Filtered by vendor Intel
Subscriptions
Total
1697 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-24981 | 1 Intel | 3 Intel Server D50fcp Family, Intel Server M50fcp Family, Server Board S2600bp Firmware | 2025-05-14 | 7.5 High |
Improper input validation in PfrSmiUpdateFw driver in UEFI firmware for some Intel(R) Server M50FCP Family products may allow a privileged user to enable escalation of privilege via local access. | ||||
CVE-2023-24542 | 1 Intel | 1 Thunderbolt Dch Driver | 2025-05-12 | 6.7 Medium |
Unquoted search path or element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2023-22342 | 1 Intel | 1 Thunderbolt Dch Driver | 2025-05-12 | 7.7 High |
Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2023-25174 | 1 Intel | 1 Chipset Device Software | 2025-05-12 | 6.7 Medium |
Improper access control in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2023-25073 | 1 Intel | 1 Driver \& Support Assistant | 2025-05-12 | 5.5 Medium |
Improper access control in some Intel(R) DSA software before version 23.4.33 may allow an authenticated user to potentially enable denial of service via local access. | ||||
CVE-2023-24589 | 1 Intel | 1 Thunderbolt Dch Driver | 2025-05-12 | 6.1 Medium |
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2023-22311 | 1 Intel | 7 Nma1xxd128gpsu4, Nma1xxd128gpsuf, Nma1xxd256gpsu4 and 4 more | 2025-05-12 | 6.7 Medium |
Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2023-22293 | 1 Intel | 216 Core I3-6006u, Core I3-6098p, Core I3-6100 and 213 more | 2025-05-12 | 8.2 High |
Improper access control in the Intel(R) Thunderbolt(TM) DCH drivers for Windows may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2023-29495 | 1 Intel | 4 Nuc 8 Mainstream-g Kit Nuc8i5inh, Nuc 8 Mainstream-g Kit Nuc8i5inh Firmware, Nuc 8 Mainstream-g Kit Nuc8i7inh and 1 more | 2025-05-09 | 7.5 High |
Improper input validation for some Intel NUC BIOS firmware before version IN0048 may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2023-24481 | 1 Intel | 1 Thunderbolt Dch Driver | 2025-05-08 | 6.3 Medium |
Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2017-5715 | 8 Arm, Canonical, Debian and 5 more | 230 Cortex-a, Ubuntu Linux, Debian Linux and 227 more | 2025-05-06 | 5.6 Medium |
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||||
CVE-2022-30944 | 1 Intel | 2 Active Management Technology Firmware, Standard Manageability | 2025-05-05 | 5.5 Medium |
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access. | ||||
CVE-2022-30601 | 1 Intel | 2 Active Management Technology Firmware, Standard Manageability | 2025-05-05 | 9.8 Critical |
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access. | ||||
CVE-2022-28709 | 1 Intel | 2 Ethernet Controller E810, Ethernet Controller E810 Firmware | 2025-05-05 | 4.4 Medium |
Improper access control in the firmware for some Intel(R) E810 Ethernet Controllers before version 1.6.1.9 may allow a privileged user to potentially enable denial of service via local access. | ||||
CVE-2022-28697 | 1 Intel | 2 Active Management Technology Firmware, Standard Manageability | 2025-05-05 | 6.8 Medium |
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | ||||
CVE-2022-28696 | 1 Intel | 1 Distribution For Python | 2025-05-05 | 7.8 High |
Uncontrolled search path in the Intel(R) Distribution for Python before version 2022.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-27500 | 1 Intel | 1 Support | 2025-05-05 | 5.5 Medium |
Incorrect default permissions for the Intel(R) Support Android application before 21.07.40 may allow an authenticated user to potentially enable information disclosure via local access. | ||||
CVE-2022-26373 | 3 Debian, Intel, Redhat | 987 Debian Linux, Celeron 5305u, Celeron 5305u Firmware and 984 more | 2025-05-05 | 5.5 Medium |
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. | ||||
CVE-2022-26074 | 1 Intel | 1 Server Platform Services Firmware | 2025-05-05 | 4.4 Medium |
Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_E3_04.08.04.330.0 and SPS_E3_04.01.04.530.0 may allow a privileged user to potentially enable denial of service via local access. | ||||
CVE-2022-26017 | 1 Intel | 1 Driver \& Support Assistant | 2025-05-05 | 8 High |
Improper access control in the Intel(R) DSA software for before version 22.2.14 may allow an authenticated user to potentially enable escalation of privilege via adjacent access. |