cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-30211,https://securityvulnerability.io/vulnerability/CVE-2024-30211,Improper Access Control in Intel ME Driver Pack Installer Engines,"An improper access control vulnerability exists in Intel ME driver pack installer engines prior to version 2422.6.2.0. This issue may allow an authenticated user to execute actions that would otherwise be restricted, potentially enabling escalation of privileges through local access. Organizations using affected versions should prioritize updating to mitigate risks associated with this vulnerability.",Intel,Intel(r) Me Driver Pack Installer Engines,5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:20.874Z,0 CVE-2024-36274,https://securityvulnerability.io/vulnerability/CVE-2024-36274,Out-of-Bounds Write Vulnerability in Intel Ethernet Driver,"An out-of-bounds write vulnerability exists in the Intel 800 Series Ethernet Driver for Intel Ethernet Adapter Complete Driver Pack versions before 29.1. This flaw may allow an unauthenticated user to trigger a denial of service condition through adjacent access, impacting system stability and functionality. Immediate attention is recommended to mitigate potential risks associated with this vulnerability.",Intel,Intel(r) 800 Series Ethernet Driver For Intel(r) Ethernet Adapter Complete Driver Pack,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:11.420Z,0 CVE-2024-24852,https://securityvulnerability.io/vulnerability/CVE-2024-24852,Uncontrolled Search Path in Intel Ethernet Adapter Driver Pack,"The vulnerability arises due to an uncontrolled search path in the Intel Ethernet Adapter Complete Driver Pack, potentially allowing authenticated users to escalate privileges through local access before version 29.1. Proper validation and restrictions are critical to safeguarding system integrity and user permissions.",Intel,Intel(r) Ethernet Adapter Complete Driver Pack,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:09.556Z,0 CVE-2024-39286,https://securityvulnerability.io/vulnerability/CVE-2024-39286,Linux Kernel Mode Driver Vulnerability in Intel 800 Series Ethernet Driver,"The Intel 800 Series Ethernet Driver prior to version 1.15.4 contains a vulnerability in its Linux kernel mode driver that allows authenticated users to exploit incorrect execution-assigned permissions. This could potentially lead to unauthorized information disclosure via local access, posing a significant risk to system integrity and confidentiality.",Intel,Intel(r) 800 Series Ethernet Driver,2,LOW,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:18:59.246Z,0 CVE-2024-42410,https://securityvulnerability.io/vulnerability/CVE-2024-42410,Input Validation Flaw in Intel Core Graphics Drivers,"An issue in certain versions of Intel Graphics Drivers allows an authenticated user to exploit improper input validation. This flaw could enable a local denial of service condition, impacting system stability and availability. Users are advised to review security advisories and update their drivers to mitigate potential risks.",Intel,Intel(r) Graphics Drivers,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:18:50.452Z,0 CVE-2024-38310,https://securityvulnerability.io/vulnerability/CVE-2024-38310,Improper Access Control in Intel Graphics Driver Installers,An improper access control vulnerability exists in Intel Graphics Driver software installers that may allow an authenticated user to potentially escalate privileges using local access. This issue highlights the importance of securing installation processes to prevent unauthorized access and manipulation by users with limited rights.,Intel,Intel(r) Graphics Driver Software Installers,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:18:48.842Z,0 CVE-2024-22376,https://securityvulnerability.io/vulnerability/CVE-2024-22376,Uncontrolled Search Path Element Vulnerability in Intel Ethernet Adapter Driver Package,"The vulnerability allows an authenticated user to exploit an uncontrolled search path element in earlier versions of the Intel Ethernet Adapter Driver Pack, granting potential escalation of privilege through local access. Attackers may manipulate the driver search paths, leading to unauthorized system access and execution of arbitrary code. Users are advised to upgrade to version 28.3 or later to mitigate this risk.",Intel,Installation Software For Intel(r) Ethernet Adapter Driver Pack,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:25.960Z,0 CVE-2022-37410,https://securityvulnerability.io/vulnerability/CVE-2022-37410,Potential Escalation of Privilege Vulnerability in Intel Thunderbolt Driver Software,"The vulnerability pertains to improper access control in Intel Thunderbolt driver software, which affects versions prior to 89. An authenticated user may exploit this issue to potentially escalate their privileges through local access to the system. This vulnerability raises significant security concerns, particularly in environments where multiple users have proportional access to devices. Proper application of security patches and guidance from Intel's advisory is essential to mitigate related risks.",Intel,Intel(r) Thunderbolt Driver Software,7,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:43.732Z,0 CVE-2023-43751,https://securityvulnerability.io/vulnerability/CVE-2023-43751,Potential Escalation of Privilege via Local Access in Intel(R) Graphics Command Center Service,"The Intel Graphics Command Center Service is affected by a vulnerability allowing an authenticated user to potentially escalate privileges via local access due to an uncontrolled search path in the bundled Intel Graphics Windows DCH driver software. This issue can lead to unauthorized access and manipulation of system resources, highlighting the importance of keeping drivers up-to-date to mitigate security risks.",Intel,Intel(r) Graphics Windows Dch Driver Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:39.645Z,0 CVE-2023-42668,https://securityvulnerability.io/vulnerability/CVE-2023-42668,Incorrect Default Permissions May Allow Escalation of Privilege via Local Access,"The vulnerability pertains to the onboard video driver software used in Intel Server Boards configured with the Intel 62X Chipset. Prior to version 1.14, this software contained incorrect default permissions, which could allow an authenticated user to exploit local access and potentially escalate their privileges within the system. This might lead to unauthorized access and control over system resources, raising serious security concerns for environments using these components. Administrators are advised to review their installations and apply necessary security patches.",Intel,Onboard Video Driver Software For Intel(r) Server Boards Based On Intel(r) 62x Chipset,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:38.978Z,0 CVE-2024-22015,https://securityvulnerability.io/vulnerability/CVE-2024-22015,Potential Denial of Service Vulnerability in Intel DLB Driver Software Prior to Version 8.5.0,"A security flaw exists in the Intel Data Streaming Accelerator (DLB) driver software prior to version 8.5.0, stemming from improper input validation. This vulnerability allows an authenticated user to potentially initiate a denial of service condition by accessing the system locally. The flaw highlights the importance of robust input validation processes to mitigate such risks. Users of the impacted product are advised to review security advisories and update their software to the latest version to enhance their security posture.",Intel,Intel(r) Dlb Driver Software,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-16T20:47:36.565Z,0 CVE-2023-41252,https://securityvulnerability.io/vulnerability/CVE-2023-41252,Intel QAT Software Drivers Vulnerability Could Lead to Denial of Service,"A vulnerability exists in certain versions of Intel(R) QuickAssist Technology (QAT) software drivers for Windows, where an out-of-bounds read could occur. This flaw may allow an authenticated user to exploit the software, potentially leading to a denial of service through local access. The issue is present in versions before QAT1.7-W-1.11.0. Organizations utilizing affected versions are advised to review their systems and consider applying available patches to mitigate the risk.",Intel,Intel(r) Qat Software Drivers For Windows,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:17.058Z,0 CVE-2023-33870,https://securityvulnerability.io/vulnerability/CVE-2023-33870,Insecure Inherited Permissions May Allow Escalation of Privilege via Local Access,"An issue exists in certain Intel Ethernet tools and driver installation software, where insecure inherited permissions may permit authenticated users to execute a privilege escalation attack. This vulnerability highlights the importance of proper permissions management in software deployment and the necessity for users to be cautious about their access and capabilities when using vulnerable products. Organizations are encouraged to review their installations and implement necessary patches or mitigations as outlined in the advisory.",Intel,Intel(r) Ethernet Tools And Driver Install Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:15.422Z,0 CVE-2023-39432,https://securityvulnerability.io/vulnerability/CVE-2023-39432,Potential Escalation of Privilege Vulnerability in Intel Ethernet Tools and Driver Install Software,"An improper access control issue exists in certain Intel Ethernet tools and driver installation software, which may allow an authenticated user to leverage local access for privilege escalation. This vulnerability poses potential risks to system integrity and data security, emphasizing the need for updates to impacted software versions. Solution availability and mitigation strategies are critical for users relying on this software for their network management.",Intel,"Intel(r) Ethernet Tools And Driver Install Software,",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:14.830Z,0 CVE-2023-25174,https://securityvulnerability.io/vulnerability/CVE-2023-25174,Potential Escalation of Privilege Vulnerability in Intel Chipset Driver Software,"An improper access control vulnerability exists in Intel Chipset Driver Software versions earlier than 10.1.19444.8378. This issue could allow an authenticated user to exploit the vulnerability and potentially escalate their privileges through local access, posing a significant risk to system integrity and security. Proper remediation and updates are crucial to mitigate this risk.",Intel,Intel(R) Chipset Driver Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:53.709Z,0 CVE-2023-28739,https://securityvulnerability.io/vulnerability/CVE-2023-28739,Potential Escalation of Privilege via Local Access in Intel Chipset Driver Software,"The Intel Chipset Driver Software prior to version 10.1.19444.8378 contains incorrect default permissions, which may allow an authenticated user to escalate privileges through local access. This vulnerability can enable unauthorized users to manipulate system privileges, leading to potential risks in system security management. Intel provides detailed security advisory for remediation and updates on this issue.",Intel,Intel(r) Chipset Driver Software,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:53.192Z,0 CVE-2023-26591,https://securityvulnerability.io/vulnerability/CVE-2023-26591,Denial of Service Risk in Intel Thunderbolt DCH Drivers for Windows,"An unchecked return value vulnerability in certain versions of Intel Thunderbolt DCH drivers for Windows allows potential denial of service when exploited by an unauthenticated user with physical access to the system. This issue primarily affects Intel's Thunderbolt drivers prior to version 88, posing risks for users and organizations reliant on these drivers for secure connectivity. To mitigate potential impacts, it is advisable to update to the latest versions as recommended by Intel's security advisory.