cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-25571,https://securityvulnerability.io/vulnerability/CVE-2024-25571,Improper Input Validation in Intel SPS Firmware,"An improper input validation vulnerability exists in some versions of Intel's SPS firmware, potentially enabling a privileged local user to cause a denial of service. Failure to validate input correctly could lead to the exploitation of this flaw, impacting the stability and availability of affected systems. Organizations using affected firmware versions should implement necessary security measures to mitigate the risk associated with local access exploitation.",Intel,Intel(r) Sps Firmware Before Sps E5 06.01.04.059.0,4.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:37.820Z,0 CVE-2023-35191,https://securityvulnerability.io/vulnerability/CVE-2023-35191,Potential Denial of Service Vulnerability in Intel SPS Firmware,"A vulnerability exists in certain versions of Intel SPS Firmware that can be exploited by a privileged user through network access. This exploitation could lead to uncontrolled resource consumption, negatively impacting system performance and availability. Organizations utilizing affected Intel SPS Firmware should be aware of the potential for denial of service attacks and take necessary precautions to mitigate risks associated with this vulnerability.",Intel,Intel(r) Sps Firmware Versions,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-14T16:45:47.845Z,0 CVE-2023-29153,https://securityvulnerability.io/vulnerability/CVE-2023-29153,Potential Denial of Service Vulnerability in Intel SPS Firmware,"The vulnerability involves uncontrolled resource consumption present in certain Intel SPS firmware versions, specifically prior to SPS_E5_06.01.04.002.0. This issue allows a privileged user to exploit the vulnerability, potentially leading to a denial of service via network access. Organizations utilizing affected versions of Intel's SPS firmware may face disruption in services, highlighting the importance of immediate updates and patching measures to secure their systems against unauthorized access and resource exhaustion.",Intel,Intel(r) Sps Firmware,4.9,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:38:17.590Z,0 CVE-2022-36794,https://securityvulnerability.io/vulnerability/CVE-2022-36794,Improper Condition Check in Intel SPS Firmware,"A security flaw exists in certain versions of Intel SPS firmware, allowing a privileged user local access that could lead to a denial of service condition. This improper condition check in the firmware may enable unauthorized actions if exploited, emphasizing the necessity of updating to safeguard against potential threats. For detailed insights, refer to Intel's security advisory.",Intel,Intel(r) Sps Firmware,6,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:01.515Z,0 CVE-2022-36348,https://securityvulnerability.io/vulnerability/CVE-2022-36348,Privilege Escalation Vulnerability in Intel SPS Firmware,Certain versions of Intel SPS firmware contain active debug code that could allow an authenticated user to elevate privileges through local access. This vulnerability underscores the need for timely updates to firmware in order to mitigate potential risks associated with unauthorized privilege escalation.,Intel,Intel (r) Sps Firmware,8.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T19:59:59.676Z,0