cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21807,https://securityvulnerability.io/vulnerability/CVE-2024-21807,Potential Escalation of Privilege Vulnerability in Linux kernel Mode Driver,"An improper initialization vulnerability exists in the Linux kernel mode driver for certain Intel Ethernet Network Controllers and Adapters prior to version 28.3. This issue could potentially allow an authenticated user with local access to escalate their privileges on the affected system, creating a security risk that emphasizes the importance of maintaining updated software and implementing strong security practices.",Intel,Intel(r) Ethernet Network Controllers And Adapters,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:47.339Z,0 CVE-2024-23499,https://securityvulnerability.io/vulnerability/CVE-2024-23499,Unauthenticated Denial of Service Vulnerability in Intel E810 Series Ethernet Controllers,"A critical vulnerability has been identified within the Linux kernel mode driver used by Intel's E810 Series Ethernet Network Controllers and Adapters. A failure in the protection mechanisms allows an unauthenticated user to potentially exploit this vulnerability, leading to denial of service through network access. This can severely disrupt network operations and impact the availability of services reliant on these devices. It is essential for affected users to take immediate action to secure their systems against this exposure as updates and patches become available.",Intel,Intel(r) Ethernet Network Controllers And Adapters E810 Series,7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-08-14T13:45:46.816Z,0 CVE-2024-24986,https://securityvulnerability.io/vulnerability/CVE-2024-24986,Potential Escalation of Privilege via Local Access in Linux Kernel Mode Driver,"The vulnerability originates from improper access control in the Linux kernel mode driver for specific Intel Ethernet Network Controllers and Adapters prior to version 28.3. This flaw could be exploited by an authenticated user, allowing for potential escalation of privilege through local access. Organizations utilizing affected products should implement necessary mitigations and updates to safeguard against unauthorized access and enhance overall system security.",Intel,Intel(r) Ethernet Network Controllers And Adapters,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:46.283Z,0 CVE-2024-23981,https://securityvulnerability.io/vulnerability/CVE-2024-23981,Possible Escalation of Privilege via Local Access,A wrap-around error has been identified in the Linux kernel mode driver for select Intel Ethernet Network Controllers and Adapters prior to version 28.3. This vulnerability has the potential to allow authenticated users to escalate their privileges through local access. Organizations utilizing these affected products should take immediate precautions to mitigate risks associated with unauthorized privilege escalation.,Intel,Intel(r) Ethernet Network Controllers And Adapters,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:45.752Z,0 CVE-2024-23497,https://securityvulnerability.io/vulnerability/CVE-2024-23497,Intel Ethernet Adapters Vulnerable to Out-of-bounds Write Attack,"A vulnerability exists in the Linux kernel mode driver for various Intel Ethernet Network Controllers and Adapters, which before version 28.3, is susceptible to an out-of-bounds write condition. This flaw may allow an authenticated user with local access to the system to exploit the vulnerability, potentially leading to escalation of privilege and unauthorized control over system resources.",Intel,Intel(r) Ethernet Network Controllers And Adapters,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:44.653Z,0 CVE-2024-24983,https://securityvulnerability.io/vulnerability/CVE-2024-24983,Unauthenticated Denial of Service Vulnerability in Intel E810 Series Firmware,Protection mechanism failure in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 4.4 may allow an unauthenticated user to potentially enable denial of service via network access.,Intel,Intel(r) Ethernet Network Controllers And Adapters E810 Series,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:44.098Z,0 CVE-2024-21810,https://securityvulnerability.io/vulnerability/CVE-2024-21810,Potential Escalation of Privilege via Local Access,"A flaw exists in the Linux kernel mode driver for Intel Ethernet Network Controllers and Adapters, which may lead to improper input validation. This vulnerability allows authenticated users with local access the potential to escalate their privileges. The affected products are those that have not been updated to version 28.3, which may leave systems open to risks associated with unauthorized access and privilege escalation.",Intel,Intel(r) Ethernet Network Controllers And Adapters,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:43.577Z,0 CVE-2022-36382,https://securityvulnerability.io/vulnerability/CVE-2022-36382,Out-of-Bounds Write in Intel Ethernet Network Controllers and Adapters,"The vulnerability allows a privileged user to perform an out-of-bounds write in the firmware of specific Intel Ethernet Network Controllers and Adapters. If exploited, this may permit local access that potentially leads to denial of service, impacting network reliability and performance. The affected products include the E810 Series and 700 Series controllers and adapters, emphasizing the need for immediate firmware updates to mitigate risks.",Intel,Intel(r) Ethernet Network Controllers And Adapters E810 Series And Some Intel(r) Ethernet 700 Series Controllers And Adapters,6,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:26.578Z,0 CVE-2020-0525,https://securityvulnerability.io/vulnerability/CVE-2020-0525,Access Control Vulnerability in Intel Ethernet I210 Controller Series,"An improper access control vulnerability in the firmware of the Intel Ethernet I210 Controller series can potentially allow a privileged user to disrupt network operations through local access. This flaw affects all versions released before 3.30, making it essential for organizations utilizing these network adapters to apply the latest firmware updates to mitigate risks. For detailed information, please refer to Intel's security advisory.",Intel,Intel(r) Ethernet I210 Controller Series Of Network Adapters,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-02-17T13:58:29.000Z,0 CVE-2020-0524,https://securityvulnerability.io/vulnerability/CVE-2020-0524,Improper Permissions in Intel Ethernet I210 Controller,"The Intel Ethernet I210 Controller series of network adapters has improper default permissions in the firmware prior to version 3.30. This vulnerability may enable an authenticated user to exploit the firmware, potentially leading to denial of service through local access. It is crucial for users and administrators to update their firmware to the latest version to mitigate this risk.",Intel,Intel(r) Ethernet I210 Controller Series Of Network Adapters,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-02-17T13:58:12.000Z,0 CVE-2020-0523,https://securityvulnerability.io/vulnerability/CVE-2020-0523,Improper Access Control in Intel Ethernet I210 Network Adapters,"An imperfection in access control mechanisms within the firmware of the Intel Ethernet I210 Controller series, prior to version 3.30, can potentially allow a privileged user to conduct a denial of service attack through local access. This flaw exposes network systems to risks if exploited, as it may impact the availability and functionality of connected network devices.",Intel,Intel(r) Ethernet I210 Controller Series Of Network Adapters,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-02-17T13:57:47.000Z,0 CVE-2020-0522,https://securityvulnerability.io/vulnerability/CVE-2020-0522,Improper Initialization in Intel Ethernet I210 Controller Network Adapters,The firmware of Intel(R) Ethernet I210 Controller series network adapters contains an improper initialization flaw. This vulnerability could allow a privileged user with local access to enable a state that results in a denial of service condition. This highlights the importance of keeping firmware up to date to mitigate such potential disruptions.,Intel,Intel(r) Ethernet I210 Controller Series Of Network Adapters,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-02-17T13:57:34.000Z,0