Vulnerabilites related to intel - baseboard_management_controller_firmware
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.", }, { lang: "es", value: "Un desbordamiento de pila en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario autenticado para permitir potencialmente una divulgación de información y/o una denegación de servicio por medio de un acceso a la red.", }, ], id: "CVE-2019-11178", lastModified: "2024-11-21T04:20:40.390", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 5.5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.210", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:14
Severity ?
Summary
Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C278DDFA-5747-405C-ACBD-410AE6AC9793", versionEndExcluding: "2.48.ce3e3bd2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BBAE24DF-2226-459C-9BCE-8A062577D6D9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "345D9886-97FD-497C-9413-6A7BEAA6A3CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B368AC9-CEDA-4D9A-BE58-384E01E581A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "CC923696-6BD3-47BB-A87A-92005F9969F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BC8912C2-F121-4684-B264-871708D17E69", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "DB1A914A-D272-4CB0-9094-94C1FF4F3085", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7B114F-1EA0-40D5-BA2D-8EC268A30530", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "2C243BA0-42DD-417A-B080-F102A3C53CCD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2EB283-D51C-495C-A645-AD27293A25FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "76ACEDD9-68F4-4EFE-9725-16447C18291C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "5F140D92-17D3-47BB-AF30-CBF219450E4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "AED55C57-4279-4453-8C8F-33F45CA4C5E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "54E28FB7-CD61-4281-8CBC-6BA488C3465C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "340FD4CA-6B38-406F-A219-4D6D33816327", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCCE537-4860-4225-BB53-338B7345FDC2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "625A36EB-4866-4272-A886-7271B849C86B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "DECC4837-716C-415A-B1A2-09B727081CE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "B373425D-4369-46A8-BFEE-B60612CB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "167759CD-6F60-46AF-BE30-CAD113C482A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "834CDB1A-D6B0-448C-B042-423D34A2F4EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "8757A5AE-61C8-48A6-A54E-9C8DE425584C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "B5C90C22-4E86-420F-A062-C4ACA49DC1C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "CFEA33CD-9910-402C-90EB-A922950E94CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "87AF3933-2736-4F3F-A064-E92964321D4F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "CF019AB7-0345-4562-BEF8-D2DB446514B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9899FE0-BCF1-4CF2-9851-4E711953B583", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "7DFF4A60-F4F7-4360-AF28-D792FBA3C017", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "005DF7CE-D7F8-4607-86E0-79DE04920E1E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B7EFE347-AC80-40C6-972E-0C0C53431844", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "C92D49CF-66BA-4067-A97C-5C65277D015A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3155205F-03CB-44D4-954B-108B3E159F67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "CE01726B-70C4-472E-A042-1C28AA087ECB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "108399C1-CF18-43CB-841E-DD07EB0793B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "09F6A510-B33D-4AC1-A9EC-71D3A5335531", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "477B1048-9672-4702-B62B-D494AF3D76D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "0473BCDE-85FE-419B-A866-711456D7BC18", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "00C76F81-BAFA-44DE-8FB5-FC65037B26DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CDAC3377-2300-4DED-A948-E026643DA14E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.", }, { lang: "es", value: "Una escritura fuera de límites en el firmware del BMC para algunas Intel® Server Boards, Server Systems y Compute Modules versiones anteriores a 2.48.ce3e3bd2, puede permitir a un usuario autenticado permitir potencialmente una escalada de privilegios por medio de un acceso local", }, ], id: "CVE-2020-24473", lastModified: "2024-11-21T05:14:52.447", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-09T20:15:08.050", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access.", }, { lang: "es", value: "Una corrupción de la pila en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información, una escalada de privilegios y/o una denegación de servicio por medio de un acceso a la red.", }, ], id: "CVE-2019-11171", lastModified: "2024-11-21T04:20:39.653", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:13.817", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:14
Severity ?
Summary
Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C278DDFA-5747-405C-ACBD-410AE6AC9793", versionEndExcluding: "2.48.ce3e3bd2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BBAE24DF-2226-459C-9BCE-8A062577D6D9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "345D9886-97FD-497C-9413-6A7BEAA6A3CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B368AC9-CEDA-4D9A-BE58-384E01E581A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "CC923696-6BD3-47BB-A87A-92005F9969F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BC8912C2-F121-4684-B264-871708D17E69", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "DB1A914A-D272-4CB0-9094-94C1FF4F3085", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7B114F-1EA0-40D5-BA2D-8EC268A30530", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "2C243BA0-42DD-417A-B080-F102A3C53CCD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2EB283-D51C-495C-A645-AD27293A25FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "76ACEDD9-68F4-4EFE-9725-16447C18291C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "5F140D92-17D3-47BB-AF30-CBF219450E4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "AED55C57-4279-4453-8C8F-33F45CA4C5E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "54E28FB7-CD61-4281-8CBC-6BA488C3465C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "340FD4CA-6B38-406F-A219-4D6D33816327", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCCE537-4860-4225-BB53-338B7345FDC2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "625A36EB-4866-4272-A886-7271B849C86B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "DECC4837-716C-415A-B1A2-09B727081CE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "B373425D-4369-46A8-BFEE-B60612CB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "167759CD-6F60-46AF-BE30-CAD113C482A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "834CDB1A-D6B0-448C-B042-423D34A2F4EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "8757A5AE-61C8-48A6-A54E-9C8DE425584C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "B5C90C22-4E86-420F-A062-C4ACA49DC1C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "CFEA33CD-9910-402C-90EB-A922950E94CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "87AF3933-2736-4F3F-A064-E92964321D4F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "CF019AB7-0345-4562-BEF8-D2DB446514B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9899FE0-BCF1-4CF2-9851-4E711953B583", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "7DFF4A60-F4F7-4360-AF28-D792FBA3C017", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "005DF7CE-D7F8-4607-86E0-79DE04920E1E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B7EFE347-AC80-40C6-972E-0C0C53431844", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "C92D49CF-66BA-4067-A97C-5C65277D015A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3155205F-03CB-44D4-954B-108B3E159F67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "CE01726B-70C4-472E-A042-1C28AA087ECB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "108399C1-CF18-43CB-841E-DD07EB0793B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "09F6A510-B33D-4AC1-A9EC-71D3A5335531", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "477B1048-9672-4702-B62B-D494AF3D76D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "0473BCDE-85FE-419B-A866-711456D7BC18", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "00C76F81-BAFA-44DE-8FB5-FC65037B26DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CDAC3377-2300-4DED-A948-E026643DA14E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.", }, { lang: "es", value: "Un desbordamiento del búfer en el firmware del BMC para algunas Intel® Server Boards, Server Systems and Compute Modules versiones anteriores a la versión 2.48.ce3e3bd2 puede permitir a un usuario autenticado permitir potencialmente una escalada de privilegios por medio de un acceso adyacente", }, ], id: "CVE-2020-24474", lastModified: "2024-11-21T05:14:52.593", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 5.2, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 5.1, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-09T20:15:08.087", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una corrupción de la memoria en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegación de servicio por medio de un acceso a la red.", }, ], id: "CVE-2019-11182", lastModified: "2024-11-21T04:20:40.900", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.490", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.", }, { lang: "es", value: "Una comprobación de sesión insuficiente en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información y/o una denegación de servicio por medio de un acceso a la red.", }, ], id: "CVE-2019-11168", lastModified: "2024-11-21T04:20:39.393", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:13.710", references: [ { source: "secure@intel.com", url: "https://support.f5.com/csp/article/K64346530?utm_source=f5support&%3Butm_medium=RSS", }, { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.f5.com/csp/article/K64346530?utm_source=f5support&%3Butm_medium=RSS", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una excepción no manejada en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegación de servicio por medio de un acceso a la red.", }, ], id: "CVE-2019-11177", lastModified: "2024-11-21T04:20:40.267", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.117", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-755", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.", }, { lang: "es", value: "Una omisión de autenticación en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información, una escalada de privilegios y/o una denegación de servicio por medio de un acceso local.", }, ], id: "CVE-2019-11170", lastModified: "2024-11-21T04:20:39.533", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:13.757", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una lectura fuera de límite en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir una divulgación de información por medio de un acceso a la red.", }, ], id: "CVE-2019-11172", lastModified: "2024-11-21T04:20:39.793", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:13.880", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegación de servicio por medio de un acceso a la red.", }, ], id: "CVE-2019-11180", lastModified: "2024-11-21T04:20:40.630", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.333", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegación de servicio por medio de un acceso a la red.", }, ], id: "CVE-2019-11175", lastModified: "2024-11-21T04:20:40.133", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.067", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario autenticado para permitir potencialmente una divulgación de información por medio de un acceso a la red.", }, ], id: "CVE-2019-11179", lastModified: "2024-11-21T04:20:40.510", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.270", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, { lang: "es", value: "Una lectura fuera de límite en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso a la red.", }, ], id: "CVE-2019-11181", lastModified: "2024-11-21T04:20:40.753", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.427", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.", }, { lang: "es", value: "Una comprobación de sesión insuficiente en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información y/o una denegación de servicio por medio de un acceso local.", }, ], id: "CVE-2019-11173", lastModified: "2024-11-21T04:20:39.907", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:13.943", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22885F1F-00C7-423B-8B11-A9DB70EE6677", versionEndExcluding: "2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "B49A0E57-126A-4C60-A748-5D357E7B4670", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "34BB3CD5-DF01-40A8-9906-5C5B306C1B85", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "263AF100-E101-4FEC-8CB3-8FFDB22B5E27", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "8B3CC4D7-1756-44DB-814D-57106E6826C6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ECDD9533-1592-465E-B2B3-DB6077782D10", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "7819ABC6-800C-4141-A31F-14CBE788EF62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABC60590-8707-4B7D-A1D8-188D53F38016", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "106C758A-F23A-48B3-8360-A10212AF50E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9F0759F-4583-43CF-AE0B-584A4DDAC633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*", matchCriteriaId: "7F002684-C456-40F0-AA2A-97C79AE5EECA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*", matchCriteriaId: "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*", matchCriteriaId: "796E437A-B972-4D30-B0A4-53366693C7DF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*", matchCriteriaId: "0D9CC284-540E-492A-A0E6-A193DEAD3102", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*", matchCriteriaId: "5CC9E77D-DDB7-41AB-8728-9782336C167B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*", matchCriteriaId: "19AAEC7C-3538-4041-A644-515B142F6E8D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "24786B0E-36AC-4DBD-8778-DC836CF81CB1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*", matchCriteriaId: "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "0431FDBE-4A58-40B1-B635-225E5B9EDBBB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "F9EADDC0-0AAE-4445-9764-1C54E3898FFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*", matchCriteriaId: "E09B1290-FAD0-4869-A1FA-A4D12BB602CD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "86739A74-AE8B-4699-8C1B-AC5D30C4FA50", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CD891C11-B432-4B87-96BE-7C8BFA76E801", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "FABE36A4-3F68-4077-A619-743AB1FB92AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "7E521A2A-B231-4D00-AA1A-92B228B99E4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1A7612-E617-43DE-826E-DDD7F968CDC9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "75737EC4-8161-4F09-AD90-7C7E25ACBCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "83471545-E7E5-44E7-9967-2F2D808AA866", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "5FF75DFA-62D9-4CFE-A503-F07A56573CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F954A5AA-AD4D-4754-8087-DF6ED312DCBA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "50201278-AD47-468E-BA70-900399F2F758", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6B062F88-6088-42AF-9B47-ACDEB88A4390", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "CF6884DD-0C0F-453B-A826-6360C95BD10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "85763067-E9E5-4418-A51F-FF3DD3710F9B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "F1DD69C7-9E7C-4569-9971-A06F77028BB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "3506908A-8081-4ADA-A986-E02415956AB4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "0DEF6206-E94C-4C16-8D91-AD776D62F79F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "0A47AC30-315C-4E4B-BBBB-305FA5131281", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "48054F35-53C1-4480-86E2-CB8260DD84B6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "8029A5F9-E999-4BA9-AA77-14A73B83454E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83196F-06BD-41D6-A6B8-C7ABD25CA238", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "30E49457-D38D-4145-81F2-7FA4D463CD24", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*", matchCriteriaId: "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "13C6540A-C5E4-46E5-BB7C-E4C53904AE68", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "D952C1D5-581F-4ADC-8DB5-3682DC8588CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "F3183B56-D5BB-4010-B2EE-3427D796D2A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "98B6DF59-DF1E-4D9C-B574-37DC398B16AB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "931E4D81-FAF0-4BFF-92E0-D5F653C5E845", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "6982CB5F-4448-48D4-BD3A-782874AB2304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B14E3D1D-B614-458D-8F78-E25CC89B311E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "81818501-4F4A-4CED-895D-84D6DC139811", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "DA9657DC-AA1C-4B47-9286-3D7D73F9A714", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "6DDFAF1C-E386-4F35-8A81-492713F10A92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "495BFD25-08D3-4DDE-A640-5E7D85AB0560", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "C74211C3-3F9D-41E8-AB5B-16205AD90B64", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "F105271A-9DC1-42CE-9D19-E4A55BE1F04E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "FC998F55-2B5C-418D-9B17-23A05C75F454", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "51C622C8-95E1-4A7F-B3E1-4199310CF4E8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "94D96863-E459-4C0E-B0C8-5207FC3E7962", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "86F92047-1D58-47E6-89AC-D4434230DB66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "F422B74A-AF81-4D17-AFEC-E228C5B2023E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "C3A107D2-6521-4C91-A35D-6E92A5A15A47", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*", matchCriteriaId: "5C9DDFA5-349D-4451-95B1-35ACD8F1D354", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D98E4-73ED-45D7-A224-E734283585EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*", matchCriteriaId: "605AD870-F4F5-4159-89BE-9B29D58C04C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.", }, { lang: "es", value: "Un control de acceso insuficiente en el firmware de Intel® Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgación de información por medio de un acceso a la red.", }, ], id: "CVE-2019-11174", lastModified: "2024-11-21T04:20:40.020", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-11-14T17:15:14.007", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:14
Severity ?
Summary
Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C278DDFA-5747-405C-ACBD-410AE6AC9793", versionEndExcluding: "2.48.ce3e3bd2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BBAE24DF-2226-459C-9BCE-8A062577D6D9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "345D9886-97FD-497C-9413-6A7BEAA6A3CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*", matchCriteriaId: "6B368AC9-CEDA-4D9A-BE58-384E01E581A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "CC923696-6BD3-47BB-A87A-92005F9969F4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*", matchCriteriaId: "BC8912C2-F121-4684-B264-871708D17E69", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "DB1A914A-D272-4CB0-9094-94C1FF4F3085", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7B114F-1EA0-40D5-BA2D-8EC268A30530", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*", matchCriteriaId: "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*", matchCriteriaId: "2C243BA0-42DD-417A-B080-F102A3C53CCD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*", matchCriteriaId: "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2EB283-D51C-495C-A645-AD27293A25FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*", matchCriteriaId: "76ACEDD9-68F4-4EFE-9725-16447C18291C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*", matchCriteriaId: "5F140D92-17D3-47BB-AF30-CBF219450E4B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*", matchCriteriaId: "AED55C57-4279-4453-8C8F-33F45CA4C5E7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*", matchCriteriaId: "54E28FB7-CD61-4281-8CBC-6BA488C3465C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*", matchCriteriaId: "340FD4CA-6B38-406F-A219-4D6D33816327", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCCE537-4860-4225-BB53-338B7345FDC2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*", matchCriteriaId: "625A36EB-4866-4272-A886-7271B849C86B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*", matchCriteriaId: "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*", matchCriteriaId: "DECC4837-716C-415A-B1A2-09B727081CE5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*", matchCriteriaId: "B373425D-4369-46A8-BFEE-B60612CB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*", matchCriteriaId: "167759CD-6F60-46AF-BE30-CAD113C482A8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*", matchCriteriaId: "834CDB1A-D6B0-448C-B042-423D34A2F4EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "8757A5AE-61C8-48A6-A54E-9C8DE425584C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "B5C90C22-4E86-420F-A062-C4ACA49DC1C9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*", matchCriteriaId: "CFEA33CD-9910-402C-90EB-A922950E94CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*", matchCriteriaId: "87AF3933-2736-4F3F-A064-E92964321D4F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*", matchCriteriaId: "CF019AB7-0345-4562-BEF8-D2DB446514B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*", matchCriteriaId: "B9899FE0-BCF1-4CF2-9851-4E711953B583", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*", matchCriteriaId: "7DFF4A60-F4F7-4360-AF28-D792FBA3C017", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*", matchCriteriaId: "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "005DF7CE-D7F8-4607-86E0-79DE04920E1E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "B7EFE347-AC80-40C6-972E-0C0C53431844", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "C92D49CF-66BA-4067-A97C-5C65277D015A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "3155205F-03CB-44D4-954B-108B3E159F67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "CE01726B-70C4-472E-A042-1C28AA087ECB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "108399C1-CF18-43CB-841E-DD07EB0793B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "09F6A510-B33D-4AC1-A9EC-71D3A5335531", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*", matchCriteriaId: "477B1048-9672-4702-B62B-D494AF3D76D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*", matchCriteriaId: "0473BCDE-85FE-419B-A866-711456D7BC18", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*", matchCriteriaId: "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*", matchCriteriaId: "00C76F81-BAFA-44DE-8FB5-FC65037B26DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*", matchCriteriaId: "CDAC3377-2300-4DED-A948-E026643DA14E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access.", }, { lang: "es", value: "Una inicialización incorrecta en el firmware del BMC Intel® Server Boards, Server Systems and Compute Modules versiones anteriores a 2.48.ce3e3bd2, puede permitir a un usuario autenticado permitir potencialmente una denegación de servicio por medio de un acceso local", }, ], id: "CVE-2020-24475", lastModified: "2024-11-21T05:14:52.723", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-09T20:15:08.110", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-665", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-02-16 21:15
Modified
2024-11-21 06:59
Severity ?
