
CVE-2022-21151 – Debian Security Advisory 5178-1
https://notcve.org/view.php?id=CVE-2022-21151
12 May 2022 — Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Una eliminación de la optimización del procesador o la modificación del código crítico para la seguridad de algunos procesadores Intel(R) puede permitir que un usuario autenticado permita potencialmente una divulgación de información por medio del acceso local It was discovered that some Intel processors did not i... • https://security.netapp.com/advisory/ntap-20220826-0003 •

CVE-2022-0004
https://notcve.org/view.php?id=CVE-2022-0004
12 May 2022 — Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Los modos de depuración de hardware y la configuración INIT del procesador que permiten la anulación de bloqueos para algunos procesadores Intel(R) en Intel(R) Boot Guard e Intel(R) TXT pueden permitir que un usuario no autenticado permita potencialmente una escala... • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00613.html •

CVE-2021-0186
https://notcve.org/view.php?id=CVE-2021-0186
17 Nov 2021 — Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged user to potentially escalation of privilege via local access. Una comprobación de entrada inapropiada en las aplicaciones Intel® SGX SDK compiladas para procesadores habilitados para SGX2 puede permitir a un usuario privilegiado escalar privilegios por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00548.html • CWE-20: Improper Input Validation •

CVE-2021-0146 – Gentoo Linux Security Advisory 202402-22
https://notcve.org/view.php?id=CVE-2021-0146
17 Nov 2021 — Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. El hardware permite la activación de la lógica de prueba o depuración en tiempo de ejecución para algunos procesadores Intel®, lo que puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio del acceso físico It was discovered that some Intel processors did not impl... • https://security.netapp.com/advisory/ntap-20211210-0006 •

CVE-2020-24513 – hw: information disclosure on some Intel Atom processors
https://notcve.org/view.php?id=CVE-2020-24513
09 Jun 2021 — Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Una vulnerabilidad en la ejecución transitoria de omisión de dominios en algunos procesadores Intel Atom® puede permitir a un usuario autenticado permitir potencialmente una divulgación de información por medio de un acceso local A potential domain bypass transient execution vulnerability was discovered on some Intel Atom® processors ... • https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2020-0599
https://notcve.org/view.php?id=CVE-2020-0599
13 Nov 2020 — Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. El control de acceso inapropiado en el PMC para algunos procesadores Intel®, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360 •

CVE-2020-0559
https://notcve.org/view.php?id=CVE-2020-0559
13 Aug 2020 — Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access. Unos permisos heredados no seguros en algunos productos Intel® PROSet/Wireless WiFi en Windows* versiones 7 y 8.1 anteriores a versión 21.40.5.1, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2019-0154 – hw: Intel GPU Denial Of Service while accessing MMIO in lower power state
https://notcve.org/view.php?id=CVE-2019-0154
12 Nov 2019 — Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access. Un control de acceso insuficient... • http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html • CWE-284: Improper Access Control •

CVE-2019-0155 – hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
https://notcve.org/view.php?id=CVE-2019-0155
12 Nov 2019 — Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka... • http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html • CWE-284: Improper Access Control •

CVE-2019-0120
https://notcve.org/view.php?id=CVE-2019-0120
17 May 2019 — Insufficient key protection vulnerability in silicon reference firmware for Intel(R) Pentium(R) Processor J Series, Intel(R) Pentium(R) Processor N Series, Intel(R) Celeron(R) J Series, Intel(R) Celeron(R) N Series, Intel(R) Atom(R) Processor A Series, Intel(R) Atom(R) Processor E3900 Series, Intel(R) Pentium(R) Processor Silver Series may allow a privileged user to potentially enable denial of service via local access. Vulnerabilidad de insuficiente protección de la llave en el firmware Silicon Reference p... • http://www.securityfocus.com/bid/108485 • CWE-522: Insufficiently Protected Credentials •