cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-28693,https://securityvulnerability.io/vulnerability/CVE-2022-28693,Information Disclosure Vulnerability in Intel Processors,"Certain Intel processors have a vulnerability that exposes an unprotected alternative channel of return branch target prediction. This flaw may allow authorized users with local access to exploit the vulnerability, potentially leading to unauthorized information disclosure. It is advisable for users to implement updated security measures as recommended in Intel's security advisory.",Intel,Intel(r) Processors,4.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-14T20:50:54.450Z,0 CVE-2024-31068,https://securityvulnerability.io/vulnerability/CVE-2024-31068,Denial of Service Vulnerability in Intel Processors,"A vulnerability exists in certain Intel processors due to improper configuration of Finite State Machines (FSMs). This flaw allows a privileged user to potentially exploit the configuration, leading to a denial of service condition through local access. Such an attack could disrupt system operations and availability, making it crucial for users and organizations to assess their systems and apply necessary mitigations.",Intel,Intel(r) Processors,5.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:23.660Z,0 CVE-2024-36293,https://securityvulnerability.io/vulnerability/CVE-2024-36293,Improper Access Control Vulnerability in Intel SGX-Enabled Processors,"The vulnerability arises from improper access control in the EDECCSSA user leaf function of certain Intel SGX-enabled processors. This flaw could potentially allow an authenticated user to wreak havoc by enabling a denial of service condition through local access. As a result, systems using these processors may become unresponsive or experience degradation in performance. It's crucial for users to be aware of this vulnerability and to apply any patches or mitigations recommended by Intel to protect their systems.",Intel,Intel(r) Processors With Intel(r) Sgx,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:12.658Z,0 CVE-2024-37020,https://securityvulnerability.io/vulnerability/CVE-2024-37020,Unexpected Behavior in Intel DSA for Xeon Processors,"A flaw in the sequence of processor instructions within Intel DSA V1.0 for several Intel Xeon processors can lead to unexpected behavior. This vulnerability may allow an authenticated user with local access to potentially trigger a denial of service, compromising system availability. It is crucial for users of these processors to review relevant security advisories and take appropriate measures to mitigate risks.",Intel,Intel(r) Xeon(r) Processors,4.9,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:00.522Z,0 CVE-2024-39355,https://securityvulnerability.io/vulnerability/CVE-2024-39355,Improper Handling of Environmental Conditions in Intel Processors,"An improper handling of physical or environmental conditions in certain Intel processors could permit an authenticated user to cause a denial of service, potentially affecting the availability of the system. This vulnerability underscores the importance of secure hardware design and highlights risks associated with local access to systems. For further insights and mitigation strategies, consult the Intel security advisory.",Intel,Intel(r) Processors,5.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:39.378Z,0 CVE-2024-28047,https://securityvulnerability.io/vulnerability/CVE-2024-28047,Improper Input Validation in UEFI Firmware for Intel Processors,"A vulnerability exists in the UEFI firmware of certain Intel processors due to improper input validation. This flaw could allow a privileged user to exploit the system locally, leading to potential information disclosure. Users are advised to review the security advisory provided by Intel for guidance and updates.",Intel,Intel(r) Processors,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:36.237Z,0 CVE-2024-31157,https://securityvulnerability.io/vulnerability/CVE-2024-31157,Improper Initialization in UEFI Firmware in Intel Processors,"The UEFI firmware OutOfBandXML module in certain Intel processors is affected by an improper initialization issue. This vulnerability could allow a privileged user with local access to exploit the firmware, leading to potential information disclosure. Stakeholders are recommended to evaluate their systems and implement necessary mitigations as provided in the corresponding Intel advisory.",Intel,Intel(r) Processors,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:34.634Z,0 CVE-2024-39279,https://securityvulnerability.io/vulnerability/CVE-2024-39279,Insufficient Access Control in UEFI Firmware on Intel Processors,A vulnerability exists in the UEFI firmware of certain Intel processors due to insufficient granularity in access control mechanisms. This weakness could allow an authenticated user to potentially conduct a local denial-of-service attack. The flaw highlights the need for robust access control measures in firmware systems to prevent unauthorized actions that can impact system availability.,Intel,Intel(r) Processors,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:32.977Z,0 CVE-2024-28127,https://securityvulnerability.io/vulnerability/CVE-2024-28127,Privileged Access Vulnerability in Intel UEFI Firmware,"A vulnerability in the UEFI firmware for various Intel processors has been identified, allowing a privileged user with local access to bypass certain security mechanisms. This issue arises from improper input validation, which could potentially be exploited to escalate privileges. Intel has acknowledged the problem, emphasizing the importance of securing UEFI firmware to protect against unauthorized access and control.