cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-26083,https://securityvulnerability.io/vulnerability/CVE-2022-26083,Weak Initialization Vector in Intel IPP Cryptography Library,"The Intel IPP Cryptography software library prior to version 2021.5 exhibits a vulnerability due to the generation of weak initialization vectors. This issue allows an unauthorized user with local access to potentially exploit this weakness, leading to information disclosure. It emphasizes the importance of using updated versions of the library to mitigate risks associated with security vulnerabilities.",Intel,Intel(r) Ipp Cryptography Software Library,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-14T20:41:27.084Z,0 CVE-2024-41168,https://securityvulnerability.io/vulnerability/CVE-2024-41168,Use After Free Vulnerability in Intel PROSet/Wireless WiFi & Killer WiFi Software for Windows,"There is a vulnerability present in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows prior to version 23.80. This flaw arises from a use after free condition, which could allow an unauthenticated user to trigger a denial of service by exploiting adjacent access. Users should ensure they update their software to the latest version to mitigate potential risks.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:58:41.096Z,0 CVE-2024-36262,https://securityvulnerability.io/vulnerability/CVE-2024-36262,Race Condition Vulnerability in Intel System Security Report Firmware,"A race condition exists in the Intel System Security Report and System Resources Defense firmware that may allow a privileged user to exploit local access vulnerabilities. This flaw can potentially enable an escalation of privilege, posing a risk to the integrity of affected systems. Users are advised to assess their systems and apply any available patches to mitigate the risk associated with this vulnerability.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.6,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:22.087Z,0 CVE-2023-49618,https://securityvulnerability.io/vulnerability/CVE-2023-49618,Privilege Escalation Vulnerability in Intel System Security Report and Firmware,Improper buffer restrictions found in specific firmware associated with Intel System Security Report and System Resources Defense can potentially allow a privileged user to escalate their privileges through local access. This vulnerability raises concerns regarding system integrity and unauthorized access. Users should ensure their systems are updated to mitigate any risks associated with these firmware issues.,Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:20.502Z,0 CVE-2023-49615,https://securityvulnerability.io/vulnerability/CVE-2023-49615,Input Validation Flaw in Intel System Security Products,"An improper input validation vulnerability present in the Intel System Security Report and System Resources Defense firmware can be exploited by a privileged user. This flaw may enable the user to escalate privileges via local access, compromising the security integrity of the affected systems. Ensuring proper input validation and robust security measures is crucial to prevent exploitation of this vulnerability.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:18.920Z,0 CVE-2023-49603,https://securityvulnerability.io/vulnerability/CVE-2023-49603,Race Condition Vulnerability in Intel System Security Report Software,"A race condition vulnerability exists in Intel System Security Report and System Resources Defense firmware, which may allow a privileged user to exploit local access for escalating their privileges. This flaw could potentially result in unauthorized access to sensitive system functionalities and data, emphasizing the need for vigilance in firmware security management.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:17.394Z,0 CVE-2023-48267,https://securityvulnerability.io/vulnerability/CVE-2023-48267,Privilege Escalation Vulnerability in Intel System Security Report Firmware,"A vulnerability exists in Intel's System Security Report and System Resources Defense firmware due to improper buffer restrictions. This flaw may allow a privileged user to escalate privileges via local access, potentially compromising the system's integrity and security. Prompt attention and updates to the affected firmware products are recommended to mitigate this risk.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.6,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:14.271Z,0 CVE-2024-39356,https://securityvulnerability.io/vulnerability/CVE-2024-39356,NULL Pointer Dereference in Intel PROSet/Wireless WiFi and Killer WiFi Software,"A NULL pointer dereference vulnerability exists in the Intel PROSet/Wireless WiFi and Killer WiFi software for Windows, which can be exploited by unauthenticated users within adjacent access. This issue allows attackers to potentially cause a denial of service condition, affecting the availability of the software. Users are advised to update to version 23.80 or later to mitigate this risk.