Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-0200 (GCVE-0-2021-0200)
Vulnerability from cvelistv5
- n escalation of privilege
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Ethernet 700 Series Controllers |
Version: before version 8.2 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:32:10.152Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Ethernet 700 Series Controllers",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 8.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-10T06:06:08",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0200",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Ethernet 700 Series Controllers",
"version": {
"version_data": [
{
"version_value": "before version 8.2"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20211210-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0200",
"datePublished": "2021-11-17T19:14:27",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:32:10.152Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-0200\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2021-11-17T20:15:09.740\",\"lastModified\":\"2024-11-21T05:42:11.317\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Una escritura fuera de l\u00edmites en el firmware para los controladores Intel(R) Ethernet de la serie 700 versiones anteriores a 8.2, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_v710-at2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"41C4E9CD-45DA-40AB-BC5E-697BC1DEE8F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_v710-at2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8967AD-C1FE-412F-A35F-B8A9CECAABA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"FAD9A9BC-7CDF-408C-BEB0-F0B35DFAB0B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41EEFF5E-3C88-43B3-9894-1B0C73DBA06A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"FC75ACA0-6783-42EF-9061-98FE17DDB0F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8225E56D-74F1-43FC-8696-2F326A264704\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"822ADAF2-DD61-4091-845D-F0406CFEB112\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6D2A9E-EE3D-4DEC-948E-58416CD32477\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"C6DF5F67-07E0-40F7-A509-A2F9E0491C3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1817F4-978B-4F88-831F-C6259CE20E83\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_x710-am2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"54FF6D40-29A8-4DAC-AE9A-B2EBF0951CCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-am2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164BF2CE-DD85-44E4-AD60-4AB4EB2974CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_xl710-am1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"69DE900C-96C5-48C9-9138-909395A3B3F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-am1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC09AD3-EC92-48F1-AB25-3C2591357375\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_xl710-am2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"57A0BD63-971D-40A2-B09E-D685291BFCFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-am2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBDE2108-1DD8-4A02-8CCD-55616C9479BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"2195D5C6-23E4-41AB-B8FB-66B32D3BEB38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91940C69-80BB-43F8-81B5-92AAFCF59CE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_xl710-bm2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"C086BC34-3600-4F48-B822-3204EE8E7BF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-bm2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF7636C-6532-4135-B636-BFEB110FB0FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_xl710-bm1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2\",\"matchCriteriaId\":\"6787C58C-0B2B-4B88-B1C1-25C734F3D1D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-bm1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11FC1CA5-0BEB-45EE-8A82-0B9809FD2774\"}]}]}],\"references\":[{\"url\":\"https://security.netapp.com/advisory/ntap-20211210-0004/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20211210-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
ghsa-98pq-6473-xgg2
Vulnerability from github
Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access.
{
"affected": [],
"aliases": [
"CVE-2021-0200"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-11-17T20:15:00Z",
"severity": "MODERATE"
},
"details": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access.",
"id": "GHSA-98pq-6473-xgg2",
"modified": "2022-05-24T19:20:58Z",
"published": "2022-05-24T19:20:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0200"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20211210-0004"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
gsd-2021-0200
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-0200",
"description": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access.",
"id": "GSD-2021-0200",
"references": [
"https://www.suse.com/security/cve/CVE-2021-0200.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-0200"
],
"details": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access.",
"id": "GSD-2021-0200",
"modified": "2023-12-13T01:23:07.764169Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0200",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Ethernet 700 Series Controllers",
"version": {
"version_data": [
{
"version_value": "before version 8.2"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20211210-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_v710-at2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_v710-at2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_x710-am2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_x710-am2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_xl710-am1_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_xl710-am1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_xl710-am2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_xl710-am2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_xl710-bm2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_xl710-bm2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ethernet_controller_xl710-bm1_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ethernet_controller_xl710-bm1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0200"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20211210-0004/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-12-14T20:34Z",
"publishedDate": "2021-11-17T20:15Z"
}
}
}
var-202111-1629
Vulnerability from variot
Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access. Intel(R) Ethernet 700 Series Controller Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202111-1629",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ethernet controller xl710-bm1",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller x710-at2",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller xl710-am2",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller v710-at2",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller xl710-am1",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller xl710-bm2",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller xxv710-am2",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller x710-bm2",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller x710-tm4",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller xxv710-am1",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "ethernet controller x710-am2",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "8.2"
},
{
"model": "intel ethernet controller xl710-am1",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "\u65e5\u7acb\u30a2\u30c9\u30d0\u30f3\u30b9\u30c8\u30b5\u30fc\u30d0",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "intel ethernet controller xxv710-am1",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller x710-am2",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller x710-tm4",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller xl710-am2",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller xxv710-am2",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller xl710-bm2",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller x710-bm2",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller v710-at2",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel ethernet controller x710-at2",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"cve": "CVE-2021-0200",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2021-0200",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2021-0200",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-0200",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-0200",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-0200",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202111-928",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-928"
},
{
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access. Intel(R) Ethernet 700 Series Controller Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-0200"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-0200",
"trust": 3.2
},
{
"db": "JVN",
"id": "JVNVU91196719",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-007257",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2021.3727",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2023.0959",
"trust": 0.6
},
{
"db": "LENOVO",
"id": "LEN-66617",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202111-928",
"trust": 0.6
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-928"
},
{
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"id": "VAR-202111-1629",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.491724135
},
"last_update_date": "2024-08-14T13:05:04.926000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00554 Hitachi Server / Client Product Security Information",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"title": "Intel Ethernet Controllers Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=172754"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-928"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
},
{
"trust": 1.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-0200"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91196719/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2023.0959"
},
{
"trust": 0.6,
"url": "https://support.lenovo.com/us/en/product_security/len-66617"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.3727"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-928"
},
{
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-928"
},
{
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-02-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"date": "2021-11-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-928"
},
{
"date": "2021-11-17T20:15:09.740000",
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-02-07T04:31:00",
"db": "JVNDB",
"id": "JVNDB-2021-007257"
},
{
"date": "2023-02-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-928"
},
{
"date": "2021-12-14T20:34:57.667000",
"db": "NVD",
"id": "CVE-2021-0200"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-928"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R)\u00a0Ethernet\u00a0700\u00a0Series\u00a0Controller\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-007257"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-928"
}
],
"trust": 0.6
}
}
CERTFR-2023-AVI-0144
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans IBM. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.4.x antérieures à 7.4.3 Fix Pack 7 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 Fix Pack 3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.4.x ant\u00e9rieures \u00e0 7.4.3 Fix Pack 7",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 Fix Pack 3",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0199",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0199"
},
{
"name": "CVE-2021-0198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0198"
},
{
"name": "CVE-2021-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0200"
},
{
"name": "CVE-2021-0197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0197"
}
],
"initial_release_date": "2023-02-17T00:00:00",
"last_revision_date": "2023-02-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM du 16 f\u00e9vrier 2023",
"url": "https://www.ibm.com/support/pages/node/6956287"
}
],
"reference": "CERTFR-2023-AVI-0144",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-02-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eIBM\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6956287 du 16 f\u00e9vrier 2023",
"url": null
}
]
}
CERTFR-2021-AVI-858
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel® NUC Kit: NUC8i7HNK, NUC8i7HVK | ||
| Intel | N/A | Intel® Pentium® Processor N Series | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series | ||
| Intel | N/A | Intel® NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7 | ||
| Intel | N/A | 700-series Ethernet Adapters | ||
| Intel | N/A | Intel SSD DC P4608 Series toutes versions. | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC710. | ||
| Intel | N/A | Intel® NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Pentium® Silver Processor Series | ||
| Intel | N/A | Intel® P4510 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX210 | ||
| Intel | N/A | All Intel® oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions antérieures à 2021.1 Beta 10. | ||
| Intel | N/A | Intel® Pentium® Processor J Series, N Series | ||
| Intel | N/A | Intel SSD DC P4600 Series toutes versions. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3168 | ||
| Intel | N/A | Safestring library maintained by Intel® avant le commit avec l'id efbd4066ea215f03342c1f0e5888102badf14477 | ||
| Intel | N/A | Intel® NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W | ||
| Intel | N/A | Intel® P4618 series versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Ethernet 500 Series Controllers driver pour Linux versions antérieures à 3.17.3. | ||
| Intel | N/A | Intel® NUC Kit: NUC6CAYH, NUC6CAYS | ||
| Intel | N/A | Intel® NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA | ||
| Intel | N/A | Intel® Wi-Fi 6 AX201 | ||
| Intel | N/A | 10th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions antérieures à 1.78.2.0.7. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8265 | ||
| Intel | N/A | Intel® Distribution of OpenVINO™ Toolkit versions antérieures à 2021.4. | ||
| Intel | N/A | Intel SSD D5-P4420 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Kit - NUC11PHKi7C | ||
| Intel | N/A | Intel® RealSense™ D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.22. | ||
| Intel | N/A | Intel® oneAPI Rendering Toolkit versions antérieures à 2021.2. | ||
| Intel | N/A | Intel® Wireless-AC 9462 | ||
| Intel | N/A | Intel® P4511 series (M.2) versions antérieures à VDV10384. | ||
| Intel | N/A | Intel® Serial IO driver pour Intel® NUC 11 Gen versions antérieures à 30.100.2104.1. | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNKTC | ||
| Intel | N/A | Intel® P4510 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC | ||
| Intel | N/A | Intel® Wireless-AC 9560 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit: LAPBC510, LAPBC710 | ||
| Intel | N/A | Intel® NUC 8 Rugged Kit NUC8CCHKR | ||
| Intel | N/A | Intel® Wi-Fi 6E AX210 | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA | ||
| Intel | N/A | Intel® NUC Kit NUC7i3DNHE, NUC7i3DNKE | ||
| Intel | N/A | 7th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® Graphics Driver pour Windows® 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions antérieures à 21.10. | ||
| Intel | N/A | Intel® NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA | ||
| Intel | N/A | Intel® Xeon® Processor W Family | ||
| Intel | N/A | Intel® Atom® Processor A Series | ||
| Intel | N/A | Intel® EMA versions antérieures à 1.5.0. | ||
| Intel | N/A | Intel® Ethernet Diagnostic Driver pour Windows versions antérieures à 1.4.0.10. | ||
| Intel | N/A | Intel® Wireless 7265 (Rev D) Family | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW | ||
| Intel | N/A | Intel® NUC Board NUC8CCHB | ||
| Intel | N/A | Intel® Graphics non DCH Drivers pour Windows 10 versions antérieures à 100.9416. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver installer pour Windows versions antérieures à 1.4.0.21. | ||
| Intel | N/A | Intel® P4511 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Killer™ Wi-Fi 6 AX1650 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions antérieures à 1.78.4.0.4. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX200 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC510. | ||
| Intel | N/A | Intel® NUC Board NUC7i3DNBE | ||
| Intel | N/A | Intel® NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB | ||
| Intel | N/A | Killer™ Wireless-AC 1550 | ||
| Intel | N/A | Intel® NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7 | ||
| Intel | N/A | Intel® NUC 8 Home, a Mini PC avec Windows® 10: NUC8i3CYSM, NUC8i3CYSN | ||
| Intel | N/A | 3rd Generation Intel® Xeon® Scalable Processors | ||
| Intel | N/A | Intel SSD D7-P5608 Series versions antérieures à 2CV1R106. | ||
| Intel | N/A | Intel® Celeron® Processor J Series, N Series | ||
| Intel | N/A | Intel® NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB | ||
| Intel | N/A | Intel® Atom® Processor E3900 Series | ||
| Intel | N/A | Intel® SSD DC D4512 versions antérieures à ET10. | ||
| Intel | N/A | Intel® Core™ X-series Processors | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Wireless-AC 9260 | ||
| Intel | N/A | Intel® Graphics DCH Drivers pour Windows 10 versions antérieures à 27.20.100.9316. | ||
| Intel | N/A | Intel® NUC 8 Pro Board NUC8i3PNB | ||
| Intel | N/A | Intel® SSD D3-S4510 Series (SFF, M.2) versions antérieures à XCV10140. | ||
| Intel | N/A | Killer™ Wi-Fi 6E AX1675 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions antérieures à 1.78.1.1. | ||
| Intel | N/A | Intel® P4610 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Wireless-AC 9461 | ||
| Intel | N/A | Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 août 2021. | ||
| Intel | N/A | Intel® NUC 7 Essential, a Mini PC avec Windows® 10 - NUC7CJYSAL | ||
| Intel | N/A | Intel® VTune™ Profiler versions antérieures à 2021.3.0. | ||
| Intel | N/A | Intel® NUC Kit: NUC7CJYH, NUC7PJYH | ||
| Intel | N/A | 11th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel SSD DC P4500 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK | ||
| Intel | N/A | Intel SSD D5-P4326 Series toutes versions. | ||
| Intel | N/A | Intel SSD DC P4501 Series toutes versions. | ||
| Intel | N/A | Intel® Thunderbolt™ 3 and 4 Windows DCH Drivers versions antérieures à 1.41.1054.0 | ||
| Intel | N/A | Intel® Celeron® Processor N Series | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNHNC | ||
| Intel | N/A | Intel® Core™ i7-8706G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel SSD D5-P4320 Series toutes versions. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver pour Windows versions antérieures à 1.4.0.15. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8260 | ||
| Intel | N/A | Intel® Battery Life Diagnostic Tool versions antérieures à 1.2. | ||
| Intel | N/A | Intel® NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA | ||
| Intel | N/A | Intel® NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX | ||
| Intel | N/A | Intel SSD D7-P5500 Series versions antérieures à 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029. | ||
| Intel | N/A | Intel® Xeon® Processor E3 v6 Family | ||
| Intel | N/A | Intel® oneAPI Base Toolkit versions antérieures à 2021.4.0. | ||
| Intel | N/A | Intel® Thunderbolt™ non-DCH Driver toutes versions pour Windows. | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE | ||
| Intel | N/A | Intel® Xeon® Processor E Family | ||
| Intel | N/A | Intel SSD D7-P5600 Series versions antérieures à 1.2.0, 2CV1L029 and 2CV1C030. | ||
| Intel | N/A | Intel® Atom® Processor C3000 | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3165 | ||
| Intel | N/A | 810-series Ethernet Adapters | ||
| Intel | N/A | Intel® Iris® Xe MAX Dedicated Graphics Drivers pour Windows 10 versions antérieures à 27.20.100.9466. | ||
| Intel | N/A | Intel® Core™ i5-8305G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series - Refresh | ||
| Intel | N/A | Intel® NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel\u00ae NUC Kit: NUC8i7HNK, NUC8i7HVK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "700-series Ethernet Adapters",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4608 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC710.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Silver Processor Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4510 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "All Intel\u00ae oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions ant\u00e9rieures \u00e0 2021.1 Beta 10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor J Series, N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4600 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 3168",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Safestring library maintained by Intel\u00ae avant le commit avec l\u0027id efbd4066ea215f03342c1f0e5888102badf14477",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4618 series versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Ethernet 500 Series Controllers driver pour Linux versions ant\u00e9rieures \u00e0 3.17.3.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC6CAYH, NUC6CAYS",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX201",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "10th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 8265",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Distribution of OpenVINO\u2122 Toolkit versions ant\u00e9rieures \u00e0 2021.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4420 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Enthusiast Kit - NUC11PHKi7C",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae RealSense\u2122 D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.22.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae oneAPI Rendering Toolkit versions ant\u00e9rieures \u00e0 2021.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9462",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4511 series (M.2) versions ant\u00e9rieures \u00e0 VDV10384.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Serial IO driver pour Intel\u00ae NUC 11 Gen versions ant\u00e9rieures \u00e0 30.100.2104.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNKTC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4510 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9560",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit: LAPBC510, LAPBC710",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Rugged Kit NUC8CCHKR",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6E AX210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit NUC7i3DNHE, NUC7i3DNKE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "7th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics Driver pour Windows\u00ae 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor W Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor A Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae EMA versions ant\u00e9rieures \u00e0 1.5.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Ethernet Diagnostic Driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless 7265 (Rev D) Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Board NUC8CCHB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics non DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 100.9416.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver installer pour Windows versions ant\u00e9rieures \u00e0 1.4.0.21.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4511 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wi-Fi 6 AX1650",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions ant\u00e9rieures \u00e0 1.78.4.0.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wi-Fi 6 AX200",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC510.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Board NUC7i3DNBE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wireless-AC 1550",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Home, a Mini PC avec Windows\u00ae 10: NUC8i3CYSM, NUC8i3CYSN",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "3rd Generation Intel\u00ae Xeon\u00ae Scalable Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5608 Series versions ant\u00e9rieures \u00e0 2CV1R106.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Celeron\u00ae Processor J Series, N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor E3900 Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae SSD DC D4512 versions ant\u00e9rieures \u00e0 ET10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 X-series Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9260",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Graphics DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9316.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Pro Board NUC8i3PNB",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae SSD D3-S4510 Series (SFF, M.2) versions ant\u00e9rieures \u00e0 XCV10140.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Killer\u2122 Wi-Fi 6E AX1675",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.1.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae P4610 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Wireless-AC 9461",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 ao\u00fbt 2021.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Essential, a Mini PC avec Windows\u00ae 10 - NUC7CJYSAL",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2021.3.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC Kit: NUC7CJYH, NUC7PJYH",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "11th Generation Intel\u00ae Core\u2122 Processors",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4500 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4326 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DC P4501 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Thunderbolt\u2122 3 and 4 Windows DCH Drivers versions ant\u00e9rieures \u00e0 1.41.1054.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Celeron\u00ae Processor N Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNHNC",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 i7-8706G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D5-P4320 Series toutes versions.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.15.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 8260",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 1.2.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5500 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor E3 v6 Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2021.4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Thunderbolt\u2122 non-DCH Driver toutes versions pour Windows.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Xeon\u00ae Processor E Family",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD D7-P5600 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1L029 and 2CV1C030.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Atom\u00ae Processor C3000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Dual Band Wireless-AC 3165",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "810-series Ethernet Adapters",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Iris\u00ae Xe MAX Dedicated Graphics Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9466.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Core\u2122 i5-8305G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b - Refresh",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel\u00ae NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0063"
},
{
"name": "CVE-2020-12981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12981"
},
{
"name": "CVE-2020-12987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12987"
},
{
"name": "CVE-2021-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0157"
},
{
"name": "CVE-2020-12899",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12899"
},
{
"name": "CVE-2021-33062",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33062"
},
{
"name": "CVE-2021-0199",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0199"
},
{
"name": "CVE-2021-33089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33089"
},
{
"name": "CVE-2020-12986",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12986"
},
{
"name": "CVE-2021-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0135"
},
{
"name": "CVE-2021-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0065"
},
{
"name": "CVE-2021-0078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0078"
},
{
"name": "CVE-2020-8741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8741"
},
{
"name": "CVE-2021-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0053"
},
{
"name": "CVE-2021-33106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33106"
},
{
"name": "CVE-2021-0198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0198"
},
{
"name": "CVE-2021-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0096"
},
{
"name": "CVE-2021-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0158"
},
{
"name": "CVE-2021-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33092"
},
{
"name": "CVE-2020-12983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12983"
},
{
"name": "CVE-2021-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0082"
},
{
"name": "CVE-2021-0079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0079"
},
{
"name": "CVE-2021-33094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33094"
},
{
"name": "CVE-2021-33090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33090"
},
{
"name": "CVE-2020-12893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12893"
},
{
"name": "CVE-2020-12982",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12982"
},
{
"name": "CVE-2021-0071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0071"
},
{
"name": "CVE-2020-12980",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12980"
},
{
"name": "CVE-2021-33095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33095"
},
{
"name": "CVE-2020-12963",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12963"
},
{
"name": "CVE-2021-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0151"
},
{
"name": "CVE-2020-12902",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12902"
},
{
"name": "CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"name": "CVE-2021-33118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33118"
},
{
"name": "CVE-2021-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0148"
},
{
"name": "CVE-2021-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0121"
},
{
"name": "CVE-2021-33071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33071"
},
{
"name": "CVE-2021-33105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33105"
},
{
"name": "CVE-2021-33058",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33058"
},
{
"name": "CVE-2021-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0200"
},
{
"name": "CVE-2021-33097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33097"
},
{
"name": "CVE-2020-12898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12898"
},
{
"name": "CVE-2021-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0152"
},
{
"name": "CVE-2021-0069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0069"
},
{
"name": "CVE-2021-0197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0197"
},
{
"name": "CVE-2020-12901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12901"
},
{
"name": "CVE-2021-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0013"
},
{
"name": "CVE-2020-12985",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12985"
},
{
"name": "CVE-2020-12892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12892"
},
{
"name": "CVE-2021-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0075"
},
{
"name": "CVE-2021-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0120"
},
{
"name": "CVE-2021-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0146"
},
{
"name": "CVE-2020-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12900"
},
{
"name": "CVE-2021-33087",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33087"
},
{
"name": "CVE-2021-33086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33086"
},
{
"name": "CVE-2020-12904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12904"
},
{
"name": "CVE-2021-33091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33091"
},
{
"name": "CVE-2021-33059",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33059"
},
{
"name": "CVE-2021-33088",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33088"
},
{
"name": "CVE-2021-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0064"
},
{
"name": "CVE-2020-12897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12897"
},
{
"name": "CVE-2020-12894",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12894"
},
{
"name": "CVE-2020-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12905"
},
{
"name": "CVE-2021-33063",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33063"
},
{
"name": "CVE-2020-12903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12903"
},
{
"name": "CVE-2021-33073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33073"
},
{
"name": "CVE-2021-33093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33093"
},
{
"name": "CVE-2021-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0110"
},
{
"name": "CVE-2020-12964",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12964"
},
{
"name": "CVE-2020-12895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12895"
}
],
"initial_release_date": "2021-11-10T00:00:00",
"last_revision_date": "2021-11-10T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-858",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00393 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00393.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00560 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00481 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00551 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00551.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00535 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00535.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00565 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00565.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00524 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00567 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00528 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00547 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00562 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00584 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00584.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00556 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00569 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00569.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00557 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00540 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00540.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00533 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00555 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00509 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00564 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00564.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00538 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00538.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00554 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00568 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00568.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00566 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00482 du 09 novembre 2021",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html"
}
]
}
fkie_cve-2021-0200
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://security.netapp.com/advisory/ntap-20211210-0004/ | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20211210-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | ethernet_controller_v710-at2_firmware | * | |
| intel | ethernet_controller_v710-at2 | - | |
| intel | ethernet_controller_x710-tm4_firmware | * | |
| intel | ethernet_controller_x710-tm4 | - | |
| intel | ethernet_controller_x710-at2_firmware | * | |
| intel | ethernet_controller_x710-at2 | - | |
| intel | ethernet_controller_xxv710-am2_firmware | * | |
| intel | ethernet_controller_xxv710-am2 | - | |
| intel | ethernet_controller_xxv710-am1_firmware | * | |
| intel | ethernet_controller_xxv710-am1 | - | |
| intel | ethernet_controller_x710-am2_firmware | * | |
| intel | ethernet_controller_x710-am2 | - | |
| intel | ethernet_controller_xl710-am1_firmware | * | |
| intel | ethernet_controller_xl710-am1 | - | |
| intel | ethernet_controller_xl710-am2_firmware | * | |
| intel | ethernet_controller_xl710-am2 | - | |
| intel | ethernet_controller_x710-bm2_firmware | * | |
| intel | ethernet_controller_x710-bm2 | - | |
| intel | ethernet_controller_xl710-bm2_firmware | * | |
| intel | ethernet_controller_xl710-bm2 | - | |
| intel | ethernet_controller_xl710-bm1_firmware | * | |
| intel | ethernet_controller_xl710-bm1 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_v710-at2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41C4E9CD-45DA-40AB-BC5E-697BC1DEE8F0",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_v710-at2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8967AD-C1FE-412F-A35F-B8A9CECAABA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD9A9BC-7CDF-408C-BEB0-F0B35DFAB0B2",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41EEFF5E-3C88-43B3-9894-1B0C73DBA06A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC75ACA0-6783-42EF-9061-98FE17DDB0F5",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8225E56D-74F1-43FC-8696-2F326A264704",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "822ADAF2-DD61-4091-845D-F0406CFEB112",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C6D2A9E-EE3D-4DEC-948E-58416CD32477",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DF5F67-07E0-40F7-A509-A2F9E0491C3D",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1817F4-978B-4F88-831F-C6259CE20E83",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_x710-am2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54FF6D40-29A8-4DAC-AE9A-B2EBF0951CCE",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_x710-am2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "164BF2CE-DD85-44E4-AD60-4AB4EB2974CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_xl710-am1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69DE900C-96C5-48C9-9138-909395A3B3F4",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-am1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC09AD3-EC92-48F1-AB25-3C2591357375",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_xl710-am2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57A0BD63-971D-40A2-B09E-D685291BFCFA",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-am2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDE2108-1DD8-4A02-8CCD-55616C9479BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2195D5C6-23E4-41AB-B8FB-66B32D3BEB38",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91940C69-80BB-43F8-81B5-92AAFCF59CE1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_xl710-bm2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C086BC34-3600-4F48-B822-3204EE8E7BF2",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-bm2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEF7636C-6532-4135-B636-BFEB110FB0FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ethernet_controller_xl710-bm1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6787C58C-0B2B-4B88-B1C1-25C734F3D1D8",
"versionEndExcluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ethernet_controller_xl710-bm1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11FC1CA5-0BEB-45EE-8A82-0B9809FD2774",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access."
},
{
"lang": "es",
"value": "Una escritura fuera de l\u00edmites en el firmware para los controladores Intel(R) Ethernet de la serie 700 versiones anteriores a 8.2, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local."
}
],
"id": "CVE-2021-0200",
"lastModified": "2024-11-21T05:42:11.317",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-11-17T20:15:09.740",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
wid-sec-w-2022-2328
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Intel Ethernet Controller bezeichnet Netzwerkkarten (NIC) des Herstellers Intel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Ethernet Controllern ausnutzen, um seine Privilegien zu erh\u00f6hen und einen Denial of Service Zustand herzustellen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2328 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2328.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2328 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2328"
},
{
"category": "external",
"summary": "Intel Security Advisory vom 2021-11-09",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
},
{
"category": "external",
"summary": "Intel Security Advisory vom 2021-11-09",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"category": "external",
"summary": "Intel Security Advisory vom 2021-11-09",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-66618 vom 2021-11-10",
"url": "https://support.lenovo.com/us/en/product_security/LEN-66618"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-66617 vom 2021-11-10",
"url": "https://support.lenovo.com/us/en/product_security/LEN-66617"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0056-1 vom 2022-01-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0079-1 vom 2022-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0068-1 vom 2022-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0090-1 vom 2022-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0080-1 vom 2022-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0181-1 vom 2022-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0197-1 vom 2022-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0367-1 vom 2022-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0362-1 vom 2022-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0366-1 vom 2022-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0371-1 vom 2022-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0477-1 vom 2022-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBHF03751 vom 2022-12-15",
"url": "https://support.hp.com/de-de/document/ish_5024305-5036871-16/HPSBHF03751"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6956287 vom 2023-02-16",
"url": "https://www.ibm.com/support/pages/node/6956287"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-078 vom 2023-07-24",
"url": "https://www.dell.com/support/kbdoc/de-de/000209536/dsa-2023-078-dell-emc-networking-bios-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12110 vom 2024-02-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12110.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0002 vom 2024-03-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-March/001092.html"
}
],
"source_lang": "en-US",
"title": "Intel Ethernet Controller: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-03-04T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:40:00.417+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2328",
"initial_release_date": "2021-11-09T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-11-10T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von LENOVO aufgenommen"
},
{
"date": "2022-01-11T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-01-17T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-01-25T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-02-10T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-02-13T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-02-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-03-22T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-02-16T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-07-23T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-02-04T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-03-04T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von ORACLE aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T016637",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "HP Computer",
"product": {
"name": "HP Computer",
"product_id": "T023191",
"product_identification_helper": {
"cpe": "cpe:/h:hp:computer:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Diagnostic Driver \u003c 1.4.0.10",
"product": {
"name": "Intel Ethernet Controller Diagnostic Driver \u003c 1.4.0.10",
"product_id": "T020957"
}
},
{
"category": "product_version_range",
"name": "700 Series \u003c 8.2",
"product": {
"name": "Intel Ethernet Controller 700 Series \u003c 8.2",
"product_id": "T020958"
}
},
{
"category": "product_version_range",
"name": "E810 \u003c 1.5.5.6",
"product": {
"name": "Intel Ethernet Controller E810 \u003c 1.5.5.6",
"product_id": "T020959"
}
},
{
"category": "product_version_range",
"name": "E810 \u003c 1.6.0.6",
"product": {
"name": "Intel Ethernet Controller E810 \u003c 1.6.0.6",
"product_id": "T020960"
}
},
{
"category": "product_version_range",
"name": "Network Adapter \u003c 1.4.0.21",
"product": {
"name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.21",
"product_id": "T020961"
}
},
{
"category": "product_version_range",
"name": "Network Adapter \u003c 1.4.0.15",
"product": {
"name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.15",
"product_id": "T020962"
}
},
{
"category": "product_version_range",
"name": "500 Series \u003c 3.17.3",
"product": {
"name": "Intel Ethernet Controller 500 Series \u003c 3.17.3",
"product_id": "T020963"
}
}
],
"category": "product_name",
"name": "Ethernet Controller"
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Network Adapter \u003c 1.4.0.21",
"product": {
"name": "Lenovo Computer Network Adapter \u003c 1.4.0.21",
"product_id": "T006520"
}
}
],
"category": "product_name",
"name": "Lenovo Computer"
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0135",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Intel Ethernet Controller. Der Fehler besteht aufgrund einer unzureichenden Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T023191",
"T002207",
"T000126",
"T016637",
"T021415",
"T020957",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0135"
},
{
"cve": "CVE-2021-0197",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0197"
},
{
"cve": "CVE-2021-0198",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0198"
},
{
"cve": "CVE-2021-0199",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0199"
},
{
"cve": "CVE-2021-0200",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0200"
},
{
"cve": "CVE-2021-33058",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T020962",
"T023191",
"T020961",
"T002207",
"T000126",
"T016637",
"T021415",
"T020963",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-33058"
},
{
"cve": "CVE-2021-33059",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T020962",
"T023191",
"T020961",
"T002207",
"T000126",
"T016637",
"T021415",
"T020963",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-33059"
},
{
"cve": "CVE-2021-33098",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T020962",
"T023191",
"T020961",
"T002207",
"T000126",
"T016637",
"T021415",
"T020963",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-33098"
}
]
}
WID-SEC-W-2022-2328
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Intel Ethernet Controller bezeichnet Netzwerkkarten (NIC) des Herstellers Intel.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Ethernet Controllern ausnutzen, um seine Privilegien zu erh\u00f6hen und einen Denial of Service Zustand herzustellen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2328 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2328.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2328 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2328"
},
{
"category": "external",
"summary": "Intel Security Advisory vom 2021-11-09",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
},
{
"category": "external",
"summary": "Intel Security Advisory vom 2021-11-09",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
},
{
"category": "external",
