3 results (0.019 seconds)

CVSS: 5.5EPSS: 0%CPEs: 55EXPL: 0

Improper access control for some 3rd Generation Intel(R) Xeon(R) Scalable Processors before BIOS version MR7, may allow a local attacker to potentially enable information disclosure via local access. Un control de acceso inapropiado en algunos procesadores Intel(R) Xeon(R) Scalable de tercera generación versiones anteriores a MR7 de la BIOS, puede permitir a un atacante local la divulgación potencial de información por medio del acceso local • https://security.netapp.com/advisory/ntap-20220818-0001 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html •

CVSS: 7.2EPSS: 0%CPEs: 33EXPL: 0

The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692. Vulnerabilidad en la implementación de la BIOS en dispositivos Dell Latitude, OptiPlex, Precisision Mobile Workstation y Precision Workstation Client Solutions (CS) con modelo dependiente del firmware anterior a A21, no impone un mecanismo de protección de bloqueo BIOS_CNTL al ser despertado de la suspensión, lo que permite a usuarios locales conducir ataques de flash EFI mediante el aprovechamiento de acceso a la consola, un problema similar a CVE-2015-3692. • http://www.kb.cert.org/vuls/id/577140 http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L •

CVSS: 6.9EPSS: 0%CPEs: 8EXPL: 0

Intel Desktop and Intel Mobile Boards with BIOS firmware DQ35JO, DQ35MP, DP35DP, DG33FB, DG33BU, DG33TL, MGM965TW, D945GCPE, and DX38BT allows local administrators with ring 0 privileges to gain additional privileges and modify code that is running in System Management Mode, or access hypervisory memory as demonstrated at Black Hat 2008 by accessing certain remapping registers in Xen 3.3. Intel Desktop y Intel Mobile Boards con firmware DQ35JO, DQ35MP, DP35DP, DG33FB, DG33BU, DG33TL, MGM965TW, D945GCPE, y DX38BT, permite a administradores locales con privilegios "ring" 0, obtener privilegios adicionales y modificar el código que se ejecuta en el modo "System Management", o acceder a la memoria del hipervisor como se demostró en la Black Hat 2008 con el accedo a ciertos registros remapeados en Xen v3.3 • http://invisiblethingslab.com/bh08/part2-full.pdf http://osvdb.org/49901 http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00017&languageid=en-fr http://theinvisiblethings.blogspot.com/2008/08/attacking-xen-domu-vs-dom0.html http://theinvisiblethings.blogspot.com/2008/08/intel-patches-q35-bug.html http://www.securityfocus.com/bid/30823 https://exchange.xforce.ibmcloud.com/vulnerabilities/44676 • CWE-264: Permissions, Privileges, and Access Controls •