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:31.374Z,0 CVE-2024-29214,https://securityvulnerability.io/vulnerability/CVE-2024-29214,Input Validation Flaw in UEFI Firmware for Intel Processors,"An improper input validation vulnerability exists in the UEFI firmware, specifically within the CseVariableStorageSmm component for several Intel processors. This flaw could allow a privileged user to exploit local access conditions, leading to a potential escalation of privileges, thereby compromising system security. It is crucial for users and administrators to review their Intel firmware versions and apply any necessary security updates to mitigate the risks associated with this vulnerability.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:29.642Z,0 CVE-2024-24582,https://securityvulnerability.io/vulnerability/CVE-2024-24582,Privilege Escalation Vulnerability in UEFI Firmware for Intel Processors,"A vulnerability exists in the XmlCli feature of the UEFI firmware associated with certain Intel processors, which stems from improper input validation. This flaw could allow a privileged user with local access to potentially escalate their privileges, posing a risk of unauthorized access and control over system resources. It is essential for users to apply the recommended updates and mitigations provided by Intel to safeguard against potential exploitation.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:27.722Z,0 CVE-2023-34440,https://securityvulnerability.io/vulnerability/CVE-2023-34440,Improper Input Validation in UEFI Firmware for Intel Processors,"A vulnerability has been identified in the UEFI firmware of certain Intel processors. This flaw arises from improper input validation, potentially allowing a privileged user with local access to escalate their privileges. The implications of this vulnerability highlight significant security challenges in managing firmware integrity, as it could lead to unauthorized control over system resources. Timely updates and security patches are essential for safeguarding against potential exploitation.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:25.772Z,0 CVE-2023-43758,https://securityvulnerability.io/vulnerability/CVE-2023-43758,Improper Input Validation in UEFI Firmware for Intel Processors,"An improper input validation issue in the UEFI firmware for several Intel processors may enable a local privileged user to escalate privileges. This vulnerability poses a potential security risk, allowing unauthorized access to elevated privileges, which could lead to further exploitation of the system. It is critical for users and administrators to review the affected systems and apply necessary mitigations as outlined in the Intel security advisory.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:24.119Z,0 CVE-2024-21859,https://securityvulnerability.io/vulnerability/CVE-2024-21859,Information Disclosure Vulnerability in Intel UEFI Firmware,"The vulnerability stems from improper buffer restrictions in the UEFI firmware for specific Intel processors. This flaw could potentially allow a privileged user to access sensitive information through local access, heightening the risk of security breaches. Users should ensure they keep their firmware updated and monitor Intel's security advisories for patches and mitigation strategies.",Intel,Intel(r) Processors,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:17.737Z,0 CVE-2024-31155,https://securityvulnerability.io/vulnerability/CVE-2024-31155,Improper Buffer Restrictions in UEFI Firmware for Intel Processors,Improper buffer restrictions in the UEFI firmware for certain Intel processors could potentially allow a locally authenticated user to escalate their privileges. This vulnerability highlights the critical need for monitoring and updating firmware to safeguard against local access attacks that may exploit these weaknesses.,Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:16.141Z,0 CVE-2023-25546,https://securityvulnerability.io/vulnerability/CVE-2023-25546,Potential Privileged User Enabled Denial of Service Vulnerability in UEFI Firmware,"An out-of-bounds read vulnerability exists in the UEFI firmware for specific Intel(R) processors. This flaw can potentially be exploited by a privileged user with local access, enabling them to cause a denial of service condition. Affected users and organizations should apply security patches and mitigations described in the Intel security advisory to protect their systems against potential exploits.",Intel,Uefi Firmware For Some Intel(r) Processors,2.5,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:46.916Z,0 CVE-2023-43753,https://securityvulnerability.io/vulnerability/CVE-2023-43753,Potential Information Disclosure Vulnerability in Intel Processors with SGX,"An improper conditions check in Intel's Software Guard Extensions (SGX) on certain processors may permit a privileged user to potentially disclose sensitive information through local access. This vulnerability underscores the importance of thorough security measures and monitoring in environments leveraging SGX technology, as it could expose critical data if exploited. For comprehensive information and remediation recommendations, consult Intel's advisory on this matter.",Intel,Intel(r) Processors