cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-37020,https://securityvulnerability.io/vulnerability/CVE-2024-37020,Unexpected Behavior in Intel DSA for Xeon Processors,"A flaw in the sequence of processor instructions within Intel DSA V1.0 for several Intel Xeon processors can lead to unexpected behavior. This vulnerability may allow an authenticated user with local access to potentially trigger a denial of service, compromising system availability. It is crucial for users of these processors to review relevant security advisories and take appropriate measures to mitigate risks.",Intel,Intel(r) Xeon(r) Processors,4.9,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:00.522Z,0 CVE-2024-22374,https://securityvulnerability.io/vulnerability/CVE-2024-22374,Intel Xeon Processors Vulnerable to Local Access Denial of Service Attack,Insufficient control flow management for some Intel(R) Xeon Processors may allow an authenticated user to potentially enable denial of service via local access.,Intel,Intel(r) Xeon Processors,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:35.501Z,0 CVE-2024-24980,https://securityvulnerability.io/vulnerability/CVE-2024-24980,Privilege Escalation Vulnerability in Intel Xeon Processors,"Certain 3rd, 4th, and 5th Generation Intel Xeon processors are impacted by a vulnerability that may allow a privileged user local access, enabling potential escalation of privileges. This flaw in the protection mechanisms can expose sensitive environments to unauthorized modifications or access, highlighting the need for immediate attention and remediation by administrators.",Intel,"3rd, 4th, And 5th Generation Intel(r) Xeon(r) Processors",6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:28.166Z,0 CVE-2024-25939,https://securityvulnerability.io/vulnerability/CVE-2024-25939,Denial of Service Vulnerability in 3rd Generation Intel Xeon Scalable Processors,"A vulnerability exists in 3rd Generation Intel Xeon Scalable Processors due to mirrored regions with differing values, which may allow a privileged user to potentially exploit this flaw to induce a denial of service condition through local access. This could impact system availability and performance if exploited.",Intel,3rd Generation Intel(r) Xeon(r) Scalable Processors,6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-14T13:45:21.095Z,0 CVE-2024-21823,https://securityvulnerability.io/vulnerability/CVE-2024-21823,Privilege Escalation Vulnerability in Intel DSA and IAA Products,"A vulnerability exists within the hardware logic of Intel DSA and Intel IAA associated with the 4th and 5th generation Xeon processors that can enable an authorized user to engage in privilege escalation. This issue stems from insecure de-synchronization, which may inadvertently facilitate unauthorized access to sensitive system functions. It underscores the importance of applying necessary mitigations to safeguard systems leveraging these Intel technologies.",Intel,Intel(r) Dsa And Intel(r) Iaa For Some Intel(r) 4th Or 5th Generation Xeon(r) Processors,7.5,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-05-16T20:46:57.735Z,0 CVE-2023-22655,https://securityvulnerability.io/vulnerability/CVE-2023-22655,Potential Escalation of Privilege Vulnerability Affecting Intel Processors,"A protection mechanism failure has been identified in certain 3rd and 4th Generation Intel Xeon Processors when utilizing Intel SGX or Intel TDX. This flaw allows users with privileged access to potentially escalate their privileges through local access. As a result, this could lead to unauthorized access to sensitive information or critical resources within an affected system. System administrators and users operating with these processor generations should be vigilant and consider applying updates or mitigations provided by Intel and other affiliated security advisories.",Intel,3rd And 4th Generation Intel(r) Xeon(r) Processors When Using Intel(r) Sgx Or Intel(r) Tdx,6.1,MEDIUM,0.001290000043809414,false,,false,false,false,,,false,false,,2024-03-14T16:45:46.683Z,0 CVE-2023-32666,https://securityvulnerability.io/vulnerability/CVE-2023-32666,Potential Escalation of Privilege via Local Access in Intel(R) SGX or Intel(R) TDX,"The vulnerability allows a privileged user to exploit improper access control in the on-chip debug and test interfaces of specific 4th Generation Intel Xeon Processors. When utilizing Intel Software Guard Extensions (SGX) or Intel Trusted Execution Technology (TDX), this flaw could potentially lead to escalation of privileges through local access. This situation poses a significant security risk, highlighting the importance of monitoring and securing access to sensitive system resources.",Intel,4th Generation Intel(r) Xeon(r) Processors When Using Intel(r) Sgx Or Intel(r) Tdx,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-14T16:45:44.785Z,0 CVE-2023-43490,https://securityvulnerability.io/vulnerability/CVE-2023-43490,Potential Information Disclosure Vulnerability in Intel Xeon D Processors with Intel SGX,A vulnerability exists in some Intel Xeon D processors that utilize Intel Software Guard Extensions (SGX) due to an incorrect calculation in the microcode keying mechanism. This flaw may allow a privileged user with local access to enable the disclosure of sensitive information. The potential for exploited access underscores the need for immediate security measures to protect against unauthorized information retrieval. Users of affected processors should refer to Intel's security advisory for detailed guidance on mitigation.,Intel,Intel(r) Xeon(r) D Processors With Intel(r) Sgx,5.