CVE-2023-42772
https://notcve.org/view.php?id=CVE-2023-42772
16 Sep 2024 — Untrusted pointer dereference in UEFI firmware for some Intel(R) reference processors may allow a privileged user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html • CWE-822: Untrusted Pointer Dereference •
CVE-2024-21871
https://notcve.org/view.php?id=CVE-2024-21871
16 Sep 2024 — Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html • CWE-20: Improper Input Validation •
CVE-2023-42667
https://notcve.org/view.php?id=CVE-2023-42667
14 Aug 2024 — Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html • CWE-1189: Improper Isolation of Shared Resources on System-on-a-Chip (SoC) •
CVE-2024-24853
https://notcve.org/view.php?id=CVE-2024-24853
14 Aug 2024 — Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html • CWE-696: Incorrect Behavior Order •
CVE-2024-21831
https://notcve.org/view.php?id=CVE-2024-21831
16 May 2024 — Uncontrolled search path in some Intel(R) Processor Diagnostic Tool software before version 4.1.9.41 may allow an authenticated user to potentially enable escalation of privilege via local access. La ruta de búsqueda no controlada en algunos software de Intel(R) Processor Diagnostic Tool anterior a la versión 4.1.9.41 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01069.html • CWE-427: Uncontrolled Search Path Element •
CVE-2023-22655 – kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R)
https://notcve.org/view.php?id=CVE-2023-22655
14 Mar 2024 — Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. La falla del mecanismo de protección en algunos procesadores Intel(R) Xeon(R) de tercera y cuarta generación cuando se utiliza Intel(R) SGX o Intel(R) TDX puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a través del acceso local. A vulnerability ... • https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html • CWE-693: Protection Mechanism Failure •
CVE-2020-8702
https://notcve.org/view.php?id=CVE-2020-8702
09 Jun 2021 — Uncontrolled search path element in the Intel(R) Processor Diagnostic Tool before version 4.1.5.37 may allow an authenticated user to potentially enable escalation of privilege via local access. Un elemento de ruta de búsqueda no controlado en Intel® Processor Diagnostic Tool versiones anteriores a 4.1.5.37, puede permitir a un usuario autenticado permitir potencialmente una escalada de privilegios por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00458.html • CWE-427: Uncontrolled Search Path Element •
CVE-2020-12335
https://notcve.org/view.php?id=CVE-2020-12335
12 Nov 2020 — Improper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access. Unos permisos inapropiados en el instalador para la Intel® Processor Identification Utility anterior a versión 6.4.0603, pueden habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00419 • CWE-281: Improper Preservation of Permissions •
CVE-2019-11163
https://notcve.org/view.php?id=CVE-2019-11163
19 Aug 2019 — Insufficient access control in a hardware abstraction driver for Intel(R) Processor Identification Utility for Windows before version 6.1.0731 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access. Un control de acceso insuficiente en un controlador de abstracción de hardware para Intel® Processor Identification Utility para Windows versiones anteriores a 6.1.0731, puede permitir a un usuario autenticado habilitar potencia... • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00281.html •
CVE-2019-11133
https://notcve.org/view.php?id=CVE-2019-11133
11 Jul 2019 — Improper access control in the Intel(R) Processor Diagnostic Tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access. Un control de acceso inapropiado en la Herramienta de Diagnóstico del Procesadores Intel(R) anterior a la versión 4.1.2.24, puede permitir que un usuario autenticado habilite potencialmente una escalada de privilegios, divulgación de información o denegación de servicio por medio ... • http://www.securityfocus.com/bid/109096 •