With Intel(r) Sgx,5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:46.373Z,0 CVE-2023-22351,https://securityvulnerability.io/vulnerability/CVE-2023-22351,Potential Escalation of Privilege Vulnerability in Intel UEFI Firmware,"An out-of-bounds write vulnerability exists in the UEFI firmware for certain Intel processors. This flaw may enable a privileged user to execute unauthorized actions through local access, leading to potential escalation of privileges. Users of affected Intel products should apply available mitigations and stay informed about updates to ensure system security.",Intel,Uefi Firmware For Some Intel(r) Processors,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:45.783Z,0 CVE-2023-23904,https://securityvulnerability.io/vulnerability/CVE-2023-23904,Potential NULL Pointer Dereference Vulnerability in Intel UEFI Firmware May Allow Escalation of Privilege,"A null pointer dereference vulnerability in UEFI firmware for certain Intel processors can potentially allow a privileged user to escalate privileges through local access. This issue arises from improper handling of null pointers, enabling local attackers to bypass security controls. It is crucial for users and organizations utilizing affected Intel UEFI firmware to apply available mitigations advised by Intel to protect their systems against potential exploitation.",Intel,Uefi Firmware For Some Intel(r) Processors,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:44.985Z,0 CVE-2023-41833,https://securityvulnerability.io/vulnerability/CVE-2023-41833,Race Condition in UEFI Firmware May Enable Local Escalation of Privileges,"A race condition vulnerability has been identified within the UEFI firmware associated with specific Intel processors. This flaw potentially enables a privileged user to escalate privileges through local means, which could facilitate further unauthorized access and manipulation of the affected systems. Users of these Intel processors should evaluate their systems for potential exposure to this vulnerability in order to implement appropriate security measures.",Intel,Uefi Firmware For Some Intel(r) Processors,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:44.388Z,0 CVE-2023-42772,https://securityvulnerability.io/vulnerability/CVE-2023-42772,UEFI Firmware Vulnerability May Allow Privileged User Escalation,"A vulnerability exists in the UEFI firmware of certain Intel reference processors that can allow a privileged user to exploit untrusted pointer dereference. This can potentially lead to escalation of privilege with local access. As the firmware is integral to system initialization and operations, any exploitation could severely compromise the integrity and security of systems reliant on the affected firmware versions.",Intel,Uefi Firmware For Some Intel(r) Reference Processors,8.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:42.667Z,0 CVE-2023-43626,https://securityvulnerability.io/vulnerability/CVE-2023-43626,Potential Escalation of Privilege Vulnerability in Intel UEFI Firmware,"The vulnerability arises from improper access control in the UEFI firmware for certain Intel processors. This flaw may allow a privileged user with local access to influence system configuration or elevate privileges unexpectedly. The implications of this vulnerability could lead to unauthorized actions being carried out within affected systems, potentially compromising system integrity and security. Users and administrators are advised to review their firmware configurations and apply necessary updates to mitigate risks associated with this issue.",Intel,Uefi Firmware For Some Intel(r) Processors,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-16T16:38:42.037Z,0 CVE-2023-42667,https://securityvulnerability.io/vulnerability/CVE-2023-42667,Possible Escalation of Privilege Vulnerability in Intel Core Processor Stream Cache Mechanism,The vulnerability arises from improper isolation within the stream cache mechanism of Intel(R) Core(TM) Ultra Processors. This issue potentially allows an authenticated user to leverage local access to facilitate an escalation of privilege. Organizations using affected Intel processors should review their security postures and apply any necessary mitigations as provided in the security advisory.,Intel,Intel(r) Core(tm) Ultra Processor Stream Cache Mechanism,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:38.379Z,0 CVE-2023-49141,https://securityvulnerability.io/vulnerability/CVE-2023-49141,Potential Escalation of Privilege Vulnerability in Intel Processors Due to Improper Isolation,"An improper isolation issue within the stream cache mechanism of certain Intel processors may allow an authenticated user with local access to exploit this vulnerability. This could potentially lead to an escalation of privilege, raising significant security concerns for affected systems. Users and administrators are advised to review security advisories and apply any recommended mitigations.",Intel,Intel(r) Processors Stream Cache Mechanism,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:37.747Z,0 CVE-2024-22374,https://securityvulnerability.io/vulnerability/CVE-2024-22374,Intel Xeon Processors Vulnerable to Local Access Denial of Service Attack,Insufficient control flow management for some Intel(R) Xeon Processors may allow an authenticated user to potentially enable denial of service via local access.,Intel,Intel(r) Xeon Processors,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:35.501Z,0