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-03-14T16:45:44.079Z,0 CVE-2023-23908,https://securityvulnerability.io/vulnerability/CVE-2023-23908,Improper Access Control in 3rd Generation Intel Xeon Scalable Processors,"An improper access control vulnerability exists in certain 3rd Generation Intel Xeon Scalable processors. This flaw could potentially be exploited by a privileged user, allowing them to disclose sensitive information through local access methods. It is crucial for users of affected systems to review their access permissions and system configurations to mitigate this risk.",Intel,3rd Generation Intel(r) Xeon(r) Scalable Processors,6,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2023-08-11T03:15:00.000Z,0 CVE-2022-33196,https://securityvulnerability.io/vulnerability/CVE-2022-33196,Privilege Escalation Vulnerability in Intel Xeon Processors,"This vulnerability arises from incorrect default permissions in certain memory controller configurations for specific Intel Xeon processors utilizing Intel Software Guard Extensions. A privileged user can potentially leverage local access to escalate their privileges, posing a security risk for affected systems. It is crucial for users of the affected processors to apply the necessary updates and configurations as recommended by Intel to mitigate this risk.",Intel,Intel(r) Xeon(r) Processors With Intelâ® Software Guard Extensions (sgx),7.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:22.704Z,0 CVE-2022-33972,https://securityvulnerability.io/vulnerability/CVE-2022-33972,Information Disclosure Vulnerability in 3rd Generation Intel Xeon Scalable Processors,A vulnerability exists in the microcode keying mechanism of certain 3rd Generation Intel Xeon Scalable Processors that could allow a privileged user to potentially disclose sensitive information through local access. This flaw emphasizes the importance of ensuring proper access controls and vigilance in security practices when handling sensitive data.,Intel,3rd Generation Intel(r) Xeon(r) Scalable Processors,6.1,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:14.994Z,0 CVE-2022-21216,https://securityvulnerability.io/vulnerability/CVE-2022-21216,Escalation of Privilege in Intel Atom and Xeon Scalable Processors,"The vulnerability in selected models of Intel Atom and Xeon Scalable Processors is rooted in the insufficient granularity of access control mechanisms within their out-of-band management systems. This flaw allows a privileged user to potentially escalate their privileges through adjacent network access, thereby increasing the risk of unauthorized actions or data breaches. Organizations using affected processors should assess their security configurations and implement the recommended patches to mitigate potential risks.",Intel,Intel(r) Atom And Intel Xeon Scalable Processors,7.5,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T19:59:52.954Z,0 CVE-2021-33117,https://securityvulnerability.io/vulnerability/CVE-2021-33117,Improper Access Control in 3rd Generation Intel Xeon Scalable Processors,"Improper access control in certain 3rd Generation Intel Xeon Scalable Processors prior to BIOS version MR7 may lead to unauthorized access, allowing a local attacker to exploit this vulnerability and potentially disclose sensitive information. This flaw highlights the importance of keeping BIOS updated to mitigate security risks.",Intel,Intel(r) Xeon(r) Scalable Processors,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-05-12T16:36:03.000Z,0 CVE-2022-21136,https://securityvulnerability.io/vulnerability/CVE-2022-21136,Improper Input Validation in Intel Xeon Processors,"A vulnerability exists in certain Intel Xeon Processors due to improper input validation. This flaw may allow an unauthorized local user to exploit the vulnerability, potentially enabling a denial of service condition. It emphasizes the importance of strict validation processes to secure privileged operations in computing environments.",Intel,Intel(r) Xeon(r) Processors,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-05-12T16:35:45.000Z,0 CVE-2022-21131,https://securityvulnerability.io/vulnerability/CVE-2022-21131,Improper Access Control in Intel Xeon Processors,An improper access control vulnerability exists in certain Intel Xeon processors that may allow an authenticated user to disclose sensitive information through local access. This could potentially compromise system integrity and data confidentiality if exploited.,Intel,Intel(r) Xeon(r) Processors,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-05-12T16:35:44.000Z,0