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:02.928Z,0 CVE-2024-39805,https://securityvulnerability.io/vulnerability/CVE-2024-39805,Escalation of Privilege Vulnerability in Intel DSA Software,"A critical security issue has been identified in Intel DSA software, which prior to version 23.4.39 exhibits insufficient verification of data authenticity. This vulnerability permits an authenticated user to potentially escalate their privileges with local access, thereby posing significant security risks. It is crucial for users to update to the latest version to mitigate any potential threats stemming from this issue. More detailed information is available in the official Intel advisory.",Intel,Intel(r) Dsa Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:51.039Z,0 CVE-2023-31276,https://securityvulnerability.io/vulnerability/CVE-2023-31276,Heap-Based Buffer Overflow Vulnerability in Intel Server Boards,"A heap-based buffer overflow vulnerability exists in the BMC Firmware affecting several Intel Server Boards, allowing a privileged user to exploit this flaw to escalate privileges through local access. This presents significant security risks for systems running affected versions, as it can be leveraged by attackers with physical or local access to gain unauthorized control over the affected systems.",Intel,"Intel(r) Server Board S2600wf, Intel(r) Server Board S2600st, Intel(r) Server Board S2600bp, Intel(r) Server Board M50cyp And Intel(r) Server Board D50tnp",8.4,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:40.934Z,0 CVE-2024-28127,https://securityvulnerability.io/vulnerability/CVE-2024-28127,Privileged Access Vulnerability in Intel UEFI Firmware,"A vulnerability in the UEFI firmware for various Intel processors has been identified, allowing a privileged user with local access to bypass certain security mechanisms. This issue arises from improper input validation, which could potentially be exploited to escalate privileges. Intel has acknowledged the problem, emphasizing the importance of securing UEFI firmware to protect against unauthorized access and control.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:31.374Z,0 CVE-2024-29214,https://securityvulnerability.io/vulnerability/CVE-2024-29214,Input Validation Flaw in UEFI Firmware for Intel Processors,"An improper input validation vulnerability exists in the UEFI firmware, specifically within the CseVariableStorageSmm component for several Intel processors. This flaw could allow a privileged user to exploit local access conditions, leading to a potential escalation of privileges, thereby compromising system security. It is crucial for users and administrators to review their Intel firmware versions and apply any necessary security updates to mitigate the risks associated with this vulnerability.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:29.642Z,0 CVE-2024-24582,https://securityvulnerability.io/vulnerability/CVE-2024-24582,Privilege Escalation Vulnerability in UEFI Firmware for Intel Processors,"A vulnerability exists in the XmlCli feature of the UEFI firmware associated with certain Intel processors, which stems from improper input validation. This flaw could allow a privileged user with local access to potentially escalate their privileges, posing a risk of unauthorized access and control over system resources. It is essential for users to apply the recommended updates and mitigations provided by Intel to safeguard against potential exploitation.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:27.722Z,0 CVE-2023-34440,https://securityvulnerability.io/vulnerability/CVE-2023-34440,Improper Input Validation in UEFI Firmware for Intel Processors,"A vulnerability has been identified in the UEFI firmware of certain Intel processors. This flaw arises from improper input validation, potentially allowing a privileged user with local access to escalate their privileges. The implications of this vulnerability highlight significant security challenges in managing firmware integrity, as it could lead to unauthorized control over system resources. Timely updates and security patches are essential for safeguarding against potential exploitation.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:25.772Z,0 CVE-2023-43758,https://securityvulnerability.io/vulnerability/CVE-2023-43758,Improper Input Validation in UEFI Firmware for Intel Processors,"An improper input validation issue in the UEFI firmware for several Intel processors may enable a local privileged user to escalate privileges. This vulnerability poses a potential security risk, allowing unauthorized access to elevated privileges, which could lead to further exploitation of the system. It is critical for users and administrators to review the affected systems and apply necessary mitigations as outlined in the Intel security advisory.",Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:24.119Z,0 CVE-2024-38307,https://securityvulnerability.io/vulnerability/CVE-2024-38307,Improper Input Validation in Intel Manageability Firmware,"The firmware for certain versions of Intel AMT and Intel Standard Manageability is susceptible to an improper input validation issue. This vulnerability may allow an authenticated user to exploit the system, potentially leading to a denial of service through network access. It is crucial for users to apply any recommended updates to mitigate this risk effectively.",Intel,Intel(r) Amt And Intel(r) Standard Manageability,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:19.293Z,0 CVE-2024-31155,https://securityvulnerability.io/vulnerability/CVE-2024-31155,Improper Buffer Restrictions in UEFI Firmware for Intel Processors,Improper buffer restrictions in the UEFI firmware for