08E014\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0036\",\"matchCriteriaId\":\"B4B5CC5A-30B0-4AA7-805E-05F70C39E0B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC228AB-19E6-4C1E-82D7-113CB02CB9B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0077\",\"matchCriteriaId\":\"03D6FF33-3832-40A1-8E5F-900D3C32B350\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03975E45-3940-404E-94FA-61C37DD6DA32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0053\",\"matchCriteriaId\":\"BAF2A976-4171-43C1-8B3E-1985B98F8AD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D70643B-FE67-40CA-B63F-825E78D7D670\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0043\",\"matchCriteriaId\":\"4D658393-6F10-4883-804B-A2B84625958D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70041B5F-C057-49F8-B949-B5F690680893\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0059\",\"matchCriteriaId\":\"6A654417-AF25-4BCC-8965-ADA5B3B9C060\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B1FC17-80E8-432B-8757-9522D6433800\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0067\",\"matchCriteriaId\":\"27C41138-573B-43DE-83F6-C760ECF6D6E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CDBA0B8-C076-43B1-AB5A-509DCDCB2932\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0067\",\"matchCriteriaId\":\"0F987C74-0FF8-48FD-AECC-5F90AB02A968\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CCB3FE-E248-4765-B630-5AC815D8C1F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0067\",\"matchCriteriaId\":\"18E04AAD-D2D3-4973-8C26-14C2A77084B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD25295-C0A4-45CD-9EA0-0C4594A08076\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0061\",\"matchCriteriaId\":\"8FF27C3F-0F41-4DAE-8972-52CDB0E0BC57\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9497CA1C-A3CA-4CC4-8192-69DF58630575\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0062\",\"matchCriteriaId\":\"B13F6B0D-1DF1-493D-82F6-F88442807E67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123782EB-5B44-492A-86B1-D10C03C89D64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0066\",\"matchCriteriaId\":\"9D7C10A5-D65B-4AF1-B200-BFC6B5E5BFE0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC196D3E-062A-4301-BAA8-51FAF153F2EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0072\",\"matchCriteriaId\":\"A6ED9789-5524-40BC-A5B6-9E90AD7CDAC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EFD543E-DD44-403D-A81F-9F7668F9A473\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0053\",\"matchCriteriaId\":\"99394CE6-5D41-4856-BE47-AAE11D2845BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64DA446C-B6D3-44AA-A5DE-ADDB6D879010\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0058\",\"matchCriteriaId\":\"43FAC38A-198A-445B-BBEF-7F5C733AD912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9290D1EF-ADCC-428B-A6B6-DD204A660A32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0038\",\"matchCriteriaId\":\"17FAF1D5-59AD-478D-A21B-1FDFD35AC9F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A488AFAB-566C-44EF-B211-38F87EF2164D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0064\",\"matchCriteriaId\":\"B6425331-88CE-42C6-9C8E-9CAFB16A25E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8285608B-66BB-47F7-AD2F-F9FC6ECB2FE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0024\",\"matchCriteriaId\":\"DFF6A0FB-8392-4A7B-93DE-CD6398016C8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A0221B0-3D61-45A2-AF5D-9D4E947C1E16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0054\",\"matchCriteriaId\":\"42BCF873-1788-4670-A29F-72A464C77228\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E95BD4-13B0-4687-89F2-0CFA0366E9FD\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.