cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-35191,https://securityvulnerability.io/vulnerability/CVE-2023-35191,Potential Denial of Service Vulnerability in Intel SPS Firmware,"A vulnerability exists in certain versions of Intel SPS Firmware that can be exploited by a privileged user through network access. This exploitation could lead to uncontrolled resource consumption, negatively impacting system performance and availability. Organizations utilizing affected Intel SPS Firmware should be aware of the potential for denial of service attacks and take necessary precautions to mitigate risks associated with this vulnerability.",Intel,Intel(r) Sps Firmware Versions,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-14T16:45:47.845Z,0 CVE-2023-28396,https://securityvulnerability.io/vulnerability/CVE-2023-28396,Access Control Vulnerability in Intel Thunderbolt Controllers,"The vulnerability involves improper access control in the firmware of certain Intel Thunderbolt Controllers, specifically those released prior to version 41. This security flaw allows a privileged user to potentially exploit the affected controllers to enable a denial of service condition via local access. Thus, users and organizations utilizing these devices should be aware of the risks associated with this vulnerability and consider mitigation strategies to safeguard their systems. For detailed information, refer to Intel's advisory.",Intel,Intel(r) Thunderbol(tm) Controllers Versions,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T13:37:49.980Z,0 CVE-2023-28378,https://securityvulnerability.io/vulnerability/CVE-2023-28378,Improper Authorization in Intel QAT Drivers for Windows,"An improper authorization vulnerability exists in the Intel QuickAssist Technology (QAT) drivers for Windows, specifically in versions prior to 2.0.4. This issue may allow an authenticated user to escalate their privileges through local access capabilities, potentially compromising the system's security integrity.",Intel,Intel(R) QAT drivers for Windows - HW Version 2.0,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-28741,https://securityvulnerability.io/vulnerability/CVE-2023-28741,Buffer Overflow Vulnerability in Intel QAT Drivers for Windows,"A buffer overflow vulnerability has been identified in certain Intel QAT drivers for Windows, specifically in HW Version 1.0 prior to version 1.10. This vulnerability allows an authenticated user to potentially escalate privileges through local access, making it crucial for organizations using affected versions to apply security updates promptly. Keeping drivers updated mitigates the risk associated with this vulnerability, ensuring system integrity and safeguarding against unauthorized access.",Intel,Intel(R) QAT drivers for Windows - HW Version 1.0,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-28740,https://securityvulnerability.io/vulnerability/CVE-2023-28740,Uncontrolled Search Path Vulnerability in Intel QAT Drivers for Windows,"The vulnerability results from an uncontrolled search path element in certain versions of Intel's QAT drivers for Windows, specifically those prior to version 2.0.4. This flaw allows an authenticated user to potentially escalate their privileges on the system by exploiting local access. As such, it poses a risk for users operating under these affected driver versions, highlighting the need for immediate updates to ensure system integrity.",Intel,Intel(r) Qat Drivers For Windows - Hw Version 2.0,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-32663,https://securityvulnerability.io/vulnerability/CVE-2023-32663,Escalation of Privilege Vulnerability in Intel RealSense SDK,"In version 2.53.1 of Intel RealSense SDK, incorrect default permissions could allow an authenticated user to gain elevated privileges through local access. This flaw presents potential risks to system integrity, enabling unauthorized actions by users with limited access rights.",Intel,Intel(r) Realsense(tm) Sdks In Version 2.53.1,6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-08-11T03:15:00.000Z,0 CVE-2022-41342,https://securityvulnerability.io/vulnerability/CVE-2022-41342,Improper Buffer Restrictions in Intel(R) C++ Compiler Classic,"The Intel(R) C++ Compiler Classic has a flaw related to inadequate buffer restrictions that affects versions prior to 2021.7.1. This vulnerability allows privileged users, with local access to a system, to potentially escalate their privileges. Users of the Intel(R) oneAPI Toolkits, specifically those on any version before 2022.3.1, are also at risk. It is crucial for organizations utilizing these tools to apply the necessary updates and mitigate risks to their systems to avoid potential exploitation.",Intel,Intel(r) C++ Compiler Classic Before Version 2021.7.1 For Some Intel(r) Oneapi Toolkits,6,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-06T18:58:01.852Z,0 CVE-2022-38136,https://securityvulnerability.io/vulnerability/CVE-2022-38136,Privilege Escalation Vulnerability in Intel Compilers for Windows,"An uncontrolled search path vulnerability exists in the Intel oneAPI DPC++/C++ Compiler and Intel Fortran Compiler for Windows prior to version 2022.2.1, as well as in certain Intel oneAPI Toolkits before version 2022.3.1. This vulnerability may allow an authenticated user to escalate privileges through local access, potentially compromising system integrity and security.",Intel,Intel(r) Oneapi Dpc++/c++ Compiler For Windows And Intelâ® Fortran Compiler For Windows Before Version 2022.2.1 For Some Intel(r) Oneapi