4.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Uncaught exception in webserver for the Integrated BMC in some Intel(R) platforms before versions 2.86, 2.09 and 2.78 may allow a privileged user to potentially enable denial of service via network access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8943680D-D1A3-46ED-840C-51186E8DEB37", versionEndExcluding: "2.86", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9B4AE9-72ED-43CB-9705-ED6BDD80AEC3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", matchCriteriaId: "C51E9A02-E6FC-42AD-8269-07EFEFD2ADD4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", matchCriteriaId: "92911979-A714-4643-AF03-64EDBD42DFF5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", matchCriteriaId: "79973EAB-9106-4417-88AF-8AC368E58050", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", matchCriteriaId: "FBB31B9D-05BC-4D0E-8CC8-52757131A6CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", matchCriteriaId: "C518A082-388F-4DDE-8FDF-FEA95FD69B49", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", matchCriteriaId: "CA2DAF1D-8994-491E-BD65-642C23778DB7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0DA068-0D77-4358-BDEE-572811836689", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", matchCriteriaId: "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", matchCriteriaId: "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", matchCriteriaId: "E687CADE-6E49-4284-BD41-6CA2FDD846FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", matchCriteriaId: "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", matchCriteriaId: "DE862F15-69CC-488E-ABE8-1E23A5A1089F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", matchCriteriaId: "9087D09E-ADCB-478A-87FD-B7113FD29EFB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", matchCriteriaId: "0B43E11E-5350-4DDB-A743-F84D4D2286D4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", matchCriteriaId: "5D64D1ED-A386-4475-99AB-7727DE67E1A2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", matchCriteriaId: "6EFB4646-A5BA-4662-A47F-62407AFEDFF2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", matchCriteriaId: "29A923F6-E352-4752-B7D3-007FE1CAFE06", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", matchCriteriaId: "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", matchCriteriaId: "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", matchCriteriaId: "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", matchCriteriaId: "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", matchCriteriaId: "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", matchCriteriaId: "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", matchCriteriaId: "E06531E6-126A-4FBB-BEBB-F9023C4738F1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", matchCriteriaId: "93B8CDF0-1489-4E4C-B004-A22E06FC10D7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", matchCriteriaId: "A6ACF161-472E-4088-85C2-5940C9C88D45", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", matchCriteriaId: "067C65E5-5392-4DAF-A6BD-640D78C19CE1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", matchCriteriaId: "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", matchCriteriaId: "D93CC498-F558-4C2F-9E14-7897060CA9FE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", matchCriteriaId: "D609DB7E-AE80-48E0-B7B6-E622B6208ABF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", matchCriteriaId: "A09C3656-AE49-4F26-BD28-B725E8C40304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", matchCriteriaId: "90F0D1EF-2FE1-498A-AE38-BF755A680E88", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", matchCriteriaId: "22243DEF-F01B-4774-AEC1-40D776E1167E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", matchCriteriaId: "25934425-944F-4B9A-8A16-F1DCBF3D5032", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", matchCriteriaId: "6A5BC76B-A4FC-4702-A544-889E62F8509E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", matchCriteriaId: "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", matchCriteriaId: "383DCE68-3882-4274-AA4A-5E030530E4BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", matchCriteriaId: "04EC7421-963C-43F7-9450-2E204BAFF1F1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", matchCriteriaId: "5E3AF74E-C719-4E55-959D-681174FFFB90", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", matchCriteriaId: "E290F38C-7A86-469D-9E6A-F0EC69DBE23A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", matchCriteriaId: "6EF77397-85D0-4EC2-9887-2D0D9D253450", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", matchCriteriaId: "9E9761E8-7978-4141-94B5-EEFE7C00BC9A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", matchCriteriaId: "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", matchCriteriaId: "E921DEBA-3063-4639-9823-2FDDD8DEA793", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", matchCriteriaId: "CF44A7C9-834B-49DF-B1B6-B1575473179B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", matchCriteriaId: "5983B72F-9194-47CB-B444-2ECC6360B686", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", matchCriteriaId: "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", matchCriteriaId: "5E0E40BC-5745-4AB0-B991-61A0C63DB284", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", matchCriteriaId: "6E207648-E57F-4C43-8FDD-049BF9214664", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", matchCriteriaId: "39EB131A-87DE-45FB-9025-B02EC28C4304", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", matchCriteriaId: "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", matchCriteriaId: "D99D0351-303B-4ABF-A7FD-734176095307", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", matchCriteriaId: "5B080431-626C-4A7B-AB37-47EE6811A5A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", matchCriteriaId: "76D48CFC-1322-4C53-8B53-88E7ACC724BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", matchCriteriaId: "5F6456D0-32AE-44A9-9F63-AD64B5E49182", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", matchCriteriaId: "38EA99F9-22C2-47ED-9DDD-928E19C4C51E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", matchCriteriaId: "9F8867B2-F297-4D30-AD43-77B0F67FAE3E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", matchCriteriaId: "178345A5-9A38-4C8F-B3BB-430276FA4998", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", matchCriteriaId: "831A7D63-4638-480C-94CB-ED06613BA75C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", matchCriteriaId: "178D9E36-79EC-4672-8E46-0FD6597CA1CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", matchCriteriaId: "EED0D492-ADAB-41ED-A283-024D3CED441F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", matchCriteriaId: "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", matchCriteriaId: "D9733E69-E7CF-444C-B72C-AC8E5DEF2449", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", matchCriteriaId: "0FD24563-9157-4DE1-95ED-D4E3E879219E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", matchCriteriaId: "F83F8602-6679-4B3C-BBDD-3BDB2B317F70", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", matchCriteriaId: "3CD3E45C-1943-42BA-9F6D-EA64D67BF954", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", matchCriteriaId: "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", matchCriteriaId: "9B27F755-4C38-4469-8A9D-C9266BDA53ED", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", matchCriteriaId: "0E21977E-7085-46C5-8E89-F952C2EBCE04", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", matchCriteriaId: "DB72D13B-5880-4CB2-8E80-CB6A39B5A302", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", matchCriteriaId: "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", matchCriteriaId: "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", matchCriteriaId: "0C8292CC-DACB-489A-BCB2-73DC2C6F944C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", matchCriteriaId: "2D83AEDF-2671-4278-8088-BA517192AB3E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", matchCriteriaId: "BF72F37A-2F28-40E6-A84B-0E1DF63B1812", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", matchCriteriaId: "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", matchCriteriaId: "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", matchCriteriaId: "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", matchCriteriaId: "5241B3E0-F968-4B16-8BF8-191C6F7B224A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", matchCriteriaId: "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", matchCriteriaId: "B82FC910-F3AB-42BF-9740-EC09F0AC179D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", matchCriteriaId: "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", matchCriteriaId: "3BA58EFB-7672-4902-ABC1-65217AA617AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", matchCriteriaId: "96E2764D-7D6A-4CE0-A628-FFE966A6462F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", matchCriteriaId: "1D66D18C-17F2-4259-B1D8-7C63797A024C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", matchCriteriaId: "25C8DFB5-9D8B-4370-849A-DC061910E54F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", matchCriteriaId: "0B704835-1250-44E1-923C-5DE2F4DD25D0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", matchCriteriaId: "9236F094-B913-43F2-B703-CE33B9CEBA0F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", matchCriteriaId: "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", matchCriteriaId: "345FF353-FE25-41F4-97EC-FF32BE2796EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", matchCriteriaId: "68A9AD79-9B4B-4EE8-810B-359901C3540C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", matchCriteriaId: "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", matchCriteriaId: "19BF77DA-E159-4336-A552-B22BE437670D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", matchCriteriaId: "E86CCC45-270E-4760-A7E9-D39C74C00FCF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", matchCriteriaId: "C105930C-D2BB-4FA1-B5D1-882D90D867C3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", matchCriteriaId: "45227E88-ACFF-43A5-AF45-C6542A6EF681", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", matchCriteriaId: "5FA2030D-CEAF-46BF-9669-19EAD541BDB6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", matchCriteriaId: "1612AE8A-3165-47A3-AEA8-65F4156C48BA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", matchCriteriaId: "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", matchCriteriaId: "94A6DA7A-7C97-40E1-B31A-B92BB658C429", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", matchCriteriaId: "54AF128B-9984-4C91-B7F6-968DE376C3BE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "28B167F1-63FA-4C86-84AB-836ABF84E6E3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", matchCriteriaId: "955420F9-3A3F-40E0-9940-DD43C5C78D62", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", matchCriteriaId: "BC4A437C-6C00-4729-91CC-D27EB3542633", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", matchCriteriaId: "74ED727D-B1A9-4F4B-92C7-3F00F3A80013", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", matchCriteriaId: "A2C24951-B3FA-48E6-AFAC-6CA0D2348230", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", matchCriteriaId: "185E8FBC-9EE9-472E-867B-0B0DEEECA13E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", matchCriteriaId: "AB3C00A0-C28A-46EB-853D-DAE3819399D9", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", matchCriteriaId: "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", matchCriteriaId: "DBC93757-5FD7-403D-B5ED-CC8793002352", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", matchCriteriaId: "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", matchCriteriaId: "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", matchCriteriaId: "89421EC5-52E5-441F-AD3B-5C5E964F836D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", matchCriteriaId: "2117880B-FDD4-4A90-B29B-6D840D26645D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", matchCriteriaId: "E8EED1D9-75CC-41E9-9C0C-C648E0717024", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB43A67-9DD7-49E6-BA77-220120C90700", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", matchCriteriaId: "0D3413CB-86D3-4684-B651-DBACC0660E76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", matchCriteriaId: "FB677676-E793-4158-BF53-3F5ECCECE203", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", matchCriteriaId: "F32E6092-1AF6-499F-B176-F575E766E8F3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", matchCriteriaId: "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", matchCriteriaId: "39F309BC-6F31-490C-982B-14F9319276F2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", matchCriteriaId: "FA909754-B60A-4B30-AF42-4C8734E155AF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", matchCriteriaId: "EBEFB056-0872-434B-9630-28A1AAEAD470", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", matchCriteriaId: "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", matchCriteriaId: "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", matchCriteriaId: "7FF7E334-6DC7-44B5-A102-649A68300C80", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", matchCriteriaId: "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", matchCriteriaId: "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", matchCriteriaId: "7305838B-84CA-4BB8-A350-B2D2844F1041", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", matchCriteriaId: "D356D196-8AB0-4387-A644-C5E68174A60C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", matchCriteriaId: "89587A92-6234-40C3-83DB-F72319FFBC79", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", matchCriteriaId: "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", matchCriteriaId: "E50CC669-9555-45E9-A43B-05A21FB040E1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", matchCriteriaId: "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", matchCriteriaId: "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", matchCriteriaId: "C39B6A99-7060-4011-8FA3-E5ABE5C02813", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", matchCriteriaId: "DF9E723E-1095-424E-A90D-380CA0D2795E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", matchCriteriaId: "35380FB9-90FF-405F-8E2E-01C1DD209540", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", matchCriteriaId: "2215D655-0EA9-4530-AB68-7B1C7360D692", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", matchCriteriaId: "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", matchCriteriaId: "AE519C62-F5BB-461C-91EF-2979CD506C63", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", matchCriteriaId: "F693457C-3529-4E62-A672-1B862F235D0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8DEFB22C-24AF-4298-AE15-D2B12111CB4C", versionEndExcluding: "2.09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:c252:-:*:*:*:*:*:*:*", matchCriteriaId: "F6E46116-6B73-4A65-A2AB-E238678B7E48", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c256:-:*:*:*:*:*:*:*", matchCriteriaId: "C9F281EE-3F33-406A-8FA0-43B3AB6BC35B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", matchCriteriaId: "43126A13-5931-4989-BEFD-E1A096F98D94", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", matchCriteriaId: "342E0783-288A-4DB0-A657-29937903927C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", matchCriteriaId: "D4C40F91-138F-4396-9A6B-B969F6AC30B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", matchCriteriaId: "23CA9365-B1C4-4188-A9BF-19215AFF58A0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", matchCriteriaId: "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA77EB3-6F11-43BC-8B59-84217AA73205", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", matchCriteriaId: "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", matchCriteriaId: "331B8F10-3A20-46A8-B960-3546271CF701", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", matchCriteriaId: "AE638E59-DF75-43B1-A6DC-10A838B05B00", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", matchCriteriaId: "109FA97C-10EE-41F9-B52B-B37E31642251", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", matchCriteriaId: "A67B3834-E59E-47AF-A806-13A990E812B3", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", matchCriteriaId: "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", matchCriteriaId: "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", matchCriteriaId: "DD176FB0-7427-4F2E-A969-72062BB3EF98", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", matchCriteriaId: "B278081F-F900-4581-9D10-B5A2ACD2E2C1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", matchCriteriaId: "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", matchCriteriaId: "45689B37-5085-41B3-BA9D-F05FD07DF1FC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", matchCriteriaId: "A7186EA5-448F-473A-8FC8-058FC823ACC5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", matchCriteriaId: "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", matchCriteriaId: "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", matchCriteriaId: "F58AEEB9-919B-4C6C-83B6-080846786A56", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", matchCriteriaId: "C0BAE174-A158-4807-9D67-36F795028D76", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", matchCriteriaId: "FAD38AEA-979D-484B-82F0-0161BA39E9F5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", matchCriteriaId: "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", matchCriteriaId: "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", matchCriteriaId: "C2CA54AE-915F-45B9-B775-C04589E49802", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", matchCriteriaId: "DB86F018-1F56-4146-A78E-C7BF7B616023", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", matchCriteriaId: "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", matchCriteriaId: "00912C9C-D386-445E-B390-E96361ECDFA6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", matchCriteriaId: "60B582A1-784C-4BE8-A0D5-706DE01D769E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", matchCriteriaId: "320597E9-6A2B-47E6-A33C-6B31A81902EA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", matchCriteriaId: "556637E1-9502-41E7-B91D-082C92F233A1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA930BC-EF68-4AD5-AA1B-0659358028D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", matchCriteriaId: "1A8EA870-2228-4E81-A417-30E040A5C0E1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", matchCriteriaId: "656D31B6-1E8D-4A44-9D7A-023051E7050A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", matchCriteriaId: "49EEE5AA-3867-4137-B165-5004C34C77B0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", matchCriteriaId: "B2A38417-1DB2-4C85-80D9-D3968BF7A83B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", matchCriteriaId: "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", matchCriteriaId: "74F99F83-A7E6-4AFD-BC42-7348EF6613AA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", matchCriteriaId: "5A62A9F4-2B98-4F2D-9143-08D1689E38AC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FD06CB-F456-44BD-900B-06131DC68B6B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", matchCriteriaId: "9044310E-4DF9-47BA-9D05-C1405DC8CDB2", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", matchCriteriaId: "BA881CDA-1C16-43F1-A7D5-69502512A21C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F6776C6A-CFC5-418A-B004-BB394AECA02C", versionEndExcluding: "2.81", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*", matchCriteriaId: "F2364774-DA5C-48BF-AEDB-E97BFED643F6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", matchCriteriaId: "2BBE62C7-76BD-4684-8CDE-68DBFF4E5280", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", matchCriteriaId: "C8B0316B-1968-4502-955D-78E9BDC2E30C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", matchCriteriaId: "6839AE9B-9A8A-4312-80FC-0549C675A815", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", matchCriteriaId: "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", matchCriteriaId: "43808CCF-1EF0-41CE-983D-DD6BB775895E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", matchCriteriaId: "F2C5D3DE-5506-4F16-B7F9-5032A1277D23", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED598260-2A9B-46F7-AA85-0DA97DA0D42D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", matchCriteriaId: "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", matchCriteriaId: "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", matchCriteriaId: "3BF1F73B-4736-40BC-9053-951B5BF1059E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", matchCriteriaId: "EDA47606-176C-4F6B-A316-4C536B63FA4E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", matchCriteriaId: "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", matchCriteriaId: "FE3CA224-B5DE-4451-9CF9-929ABEA242EF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", matchCriteriaId: "A3D8E340-AE91-4F29-9F22-E0CE6718FC13", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", matchCriteriaId: "710DBCD5-788D-4140-AC16-EC6E126CFA66", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", matchCriteriaId: "A767EC83-AAED-4FEA-A35E-A503369FE4FB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", matchCriteriaId: "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", matchCriteriaId: "20821868-F7D2-4132-8D63-98E1089DB46C", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB9295A-8832-4670-B268-FBD0BC086447", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", matchCriteriaId: "489BD4AC-50C6-422B-A2B2-00A70E611114", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", matchCriteriaId: "C5694238-F4E5-4689-ADD2-67C25762ED92", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", matchCriteriaId: "A57D44C0-AA8D-46B0-8923-ADB312E3937F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", matchCriteriaId: "3A551BBB-76CD-4C26-913F-B02C66E5D846", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", matchCriteriaId: "8A4A44F2-68BF-4709-946B-C976DA3A9C7E", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", matchCriteriaId: "038AC553-5523-4687-843D-6FEA7264EDEA", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", matchCriteriaId: "8DE5D09C-3272-4810-9F41-97BDBBFE4160", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", matchCriteriaId: "59C5122F-D822-4E71-A417-88EB51F1786B", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", matchCriteriaId: "F14C3438-B876-45B9-85F5-61354207AF8A", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", matchCriteriaId: "D7C504C3-7EEE-4A0F-8589-19C1E806E690", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", matchCriteriaId: "5230F6AF-88CB-4EE2-B292-8B9A7217D10F", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", matchCriteriaId: "5B45C39D-03E8-46C1-88DD-94E382F4A961", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", matchCriteriaId: "EF2DC691-025A-441E-AAC2-C8583F54733D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", matchCriteriaId: "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", matchCriteriaId: "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", matchCriteriaId: "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", matchCriteriaId: "EB15368B-21A1-429E-8B9C-A095C4E8BA67", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", matchCriteriaId: "BA925F96-6DDD-4F71-BF13-710C8A89D860", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", matchCriteriaId: "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", matchCriteriaId: "91EB66B4-8F1B-4F35-9371-17FB761997CB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", matchCriteriaId: "CBDFD1AF-2716-4C95-ADFF-79EFA915C286", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", matchCriteriaId: "5390A12B-80BD-4889-BF0F-95E65D10D037", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", matchCriteriaId: "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", matchCriteriaId: "05637A96-AF09-4FF5-A918-AB369AA2D1CC", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", matchCriteriaId: "33FA0279-D587-471E-8EC0-211F78DA4DFD", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", matchCriteriaId: "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FE9694-F0E7-4B45-82A1-065DA96B9794", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", matchCriteriaId: "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", matchCriteriaId: "D557D68C-8279-4BFD-9EA6-17A83754B8FF", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", matchCriteriaId: "7ECA0BC9-1CA4-4B95-B98F-9098B2550309", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", matchCriteriaId: "1298CF87-124D-450B-928D-F39CCA2BAF42", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", matchCriteriaId: "AF12820F-A2BE-44BF-A85D-7F4623898DAB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Uncaught exception in webserver for the Integrated BMC in some Intel(R) platforms before versions 2.86, 2.09 and 2.78 may allow a privileged user to potentially enable denial of service via network access.", }, ], id: "CVE-2022-29493", lastModified: "2024-11-21T06:59:11.253", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.9, impactScore: 3.6, source: "secure@intel.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-16T21:15:11.747", references: [ { source: "secure@intel.com", tags: [ "Vendor Advisory", ], url: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html", }, ], sourceIdentifier: "secure@intel.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-755", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2019-11172
Vulnerability from cvelistv5
Published
2019-11-14 16:36
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.660Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:36:45", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11172", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11172", datePublished: "2019-11-14T16:36:45", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.660Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11179
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.997Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:38:07", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11179", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11179", datePublished: "2019-11-14T16:38:07", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.997Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11177
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.990Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:37:36", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11177", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11177", datePublished: "2019-11-14T16:37:36", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.990Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11171
Vulnerability from cvelistv5
Published
2019-11-14 16:36
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.681Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:36:30", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11171", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11171", datePublished: "2019-11-14T16:36:30", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.681Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11180
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.317Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:38:15", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11180", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11180", datePublished: "2019-11-14T16:38:15", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.317Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24473
Vulnerability from cvelistv5
Published
2021-06-09 19:01
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Server Boards, Server Systems and Compute Modules |
Version: before version 2.48.ce3e3bd2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:12:08.965Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Server Boards, Server Systems and Compute Modules", vendor: "n/a", versions: [ { status: "affected", version: "before version 2.48.ce3e3bd2", }, ], }, ], descriptions: [ { lang: "en", value: "Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.", }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-09T19:01:45", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-24473", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Server Boards, Server Systems and Compute Modules", version: { version_data: [ { version_value: "before version 2.48.ce3e3bd2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "escalation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-24473", datePublished: "2021-06-09T19:01:45", dateReserved: "2020-08-19T00:00:00", dateUpdated: "2024-08-04T15:12:08.965Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11173
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.971Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:37:00", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11173", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11173", datePublished: "2019-11-14T16:37:00", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.971Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24474
Vulnerability from cvelistv5
Published
2021-06-09 19:01
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Server Boards, Server Systems and Compute Modules |
Version: before version 2.48.ce3e3bd2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:12:09.228Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Server Boards, Server Systems and Compute Modules", vendor: "n/a", versions: [ { status: "affected", version: "before version 2.48.ce3e3bd2", }, ], }, ], descriptions: [ { lang: "en", value: "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.", }, ], problemTypes: [ { descriptions: [ { description: "escalation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-09T19:01:40", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-24474", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Server Boards, Server Systems and Compute Modules", version: { version_data: [ { version_value: "before version 2.48.ce3e3bd2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "escalation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-24474", datePublished: "2021-06-09T19:01:40", dateReserved: "2020-08-19T00:00:00", dateUpdated: "2024-08-04T15:12:09.228Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11178
