cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-28693,https://securityvulnerability.io/vulnerability/CVE-2022-28693,Information Disclosure Vulnerability in Intel Processors,"Certain Intel processors have a vulnerability that exposes an unprotected alternative channel of return branch target prediction. This flaw may allow authorized users with local access to exploit the vulnerability, potentially leading to unauthorized information disclosure. It is advisable for users to implement updated security measures as recommended in Intel's security advisory.",Intel,Intel(r) Processors,4.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-14T20:50:54.450Z,0 CVE-2022-26083,https://securityvulnerability.io/vulnerability/CVE-2022-26083,Weak Initialization Vector in Intel IPP Cryptography Library,"The Intel IPP Cryptography software library prior to version 2021.5 exhibits a vulnerability due to the generation of weak initialization vectors. This issue allows an unauthorized user with local access to potentially exploit this weakness, leading to information disclosure. It emphasizes the importance of using updated versions of the library to mitigate risks associated with security vulnerabilities.",Intel,Intel(r) Ipp Cryptography Software Library,7.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-14T20:41:27.084Z,0 CVE-2024-41168,https://securityvulnerability.io/vulnerability/CVE-2024-41168,Use After Free Vulnerability in Intel PROSet/Wireless WiFi & Killer WiFi Software for Windows,"There is a vulnerability present in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows prior to version 23.80. This flaw arises from a use after free condition, which could allow an unauthenticated user to trigger a denial of service by exploiting adjacent access. Users should ensure they update their software to the latest version to mitigate potential risks.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:58:41.096Z,0 CVE-2024-31068,https://securityvulnerability.io/vulnerability/CVE-2024-31068,Denial of Service Vulnerability in Intel Processors,"A vulnerability exists in certain Intel processors due to improper configuration of Finite State Machines (FSMs). This flaw allows a privileged user to potentially exploit the configuration, leading to a denial of service condition through local access. Such an attack could disrupt system operations and availability, making it crucial for users and organizations to assess their systems and apply necessary mitigations.",Intel,Intel(r) Processors,5.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:23.660Z,0 CVE-2024-36262,https://securityvulnerability.io/vulnerability/CVE-2024-36262,Race Condition Vulnerability in Intel System Security Report Firmware,"A race condition exists in the Intel System Security Report and System Resources Defense firmware that may allow a privileged user to exploit local access vulnerabilities. This flaw can potentially enable an escalation of privilege, posing a risk to the integrity of affected systems. Users are advised to assess their systems and apply any available patches to mitigate the risk associated with this vulnerability.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.6,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:22.087Z,0 CVE-2023-49618,https://securityvulnerability.io/vulnerability/CVE-2023-49618,Privilege Escalation Vulnerability in Intel System Security Report and Firmware,Improper buffer restrictions found in specific firmware associated with Intel System Security Report and System Resources Defense can potentially allow a privileged user to escalate their privileges through local access. This vulnerability raises concerns regarding system integrity and unauthorized access. Users should ensure their systems are updated to mitigate any risks associated with these firmware issues.,Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:20.502Z,0 CVE-2023-49615,https://securityvulnerability.io/vulnerability/CVE-2023-49615,Input Validation Flaw in Intel System Security Products,"An improper input validation vulnerability present in the Intel System Security Report and System Resources Defense firmware can be exploited by a privileged user. This flaw may enable the user to escalate privileges via local access, compromising the security integrity of the affected systems. Ensuring proper input validation and robust security measures is crucial to prevent exploitation of this vulnerability.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:18.920Z,0 CVE-2023-49603,https://securityvulnerability.io/vulnerability/CVE-2023-49603,Race Condition Vulnerability in Intel System Security Report Software,"A race condition vulnerability exists in Intel System Security Report and System Resources Defense firmware, which may allow a privileged user to exploit local access for escalating their privileges. This flaw could potentially result in unauthorized access to sensitive system functionalities and data, emphasizing the need for vigilance in firmware security management.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:17.394Z,0 CVE-2023-48366,https://securityvulnerability.io/vulnerability/CVE-2023-48366,Race Condition Vulnerability in Intel System Security Report and Resources Defense Firmware,"A race condition vulnerability exists in specific firmware components of Intel's System Security Report and System Resources Defense. This flaw permits a privileged user to potentially access sensitive information through local means, creating avenues for information disclosure that could compromise system integrity.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,5.6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:15.785Z,0 CVE-2023-48267,https://securityvulnerability.io/vulnerability/CVE-2023-48267,Privilege Escalation Vulnerability in Intel System Security Report Firmware,"A vulnerability exists in Intel's System Security Report and System Resources Defense firmware due to improper buffer restrictions. This flaw may allow a privileged user to escalate privileges via local access, potentially compromising the system's integrity and security. Prompt attention and updates to the affected firmware products are recommended to mitigate this risk.",Intel,Intel(r) System Security Report And System Resources Defense Firmware,8.6,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:14.271Z,0 CVE-2024-36293,https://securityvulnerability.io/vulnerability/CVE-2024-36293,Improper Access Control Vulnerability in Intel SGX-Enabled Processors,"The vulnerability arises from improper access control in the EDECCSSA user leaf function of certain Intel SGX-enabled processors. This flaw could potentially allow an authenticated user to wreak havoc by enabling a denial of service condition through local access. As a result, systems using these processors may become unresponsive or experience degradation in performance. It's crucial for users to be aware of this vulnerability and to apply any patches or mitigations recommended by Intel to protect their systems.",Intel,Intel(r) Processors With Intel(r) Sgx,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:12.658Z,0 CVE-2024-39271,https://securityvulnerability.io/vulnerability/CVE-2024-39271,Improper Communication Channel Restrictions in Intel WiFi Software,"A vulnerability exists in some versions of Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software prior to version 23.80 due to improper restrictions on communication channels. This flaw may allow an unauthenticated user within proximity to potentially exploit the issue, leading to information disclosure risks. Organizations using affected software should apply the necessary updates to mitigate potential exploitation.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software,2,LOW,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:11.056Z,0 CVE-2024-36285,https://securityvulnerability.io/vulnerability/CVE-2024-36285,Race Condition Vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi Software for Windows,"A race condition exists in the Intel PROSet/Wireless WiFi and Killer WiFi software for Windows, allowing an authenticated user to exploit this flaw. By leveraging local access, the user may induce a denial of service, which could disrupt normal operations. It is crucial for users to update to the latest version (23.80 or later) to mitigate potential risks associated with this vulnerability. For more detailed information, please refer to the advisory at Intel's security center.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,5.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:09.346Z,0 CVE-2024-41166,https://securityvulnerability.io/vulnerability/CVE-2024-41166,Stack-Based Buffer Overflow Vulnerability in Intel Wireless Software,"A vulnerability exists in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows, where a stack-based buffer overflow can be exploited by an unauthenticated user. This flaw may allow adjacent attackers to execute a denial of service attack, potentially disrupting network connectivity for affected devices. All users of versions prior to 23.80 are advised to upgrade to mitigate this issue.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:07.730Z,0 CVE-2024-40887,https://securityvulnerability.io/vulnerability/CVE-2024-40887,Race Condition Vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi Software for Windows,"A race condition within the Intel PROSet/Wireless WiFi and Killer WiFi software for Windows can be exploited by an unauthenticated user to potentially cause a denial of service. This vulnerability appears in versions prior to 23.80, making it essential for users to update their software to mitigate the risk of exploitation. Detailed insights and guidance on addressing this issue can be found in the advisory available on Intel's official security center.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:06.116Z,0 CVE-2024-39606,https://securityvulnerability.io/vulnerability/CVE-2024-39606,Input Validation Flaw in Intel PROSet/Wireless WiFi Software,"An improper input validation vulnerability in Intel's PROSet/Wireless WiFi and Killer WiFi software for Windows prior to version 23.80 may allow an unauthenticated attacker to exploit the flaw. This could potentially lead to a denial of service condition by gaining adjacent access to the system, disrupting its normal functionality and impacting user experience. Users are recommended to update to the latest version to mitigate this risk. For more detailed information, refer to the advisory from Intel.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:04.502Z,0 CVE-2024-39356,https://securityvulnerability.io/vulnerability/CVE-2024-39356,NULL Pointer Dereference in Intel PROSet/Wireless WiFi and Killer WiFi Software,"A NULL pointer dereference vulnerability exists in the Intel PROSet/Wireless WiFi and Killer WiFi software for Windows, which can be exploited by unauthenticated users within adjacent access. This issue allows attackers to potentially cause a denial of service condition, affecting the availability of the software. Users are advised to update to version 23.80 or later to mitigate this risk.",Intel,Intel(r) Proset/wireless Wifi And Killer(tm) Wifi Software For Windows,7.1,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:02.928Z,0 CVE-2024-37020,https://securityvulnerability.io/vulnerability/CVE-2024-37020,Unexpected Behavior in Intel DSA for Xeon Processors,"A flaw in the sequence of processor instructions within Intel DSA V1.0 for several Intel Xeon processors can lead to unexpected behavior. This vulnerability may allow an authenticated user with local access to potentially trigger a denial of service, compromising system availability. It is crucial for users of these processors to review relevant security advisories and take appropriate measures to mitigate risks.",Intel,Intel(r) Xeon(r) Processors,4.9,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:20:00.522Z,0 CVE-2024-39365,https://securityvulnerability.io/vulnerability/CVE-2024-39365,Uncontrolled Path Vulnerability in Intel DPC++/C++ Compiler for Windows,"The Intel oneAPI DPC++/C++ Compiler for Windows has a vulnerability that allows authenticated users to manipulate search paths, potentially enabling privilege escalation through local system access. This security flaw affects versions prior to 2024.2, and users are advised to update their software to mitigate risks. For detailed information, consult Intel's security advisory.",Intel Corporation,Intel(r) Oneapi Dpc++/c++ Compiler Software For Windows,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:58.974Z,0 CVE-2024-42405,https://securityvulnerability.io/vulnerability/CVE-2024-42405,Escalation of Privilege Vulnerability in Intel Quartus Prime Software,"An uncontrolled search path vulnerability exists in Intel Quartus Prime Software versions prior to 23.1.1 Patch 1.01std. This flaw may allow an authenticated user with local access to manipulate system resources, potentially leading to escalation of privilege. It highlights the importance of strict validation checks in configuring paths to ensure that only authorized paths are utilized, safeguarding against unauthorized access and potential compromise of system integrity.",Intel,Intel(r) Quartus(r) Prime Software,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:57.317Z,0 CVE-2024-36283,https://securityvulnerability.io/vulnerability/CVE-2024-36283,Uncontrolled Search Path Vulnerability in Intel Thread Director Visualizer Software,"The Intel Thread Director Visualizer software prior to version 1.0.1 contains an uncontrolled search path vulnerability. This flaw permits authenticated users to exploit local access to potentially escalate privileges. This can lead to unanticipated behaviors or unauthorized access to sensitive areas of the system, making it essential for users to update to the latest version to ensure security.",Intel,Intel(r) Thread Director Visualizer Software,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:55.715Z,0 CVE-2024-32941,https://securityvulnerability.io/vulnerability/CVE-2024-32941,NULL Pointer Dereference in Intel MLC Software Vulnerability,"A NULL pointer dereference vulnerability exists in Intel MLC Software prior to version v3.11b. This issue allows an authenticated user with local access to trigger a potential denial of service situation, impacting system availability. Users are advised to update to the latest version to mitigate this risk. For more details, refer to the advisory from Intel.",Intel,Intel(r) Mlc Software,6.9,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:54.183Z,0 CVE-2024-47006,https://securityvulnerability.io/vulnerability/CVE-2024-47006,Privilege Escalation Vulnerability in Intel RealSense D400 Series UWP Driver,"The Intel RealSense D400 Series Universal Windows Platform (UWP) Driver for Windows 10 is susceptible to a vulnerability that could allow an authenticated user to escalate privileges through local access. This flaw stems from an uncontrolled search path which may be exploited to gain unauthorized access to sensitive system functionalities, presenting a significant risk in environments where user permissions are mismanaged.",Intel,Intel(r) Realsense D400 Series,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:52.591Z,0 CVE-2024-39805,https://securityvulnerability.io/vulnerability/CVE-2024-39805,Escalation of Privilege Vulnerability in Intel DSA Software,"A critical security issue has been identified in Intel DSA software, which prior to version 23.4.39 exhibits insufficient verification of data authenticity. This vulnerability permits an authenticated user to potentially escalate their privileges with local access, thereby posing significant security risks. It is crucial for users to update to the latest version to mitigate any potential threats stemming from this issue. More detailed information is available in the official Intel advisory.",Intel,Intel(r) Dsa Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:51.039Z,0 CVE-2024-32942,https://securityvulnerability.io/vulnerability/CVE-2024-32942,Privilege Escalation Risk in Intel DSA Installer for Windows,"The Intel DSA Installer for Windows before version 24.2.19.5 has a vulnerability stemming from incorrect default permissions. This flaw may enable an authenticated user to exploit local access to potentially escalate privileges, exposing the system to further risks. Users are advised to update to the latest version to mitigate this issue.",Intel,Intel(r) Dsa Installer For Windows,5.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T21:19:49.430Z,0