Toolkits,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-06T18:58:01.340Z,0 CVE-2022-29507,https://securityvulnerability.io/vulnerability/CVE-2022-29507,Insufficiently Protected Credentials in Intel Team Blue Mobile Application,"The Intel Team Blue mobile application is susceptible to a vulnerability due to insufficiently protected credentials. This flaw allows an authenticated user to gain access to sensitive information through local access, potentially compromising user data. It is critical for users to remain aware of this issue and take necessary precautions to safeguard their information.",Intel,Version,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T19:59:44.000Z,0 CVE-2022-30296,https://securityvulnerability.io/vulnerability/CVE-2022-30296,Insufficient Credential Protection in Intel Datacenter Group Event iOS Application,"The Intel Datacenter Group Event iOS application has a vulnerability due to insufficiently protected credentials. This flaw may enable an unauthorized user to gain access and potentially disclose sensitive information via network access. All versions of the application are impacted, posing risks to user data security and privacy.",Intel,Version,7.5,HIGH,0.001500000013038516,false,,false,false,false,,,false,false,,2022-08-18T19:59:24.000Z,0 CVE-2022-26374,https://securityvulnerability.io/vulnerability/CVE-2022-26374,Uncontrolled Search Path in Intel SEAPI Installation Binaries,"The installation binaries for Intel SEAPI are vulnerable due to an uncontrolled search path issue. This flaw may allow an authenticated user with local access to escalate their privileges, potentially leading to unauthorized actions within the system. It is crucial for organizations leveraging Intel SEAPI to assess their security posture and apply necessary updates to mitigate this vulnerability. For detailed information, refer to the advisory provided by Intel.",Intel,Version,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T19:59:11.000Z,0 CVE-2022-26344,https://securityvulnerability.io/vulnerability/CVE-2022-26344,Privilege Escalation Vulnerability in Intel SEAPI Installers,"The Intel SEAPI contains incorrect default permissions in its installation binaries, which could allow an authenticated user to escalate their privileges through local access. This vulnerability can compromise system integrity and enable unauthorized actions on affected systems. Users are urged to review their installations and apply necessary mitigations to safeguard against potential exploits.",Intel,Version,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T19:58:58.000Z,0 CVE-2022-26844,https://securityvulnerability.io/vulnerability/CVE-2022-26844,Insufficiently Protected Credentials in Intel SEAPI Installation Binaries,"The installation binaries for Intel SEAPI across all versions expose credentials that are inadequately protected. This flaw can be exploited by an authenticated user who has local access, potentially leading to unauthorized escalation of privileges. It is crucial for users and administrators to ensure remediation of this vulnerability to prevent compromise of system integrity.",Intel,Version,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T19:58:27.000Z,0 CVE-2022-25841,https://securityvulnerability.io/vulnerability/CVE-2022-25841,Escalation of Privilege Vulnerability in Intel Datacenter Group Event Android Application,"An uncontrolled search path vulnerability exists in the Intel Datacenter Group Event Android application, impacting all versions. This issue may allow an authenticated user to exploit the application's search path configuration, potentially enabling unauthorized escalation of privileges through local access. Users should be aware of the security risks associated with this vulnerability and implement necessary precautions to protect their systems.",Intel,Version,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T19:56:28.000Z,0 CVE-2022-25999,https://securityvulnerability.io/vulnerability/CVE-2022-25999,Privilege Escalation Vulnerability in Intel Enpirion Digital Power Configurator,"The Intel Enpirion Digital Power Configurator GUI software contains a vulnerability that could be exploited by an authenticated user to escalate privileges locally. This issue stems from an uncontrolled search path element which may allow unauthorized access to sensitive system resources, potentially compromising the integrity of the system. It is crucial for users to ensure they are aware of this vulnerability and apply necessary mitigations as outlined in Intel's advisory.",Intel,Version,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-08-18T19:56:15.000Z,0 CVE-2021-33166,https://securityvulnerability.io/vulnerability/CVE-2021-33166,Information Disclosure Vulnerability in Intel RXT for Chromebook Application,"The Intel RXT for Chromebook application has an incorrect default permission configuration that may allow authenticated users to access sensitive information through local means. This flaw could lead to unauthorized disclosure of data, posing a security risk for users. Ensuring the application is up to date and properly configured is essential to mitigate potential exposure.",Intel,Version,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-09T22:04:46.000Z,0 CVE-2021-33107,https://securityvulnerability.io/vulnerability/CVE-2021-33107,Insufficiently Protected Credentials in Intel AMT SDK and SCS Products,"The vulnerability is linked to insufficient security measures in USB provisioning processes for several Intel products, including the Intel AMT SDK, Intel SCS, and Intel MEBx. An unauthenticated user with physical access to these systems may exploit this weakness to gain unauthorized access, potentially leading to the disclosure of sensitive information. This flaw reinforces the need for robust security protocols in hardware management systems.",Intel,"Intel(r) Amt Sdk Before Version 16.0.3, Intel(r) Scs Before Version 12.2 And Intel(r) Mebx",4.6,MEDIUM,0.0007399999885819852,false,,false,false,false,,,false,false,,2022-02-09T22:04:36.000Z,0 CVE-2021-33058,https://securityvulnerability.io/vulnerability/CVE-2021-33058,Improper Access Control in Intel Administrative Tools for Network Adapters,The vulnerability exists due to improper access control in the installer of Intel Administrative Tools for Intel Network Adapters for Windows prior to version 1.4.0.21. This flaw may allow an attacker with local access to a system to escalate privileges and potentially gain unauthorized access to sensitive resources.,Intel,Version,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-11-17T19:11:16.000Z,0 CVE-2021-0083,https://securityvulnerability.io/vulnerability/CVE-2021-0083,Improper Input Validation in Intel Optane PMem Software,Improper input validation found in Intel Optane Persistent Memory software prior to version 1.2.0.5446 and 2.2.0.1547 can potentially enable a privileged user to conduct a denial of service attack through local access. This flaw heightens security risks and underscores the need for prompt software updates to mitigate potential exploitation. Users are encouraged to upgrade to the latest versions to ensure system integrity and protect their data.,Intel,Intel(r) Optane(tm) Pmem Versions,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-08-11T12:47:55.000Z,0 CVE-2021-0106,https://securityvulnerability.io/vulnerability/CVE-2021-0106,Privilege Escalation Risk in Intel Optane DC Persistent Memory Software,"The Intel Optane DC Persistent Memory for Windows software suffers from incorrect default permissions, which may allow an authenticated user to increase privileges through local access. This vulnerability can lead to unauthorized access to sensitive parts of the system, making it crucial for administrators to apply the latest updates available to mitigate potential risks.",Intel,Intel(r) Optane(tm) Dc Persistent Memory For Windows Software Versions,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T19:13:01.000Z,0 CVE-2021-0100,https://securityvulnerability.io/vulnerability/CVE-2021-0100,Escalation of Privilege in Intel SSD Data Center Tool by Intel,"The Intel SSD Data Center Tool has been identified with a vulnerability related to incorrect default permissions in its installer. This issue affects versions downloaded prior to the end of 2020 and allows an authenticated user to exploit the system via local access. This could potentially allow for elevating privileges, posing a risk to the integrity and security of affected environments. It is essential for users to review the security measures in place and update to a patched version to mitigate this risk.",Intel,"Intel(r) Ssd Data Center Tool, Versions Downloaded",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T19:12:54.000Z,0 CVE-2021-0051,https://securityvulnerability.io/vulnerability/CVE-2021-0051,Improper Input Validation in Intel SPS Products,"A vulnerability exists in certain Intel SPS versions due to improper input validation. This flaw may allow a privileged user local access to enable a denial of service, potentially disrupting operations.",Intel,Intel(r) Sps Versions,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T19:02:01.000Z,0 CVE-2020-24506,https://securityvulnerability.io/vulnerability/CVE-2020-24506,Out of Bound Read in Intel CSME Affecting Multiple Versions,"An out-of-bounds read vulnerability exists in Intel's CSME subsystem that may allow a privileged user to access sensitive information through local access. This flaw affects multiple Intel CSME versions prior to specified updates, potentially leading to information disclosure if exploited. For detailed information and mitigation steps, refer to Intel's advisory and related security documents.",Intel,Intel(r) Csme Versions,4.4,MEDIUM,0.00046999999904073775,false,,false,false,false,,,false,false,,2021-06-09T18:48:44.000Z,0 CVE-2020-8703,https://securityvulnerability.io/vulnerability/CVE-2020-8703,Buffer Restriction Flaw in Intel CSME Products,"An improper buffer restriction issue exists within the Intel CSME subsystem, affecting multiple versions prior to 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, and 15.0.22. This flaw allows a privileged user with local access to potentially escalate their privileges, posing serious security risks to system integrity. Users are encouraged to update to the latest versions to mitigate the risk associated with this vulnerability.",Intel,Intel(r) Csme Versions,6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-06-09T18:48:39.000Z,0 CVE-2020-24516,https://securityvulnerability.io/vulnerability/CVE-2020-24516,Privilege Escalation Vulnerability in Intel CSME Software,"A vulnerability exists in Intel's CSME software that may allow an unauthenticated user to modify data that is assumed to be immutable. This could potentially lead to privilege escalation through physical access to the affected systems. To mitigate the risks associated with this issue, it is essential for users to apply the latest firmware updates provided by Intel, which address this security flaw and improve overall system integrity.",Intel,Intel(r) Csme Versions,6.8,MEDIUM,0.0007699999841861427,false,,false,false,false,,,false,false,,2021-06-09T18:47:56.000Z,0