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,2,LOW,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-02-14T13:37:49.450Z,0 CVE-2023-26596,https://securityvulnerability.io/vulnerability/CVE-2023-26596,Improper Access Control in Intel Thunderbolt DCH Drivers for Windows,"A vulnerability exists in the Intel Thunderbolt DCH drivers for Windows, where improper access control can potentially allow an authenticated user to disrupt system availability. This issue enables a scenario where local access could lead to denial of service conditions. Users and organizations utilizing these drivers should evaluate their systems and consider implementing mitigation strategies as recommended in the official security advisory.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,2.5,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:48.889Z,0 CVE-2023-27303,https://securityvulnerability.io/vulnerability/CVE-2023-27303,Improper Access Control in Intel Thunderbolt Drivers for Windows,"The vulnerability identified in Intel Thunderbolt DCH drivers for Windows allows improper access control, which can potentially lead to information disclosure. Authenticated users may exploit this flaw to access sensitive information through local access, raising concerns for system integrity and data security. Effective measures are necessary to mitigate potential risks associated with this vulnerability.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,3.8,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:48.307Z,0 CVE-2023-26592,https://securityvulnerability.io/vulnerability/CVE-2023-26592,Deserialization Vulnerability in Intel Thunderbolt DCH Drivers for Windows,"An issue exists in Intel Thunderbolt DCH drivers for Windows before version 88, relating to the deserialization of untrusted data. This vulnerability could allow an authenticated user to potentially exploit the flaw and trigger a denial of service via local access. Users of affected versions should take precautionary measures to mitigate potential risks and ensure system integrity.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,3.8,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:47.762Z,0 CVE-2023-27300,https://securityvulnerability.io/vulnerability/CVE-2023-27300,Improper Buffer Restrictions in Intel Thunderbolt DCH Drivers for Windows,"Improper buffer restrictions in specific Intel Thunderbolt DCH drivers for Windows prior to version 88 could allow an authenticated user to potentially gain access to sensitive information through local access. This vulnerability stems from inadequate handling of buffer restrictions, which raises concerns about information security for users with vulnerable driver versions. Users are encouraged to update their drivers to the latest version to mitigate this risk.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,3.8,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:47.252Z,0 CVE-2023-27307,https://securityvulnerability.io/vulnerability/CVE-2023-27307,Information Disclosure Vulnerability in Intel Thunderbolt Drivers,Certain versions of Intel Thunderbolt DCH drivers for Windows have been found to contain improper buffer restrictions. This vulnerability could potentially allow an authenticated user to gain unauthorized access to sensitive information through local access. Users running versions of the drivers prior to version 88 should be aware of this risk and consider applying security measures to mitigate the potential impact.,Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,3.8,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:46.706Z,0 CVE-2023-27301,https://securityvulnerability.io/vulnerability/CVE-2023-27301,Improper Access Control in Intel Thunderbolt Drivers,"Access control issues in certain Intel Thunderbolt DCH drivers for Windows prior to version 88 may permit an authenticated user to potentially escalate privileges through local access. This vulnerability raises significant cybersecurity concerns as it could allow unauthorized actions within the affected environment, posing risks to system integrity and confidentiality.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,4.2,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:46.150Z,0 CVE-2023-24463,https://securityvulnerability.io/vulnerability/CVE-2023-24463,Improper Input Validation in Intel Thunderbolt Drivers,"Improper input validation in Intel Thunderbolt DCH drivers for Windows versions prior to 88 poses risks of information disclosure to unauthenticated users with adjacent access. This flaw can potentially be exploited, allowing unauthorized access to sensitive information. It is crucial for users to ensure they are running the latest versions of the drivers to mitigate these security risks. Full details can be found in the official advisory.",Intel,Intel(R) Thunderbolt(TM) DCH drivers for Windows,4.3,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-02-14T13:37:45.613Z,0 CVE-2023-27308,https://securityvulnerability.io/vulnerability/CVE-2023-27308,Buffer Restriction Flaw in Intel Thunderbolt DCH Drivers for Windows,"A vulnerability exists within certain Intel Thunderbolt DCH drivers for Windows, stemming from improper buffer restrictions. This flaw permits a privileged user, with local access, to potentially escalate their privileges. Affected systems running versions of the Thunderbolt DCH drivers prior to version 88 may be at risk, necessitating prompt updates to secure environments. For detailed technical information, refer to Intel's advisory.",Intel,Intel(r) Thunderbolt(tm) Dch Drivers For Windows,4.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:45.069Z,0