var-201906-1235
Vulnerability from variot
Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "compute stick", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "compute card", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "accelerated storage manager", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "chipset device software", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute card", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "compute stick", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i3", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core i5", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "core x-series", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "omni-path fabric manager gui", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 2000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor 3000 series" }, { "model": "pentium", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor g series" }, { "model": "proset/wireless software driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "raid web console v3", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows" }, { "model": "sgx dcap linux driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "sgx linux client driver", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "turbo boost max technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v3 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v5 family" }, { "model": "xeon", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "processor e7 v7 family" }, { "model": "ite tech* consumer infrared driver", "scope": "eq", "trust": 0.8, "vendor": "intel", "version": "for windows 10" }, { "model": "open cloud integrity technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "openattestation", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kitnuc6cayx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i7bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i5bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc8i3bex bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7pjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc7cjy bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i5syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc6i3syx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5ppyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5pgyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i5myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5i3myx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit nuc5cpyh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit dn2820fykh bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit de3815tyb bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d54250wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kit d34010wyx bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2mv64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m3w64cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stk2m364cc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a8lfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute stick stck1a32wfc bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1p64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1m3128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1iv128mk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "compute card cd1c64gk bios", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "nuc kitnuc6cayx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "nuc kit nuc8i7hvk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7hnk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc8i7bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i5bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc8i3cyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0040" }, { "model": "nuc kit nuc8i3bex bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0071" }, { "model": "nuc kit nuc7pjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc7i7dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i7bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i5dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i5bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7i3dnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0063" }, { "model": "nuc kit nuc7i3bnx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0079" }, { "model": "nuc kit nuc7cjy bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0049" }, { "model": "nuc kit nuc6i7kyk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0062" }, { "model": "nuc kit nuc6i5syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc6i3syx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0070" }, { "model": "nuc kit nuc5ppyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5pgyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit nuc5i7ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i5myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit nuc5i3ryx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0379" }, { "model": "nuc kit nuc5i3myx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0054" }, { "model": "nuc kit nuc5cpyh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0076" }, { "model": "nuc kit dn2820fykh bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0067" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0065" }, { "model": "nuc kit de3815tyb bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0020" }, { "model": "nuc kit d54250wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "nuc kit d34010wyx bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0051" }, { "model": "compute stick stk2mv64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m3w64cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stk2m364cc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0060" }, { "model": "compute stick stck1a8lfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute stick stck1a32wfc bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0039" }, { "model": "compute card cd1p64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" }, { "model": "compute card cd1m3128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0056" }, { "model": "compute card cd1iv128mk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0036" }, { "model": "compute card cd1c64gk bios", "scope": "ne", "trust": 0.3, "vendor": "intel", "version": "0050" } ], "sources": [ { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_dn2820fykh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6cayx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i5syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7pjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hvk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5myx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i5ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i7ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5pgyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i3cyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i5bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7bex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc8i7hnk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d34010wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_d54250wyx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_de3815tyb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i7kyk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7cjy:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i3dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5bnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5cpyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5i3ryx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc5ppyh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc6i3syx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i5dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:nuc_kit_nuc8i3bex:nuc_kit_nuc7i7dnx:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1c64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-11128" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.6 }, "cve": "CVE-2019-11128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-142743", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-11128", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-11128", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-553", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-142743", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-11128", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11128", "trust": 2.9 }, { "db": "BID", "id": "108766", "trust": 2.1 }, { "db": "JVN", "id": "JVNVU95572531", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004980", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-553", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2099", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-142743", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-11128", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "id": "VAR-201906-1235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142743" } ], "trust": 0.8385371857142857 }, "last_update_date": "2023-12-18T11:20:15.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html" }, { "title": "[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html" }, { "title": "[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html" }, { "title": "[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html" }, { "title": "[INTEL-SA-00264] Intel NUC Firmware Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "title": "[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html" }, { "title": "[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html" }, { "title": "[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html" }, { "title": "[INTEL-SA-00235] Intel SGX for Linux Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html" }, { "title": "[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html" }, { "title": "[INTEL-SA-00247] Partial Physical Address Leakage Advisory", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html" }, { "title": "Intel NUC Kit Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93786" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "NVD", "id": "CVE-2019-11128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/108766" }, { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html" }, { "trust": 1.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/in" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11128" }, { "trust": 0.9, "url": "http://www.intel.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95572531" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0128" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0178" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11119" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0130" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0179" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11123" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0180" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11124" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0157" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11125" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0164" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0182" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11126" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0174" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0183" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11127" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0175" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11092" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3702" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11117" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11129" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2099/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/intel-patches-nuc-firmware/145620/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142743" }, { "db": "VULMON", "id": "CVE-2019-11128" }, { "db": "BID", "id": "108766" }, { "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "db": "NVD", "id": "CVE-2019-11128" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-13T00:00:00", "db": "VULHUB", "id": "VHN-142743" }, { "date": "2019-06-13T00:00:00", "db": "VULMON", "id": "CVE-2019-11128" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-13T16:29:01.543000", "db": "NVD", "id": "CVE-2019-11128" }, { "date": "2019-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-24T00:00:00", "db": "VULHUB", "id": "VHN-142743" }, { "date": "2019-06-24T00:00:00", "db": "VULMON", "id": "CVE-2019-11128" }, { "date": "2019-06-11T00:00:00", "db": "BID", "id": "108766" }, { "date": "2019-06-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004980" }, { "date": "2019-06-24T16:15:14.727000", "db": "NVD", "id": "CVE-2019-11128" }, { "date": "2019-06-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-553" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108766" }, { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Multiple vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004980" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-553" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.