
CVE-2023-22329
https://notcve.org/view.php?id=CVE-2023-22329
14 Nov 2023 — Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access. La validación de entrada incorrecta en el firmware del BIOS para Intel(R) Processors puede permitir que un usuario autenticado potencialmente habilite la denegación de servicio a través del acceso adyacente. • https://security.netapp.com/advisory/ntap-20231221-0008 • CWE-20: Improper Input Validation •

CVE-2023-25756
https://notcve.org/view.php?id=CVE-2023-25756
14 Nov 2023 — Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access. La lectura fuera de los límites en el firmware del BIOS para Intel(R) Processors puede permitir que un usuario autenticado potencialmente habilite la escalada de privilegios a través del acceso adyacente. • https://security.netapp.com/advisory/ntap-20231221-0008 • CWE-125: Out-of-bounds Read •

CVE-2023-23583 – Debian Security Advisory 5563-1
https://notcve.org/view.php?id=CVE-2023-23583
14 Nov 2023 — Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access. La secuencia de instrucciones del procesador genera un comportamiento inesperado en Intel(R) Processors que pueden permitir que un usuario autenticado potencialmente habilite la escalada de privilegios y/o la divulgación de información y/o la denegación de servicio a ... • https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar- • CWE-276: Incorrect Default Permissions CWE-1281: Sequence of Processor Instructions Leads to Unexpected Behavior •

CVE-2022-44611
https://notcve.org/view.php?id=CVE-2022-44611
11 Aug 2023 — Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. Una validación de entrada inadecuada en el firmware de la BIOS para algunos procesadores Intel(R) puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios a través de un acceso adyacente. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html • CWE-20: Improper Input Validation •

CVE-2022-40982 – hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
https://notcve.org/view.php?id=CVE-2022-40982
11 Aug 2023 — Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. La exposición de información a través del estado microarquitectónico tras la ejecución transitoria en determinadas unidades de ejecución vectorial de algunos procesadores Intel(R) puede permitir a un usuario autenticado la divulgación potencial de información a través del a... • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-203: Observable Discrepancy CWE-1342: Information Exposure through Microarchitectural State after Transient Execution •

CVE-2022-30704
https://notcve.org/view.php?id=CVE-2022-30704
16 Feb 2023 — Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html • CWE-665: Improper Initialization •

CVE-2022-26837
https://notcve.org/view.php?id=CVE-2022-26837
16 Feb 2023 — Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html • CWE-20: Improper Input Validation •

CVE-2022-26047
https://notcve.org/view.php?id=CVE-2022-26047
11 Nov 2022 — Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access. La validación de entrada incorrecta para algunos productos Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi y Killer(TM) WiFi puede permitir que usuarios no autenticados habiliten potencialmente la Denegación de Servicio (DoS) a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html • CWE-20: Improper Input Validation CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2022-21198
https://notcve.org/view.php?id=CVE-2022-21198
11 Nov 2022 — Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. La condición de ejecución de tiempo de verificación y tiempo de uso en el firmware del BIOS para Intel(R) Processors, puede permitir que un usuario con privilegios habilite la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00688.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-21233 – hw: cpu: Intel: Stale Data Read from legacy xAPIC vulnerability
https://notcve.org/view.php?id=CVE-2022-21233
18 Aug 2022 — Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. Un aislamiento inapropiado de los recursos compartidos en algunos procesadores Intel(R) puede permitir que un usuario privilegiado permita potencialmente la divulgación de información a través del acceso local. A flaw was found in hw. The APIC can operate in xAPIC mode (also known as a legacy mode), in which APIC configuration registers are exposed thr... • https://lists.debian.org/debian-lts-announce/2023/04/msg00000.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •