{"vulnerability": "CVE-2019-1456", "sightings": [{"uuid": "c1b02275-459e-45fb-ac07-0dd9f68dc895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14568", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7387", "content": "\u0412 Intel rapid \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0447\u0435\u0440\u043d\u044b\u0435 \u0441\u043f\u0438\u0441\u043a\u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043e\u0432.\n\nIntel rapid \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044f \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0436\u0451\u0441\u0442\u043a\u0438\u0445 \u0434\u0438\u0441\u043a\u043e\u0432 SATA. \u0420\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043f\u043e\u0434 Windows \u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e \u0443\u0436\u0435 \u0432 \u043f\u0440\u0435\u0434\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u043c \u0432\u0438\u0434\u0435 \u0441 \u043d\u043e\u0443\u0442\u0431\u0443\u043a\u0430\u043c\u0438 \u043e\u0441\u043d\u0430\u0449\u0451\u043d\u043d\u044b\u043c\u0438 \u041e\u0421 Windows. \u0422\u0430\u043a \u0447\u0442\u043e \u0436\u0435\u043b\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u044d\u0442\u043e\u0442 \u043c\u043e\u043c\u0435\u043d\u0442 \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0438 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u044d\u0442\u043e \u041f\u041e. \n\nPoC:\nhttps://safebreach.com/Post/Intel-Rapid-Storage-Technology-Service-DLL-Preloading-and-Potential-Abuses-CVE-2019-14568", "creation_timestamp": "2019-12-17T18:54:07.000000Z"}, {"uuid": "a6fd4861-24f1-492b-af92-cc27199fc55f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14568", "type": "seen", "source": "https://t.me/ctinow/205553", "content": "https://ift.tt/snJI8W3\nCVE-2019-14568 | Intel RST up to 17.7 default permission (K38424406)", "creation_timestamp": "2024-03-12T11:47:01.000000Z"}, {"uuid": "48a9da74-6411-4ae8-ae37-082b880dc392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14566", "type": "seen", "source": "https://t.me/ctinow/184656", "content": "https://ift.tt/bxrJUiS\nCVE-2019-14566 | Intel SGX SDK on Windows/Linux input validation (K57201259)", "creation_timestamp": "2024-02-14T14:26:59.000000Z"}, {"uuid": "622b8ff9-b0fd-4492-be4a-e608a357b1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14565", "type": "seen", "source": "https://t.me/ctinow/184638", "content": "https://ift.tt/RW2tPzr\nCVE-2019-14565 | Intel SGX SDK on Windows/Linux input validation (K57201259)", "creation_timestamp": "2024-02-14T13:56:26.000000Z"}, {"uuid": "60f3c410-c0de-4421-a694-df09142e80e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1456", "type": "seen", "source": "https://t.me/ctinow/183660", "content": "https://ift.tt/BtFxNyn\nCVE-2019-1456 | Microsoft Windows up to Server 2019 OpenType Font Parser memory corruption", "creation_timestamp": "2024-02-13T08:56:20.000000Z"}, {"uuid": "593d0068-fd37-4d0e-b6fb-5b2d27bfb199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14562", "type": "seen", "source": "https://t.me/cibsecurity/16709", "content": "\u203c CVE-2019-14562 \u203c\n\nInteger overflow in DxeImageVerificationHandler() EDK II may allow an authenticated user to potentially enable denial of service via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-23T18:46:02.000000Z"}, {"uuid": "15c3c961-2e82-4f2f-b107-9eea918fa48b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14563", "type": "seen", "source": "https://t.me/cibsecurity/16715", "content": "\u203c CVE-2019-14563 \u203c\n\nInteger truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-23T20:45:56.000000Z"}]}