"summary": "Intel Security Advisory vom 2021-11-09",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-66618 vom 2021-11-10",
"url": "https://support.lenovo.com/us/en/product_security/LEN-66618"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-66617 vom 2021-11-10",
"url": "https://support.lenovo.com/us/en/product_security/LEN-66617"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0056-1 vom 2022-01-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0079-1 vom 2022-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0068-1 vom 2022-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0090-1 vom 2022-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0080-1 vom 2022-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0181-1 vom 2022-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0197-1 vom 2022-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0367-1 vom 2022-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0362-1 vom 2022-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0366-1 vom 2022-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0371-1 vom 2022-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:0477-1 vom 2022-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBHF03751 vom 2022-12-15",
"url": "https://support.hp.com/de-de/document/ish_5024305-5036871-16/HPSBHF03751"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6956287 vom 2023-02-16",
"url": "https://www.ibm.com/support/pages/node/6956287"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-078 vom 2023-07-24",
"url": "https://www.dell.com/support/kbdoc/de-de/000209536/dsa-2023-078-dell-emc-networking-bios-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12110 vom 2024-02-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12110.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0002 vom 2024-03-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-March/001092.html"
}
],
"source_lang": "en-US",
"title": "Intel Ethernet Controller: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-03-04T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:40:00.417+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2328",
"initial_release_date": "2021-11-09T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-11-10T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von LENOVO aufgenommen"
},
{
"date": "2022-01-11T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-01-17T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-01-25T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-02-10T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-02-13T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-02-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-03-22T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-02-16T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-07-23T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-02-04T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-03-04T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von ORACLE aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T016637",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "HP Computer",
"product": {
"name": "HP Computer",
"product_id": "T023191",
"product_identification_helper": {
"cpe": "cpe:/h:hp:computer:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Diagnostic Driver \u003c 1.4.0.10",
"product": {
"name": "Intel Ethernet Controller Diagnostic Driver \u003c 1.4.0.10",
"product_id": "T020957"
}
},
{
"category": "product_version_range",
"name": "700 Series \u003c 8.2",
"product": {
"name": "Intel Ethernet Controller 700 Series \u003c 8.2",
"product_id": "T020958"
}
},
{
"category": "product_version_range",
"name": "E810 \u003c 1.5.5.6",
"product": {
"name": "Intel Ethernet Controller E810 \u003c 1.5.5.6",
"product_id": "T020959"
}
},
{
"category": "product_version_range",
"name": "E810 \u003c 1.6.0.6",
"product": {
"name": "Intel Ethernet Controller E810 \u003c 1.6.0.6",
"product_id": "T020960"
}
},
{
"category": "product_version_range",
"name": "Network Adapter \u003c 1.4.0.21",
"product": {
"name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.21",
"product_id": "T020961"
}
},
{
"category": "product_version_range",
"name": "Network Adapter \u003c 1.4.0.15",
"product": {
"name": "Intel Ethernet Controller Network Adapter \u003c 1.4.0.15",
"product_id": "T020962"
}
},
{
"category": "product_version_range",
"name": "500 Series \u003c 3.17.3",
"product": {
"name": "Intel Ethernet Controller 500 Series \u003c 3.17.3",
"product_id": "T020963"
}
}
],
"category": "product_name",
"name": "Ethernet Controller"
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Network Adapter \u003c 1.4.0.21",
"product": {
"name": "Lenovo Computer Network Adapter \u003c 1.4.0.21",
"product_id": "T006520"
}
}
],
"category": "product_name",
"name": "Lenovo Computer"
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0135",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Intel Ethernet Controller. Der Fehler besteht aufgrund einer unzureichenden Eingabevalidierung. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T023191",
"T002207",
"T000126",
"T016637",
"T021415",
"T020957",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0135"
},
{
"cve": "CVE-2021-0197",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0197"
},
{
"cve": "CVE-2021-0198",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0198"
},
{
"cve": "CVE-2021-0199",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0199"
},
{
"cve": "CVE-2021-0200",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controllern existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Zugriffskontrolle, einer unsachgem\u00e4\u00dfen Eingabevalidierung, eines Out-of-bounds writes und eines Fehlers im Schutzmechanismus. Ein lokaler Angreifer mit bestimmten Privilegien kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T006520",
"T023191",
"T020960",
"T002207",
"T000126",
"T016637",
"T021415",
"T020959",
"T020958",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-0200"
},
{
"cve": "CVE-2021-33058",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T020962",
"T023191",
"T020961",
"T002207",
"T000126",
"T016637",
"T021415",
"T020963",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-33058"
},
{
"cve": "CVE-2021-33059",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T020962",
"T023191",
"T020961",
"T002207",
"T000126",
"T016637",
"T021415",
"T020963",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-33059"
},
{
"cve": "CVE-2021-33098",
"notes": [
{
"category": "description",
"text": "In Intel Ethernet Controller existieren mehrere Schwachstellen. Die Fehler sind auf eine unzureichende Zugriffskontrolle und mehrere unzul\u00e4ssige Eingabevalidierungen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T020962",
"T023191",
"T020961",
"T002207",
"T000126",
"T016637",
"T021415",
"T020963",
"T004914"
]
},
"release_date": "2021-11-09T23:00:00.000+00:00",
"title": "CVE-2021-33098"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.