certain Intel processors could potentially allow a locally authenticated user to escalate their privileges. This vulnerability highlights the critical need for monitoring and updating firmware to safeguard against local access attacks that may exploit these weaknesses.,Intel,Intel(r) Processors,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:16.141Z,0 CVE-2024-36274,https://securityvulnerability.io/vulnerability/CVE-2024-36274,Out-of-Bounds Write Vulnerability in Intel Ethernet Driver,"An out-of-bounds write vulnerability exists in the Intel 800 Series Ethernet Driver for Intel Ethernet Adapter Complete Driver Pack versions before 29.1. This flaw may allow an unauthenticated user to trigger a denial of service condition through adjacent access, impacting system stability and functionality. Immediate attention is recommended to mitigate potential risks associated with this vulnerability.",Intel,Intel(r) 800 Series Ethernet Driver For Intel(r) Ethernet Adapter Complete Driver Pack,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:11.420Z,0 CVE-2024-37355,https://securityvulnerability.io/vulnerability/CVE-2024-37355,Access Control Flaw in Intel Graphics Software,"A vulnerability exists within Intel Graphics Software that can potentially allow an authenticated user to escalate privileges due to improper access control. This flaw could facilitate unauthorized actions, impacting the security and integrity of systems utilizing this software. It is essential for users and administrators to assess their security posture and ensure that they are operating with the latest security updates to mitigate associated risks.",Intel,Intel(r) Graphics Software,8.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:18:47.198Z,0 CVE-2024-31858,https://securityvulnerability.io/vulnerability/CVE-2024-31858,Out-of-Bounds Write Vulnerability in Intel QuickAssist Technology Software,"An out-of-bounds write vulnerability in Intel QuickAssist Technology software prior to version 2.2.0 allows authenticated users with local access to potentially escalate their privileges, posing significant security risks. This vulnerability exploits memory handling errors, enabling unauthorized operations within the system.",Intel,Intel(r) Quickassist Technology Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:16:05.753Z,0 CVE-2024-36253,https://securityvulnerability.io/vulnerability/CVE-2024-36253,Uncontrolled Search Path May Allow Escalation of Privilege,"The Intel SDP Tool for Windows is susceptible to an uncontrolled search path vulnerability, which may allow an authenticated user to exploit local access for privilege escalation. This issue arises from a failure to properly restrict the paths from which executable files may be loaded, potentially enabling unauthorized actions within the software environment.",Intel,Server Debug And Provisioning Tool,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-13T21:15:00.000Z,0 CVE-2024-36276,https://securityvulnerability.io/vulnerability/CVE-2024-36276,Potential Escalation of Privilege via Local Access,"Certain versions of Intel CIP software enable insecure inherited permissions, which may permit an authenticated user to escalate privileges through local access. This vulnerability could be exploited, allowing a potential attacker to gain unauthorized access to critical system functions. It is essential for users to update to the latest version to mitigate this risk.",Intel,Computing Improvement Program,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-13T21:15:00.000Z,0 CVE-2024-36294,https://securityvulnerability.io/vulnerability/CVE-2024-36294,Potential Escalation of Privilege via Local Access,"The vulnerability found in Intel DSA software prior to version 24.3.26.8 involves insecure inherited permissions that may allow an authenticated user with local access to escalate their privileges. This flaw could potentially lead to unauthorized actions within the affected systems, posing a significant risk to the integrity of applications utilizing the software.",Intel,Driver \& Support Assistant,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-13T21:15:00.000Z,0 CVE-2024-35201,https://securityvulnerability.io/vulnerability/CVE-2024-35201,Potential Escalation of Privilege Vulnerability in Intel SDP Tool,"The Intel SDP Tool for Windows software contains incorrect default permissions across all versions, which may permit an authenticated user to escalate their privileges through local access. This vulnerability poses a risk as it could allow unauthorized actions to be performed by users with restricted credentials, potentially compromising the system's integrity.",Intel,Server Debug And Provisioning Tool,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-13T21:15:00.000Z,0 CVE-2024-38383,https://securityvulnerability.io/vulnerability/CVE-2024-38383,Uncontrolled Search Path May Lead to Privilege Escalation,"The Intel Quartus Prime Pro Edition software for Windows, prior to version 24.2, contains an uncontrolled search path vulnerability that could be exploited by authenticated users. This flaw permits local access, potentially allowing attackers to escalate privileges on the affected system. It is crucial for users to update their software to mitigate potential security risks.",Intel,Quartus Prime,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-13T21:15:00.000Z,0