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.984Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:37:44", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11178", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11178", datePublished: "2019-11-14T16:37:44", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.984Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11182
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.986Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:38:31", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11182", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11182", datePublished: "2019-11-14T16:38:31", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.986Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11168
Vulnerability from cvelistv5
Published
2019-11-14 16:35
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K64346530?utm_source=f5support&%3Butm_medium=RSS | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:09.015Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K64346530?utm_source=f5support&%3Butm_medium=RSS", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-15T21:06:51", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K64346530?utm_source=f5support&%3Butm_medium=RSS", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11168", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, { name: "https://support.f5.com/csp/article/K64346530?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K64346530?utm_source=f5support&utm_medium=RSS", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11168", datePublished: "2019-11-14T16:35:58", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:09.015Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-29493
Vulnerability from cvelistv5
Published
2023-02-16 20:00
Modified
2025-01-27 18:14
Severity ?
EPSS score ?
Summary
Uncaught exception in webserver for the Integrated BMC in some Intel(R) platforms before versions 2.86, 2.09 and 2.78 may allow a privileged user to potentially enable denial of service via network access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Integrated BMC |
Version: before versions 2.86, 2.09 and 2.78 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:26:06.297Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html", tags: [ "x_transferred", ], url: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-29493", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-27T17:27:54.911801Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-27T18:14:59.021Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Integrated BMC", vendor: "n/a", versions: [ { status: "affected", version: "before versions 2.86, 2.09 and 2.78", }, ], }, ], descriptions: [ { lang: "en", value: "Uncaught exception in webserver for the Integrated BMC in some Intel(R) platforms before versions 2.86, 2.09 and 2.78 may allow a privileged user to potentially enable denial of service via network access.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-16T20:00:22.165Z", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { name: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html", url: "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html", }, ], }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2022-29493", datePublished: "2023-02-16T20:00:22.165Z", dateReserved: "2022-07-21T03:00:11.531Z", dateUpdated: "2025-01-27T18:14:59.021Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11174
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.697Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:37:10", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11174", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11174", datePublished: "2019-11-14T16:37:10", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.697Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11175
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.961Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:37:26", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11175", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11175", datePublished: "2019-11-14T16:37:26", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.961Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11181
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.908Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:38:23", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11181", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11181", datePublished: "2019-11-14T16:38:23", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.908Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24475
Vulnerability from cvelistv5
Published
2021-06-09 19:01
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Server Boards, Server Systems and Compute Modules |
Version: before version 2.48.ce3e3bd2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:12:08.742Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) Server Boards, Server Systems and Compute Modules", vendor: "n/a", versions: [ { status: "affected", version: "before version 2.48.ce3e3bd2", }, ], }, ], descriptions: [ { lang: "en", value: "Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-09T19:01:50", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2020-24475", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) Server Boards, Server Systems and Compute Modules", version: { version_data: [ { version_value: "before version 2.48.ce3e3bd2", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2020-24475", datePublished: "2021-06-09T19:01:50", dateReserved: "2020-08-19T00:00:00", dateUpdated: "2024-08-04T15:12:08.742Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-11170
Vulnerability from cvelistv5
Published
2019-11-14 16:36
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) BMC |
Version: See provided reference |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T22:48:08.893Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Intel(R) BMC", vendor: "n/a", versions: [ { status: "affected", version: "See provided reference", }, ], }, ], descriptions: [ { lang: "en", value: "Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.", }, ], problemTypes: [ { descriptions: [ { description: "Escalation of Privilege, Denial of Service, Information Disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T16:36:15", orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", shortName: "intel", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@intel.com", ID: "CVE-2019-11170", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Intel(R) BMC", version: { version_data: [ { version_value: "See provided reference", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Escalation of Privilege, Denial of Service, Information Disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", refsource: "MISC", url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce", assignerShortName: "intel", cveId: "CVE-2019-11170", datePublished: "2019-11-14T16:36:15", dateReserved: "2019-04-11T00:00:00", dateUpdated: "2024-08-04T22:48:08.893Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }