7 results (0.036 seconds)

CVSS: 3.5EPSS: 0%CPEs: 1258EXPL: 0

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access. La validación de entrada incorrecta en el firmware del BIOS para Intel(R) Processors puede permitir que un usuario autenticado potencialmente habilite la denegación de servicio a través del acceso adyacente. • https://security.netapp.com/advisory/ntap-20231221-0008 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00924.html • CWE-20: Improper Input Validation •

CVSS: 8.0EPSS: 0%CPEs: 1258EXPL: 0

Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access. La lectura fuera de los límites en el firmware del BIOS para Intel(R) Processors puede permitir que un usuario autenticado potencialmente habilite la escalada de privilegios a través del acceso adyacente. • https://security.netapp.com/advisory/ntap-20231221-0008 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00924.html • CWE-125: Out-of-bounds Read •

CVSS: 7.2EPSS: 0%CPEs: 952EXPL: 0

Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html • CWE-665: Improper Initialization •

CVSS: 7.9EPSS: 0%CPEs: 894EXPL: 0

Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. La condición de ejecución de tiempo de verificación y tiempo de uso en el firmware del BIOS para Intel(R) Processors, puede permitir que un usuario con privilegios habilite la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.5EPSS: 0%CPEs: 727EXPL: 0

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Una limpieza incompleta de operaciones de lectura de un registro especial específico en algunos Intel® Processors puede permitir a un usuario autenticado habilitar potencialmente una divulgación de información por medio de un acceso local A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both. • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html http://www.openwall.com/lists/oss-security/2020/07/14/5 https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf https://kc.mcafee.com/corporate/index?page=content&id=SB10318 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message • CWE-459: Incomplete Cleanup •