CERTFR-2024-AVI-0124
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une élévation de privilèges et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel SUR software versions antérieures à 2.4.10587
Intel N/A Intel Optane PMem 100 Series management software versions antérieures à 01.00.00.3547
Intel N/A Intel MPI Library versions antérieures à 2021.10.0
Intel N/A Intel Unison software versions antérieures à C15
Intel N/A Intel Trace Analyzer and Collector 2021.10.0
Intel N/A Intel SDK pour OpenCL Applications software toutes versions
Intel N/A Intel Killer Wi-Fi software version antérieures à 3.1423.712
Intel N/A Intel XTU software versions antérieures à 7.12.0.29
Intel N/A Pilotes Intel QAT software pour Windows versions antérieures à QAT1.7-W-1.11.0
Intel N/A Tous les processeurs Intel Core de 6e, 7e, 8e ou 9e génération avec le pilote Intel Thunderbolt DCH toutes versions
Intel N/A Intel SPS versions antérieures à SPS_E5_06.01.04.002.0
Intel N/A Installation software pour Intel Ethernet Connections Boot Utility, Preboot Images et pilotes EFI s versions antérieures à 28.2
Intel N/A Intel oneAPI AI Analytics Toolkit 2023.2
Intel N/A ACAT software maintenu par Intel versions antérieures à 2.0.0
Intel N/A Intel PROSet/Wireless Wi-Fi software versions antérieures à 22.240
Intel N/A Intel Optane PMem 200 Series management software versions antérieures à 02.00.00.3915
Intel N/A Intel oneAPI Threading Building Blocks versions antérieures à 2021.10.0.
Intel N/A Intel Inspector pour oneAPI versions antérieures à 2023.2.0
Intel N/A Intel MAS software versions antérieures à 2.3
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2023.2.0
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2023.2.0
Intel N/A Intel Optane PMem 300 Series management software versions antérieures à 03.00.00.0483
Intel N/A Intel ISPC versions antérieures à 1.21.0
Intel N/A Intel oneAPI Toolkit et du programme d'installation des composants versions antérieures à 4.3.2
Intel N/A Installation software pour Administrative Tools pour Intel Network Adapters versions antérieures à 28.2
Intel N/A Intel DSA software versions antérieures à 23.4.33
Intel N/A Micrologiciel du contrôleur Intel JHL8440 Thunderbolt 4 versions antérieures à 41
Intel N/A Intel Binary Configuration Tool software versions antérieures à 3.4.4
Intel N/A Intel SGX DCAP software pour Windows versions antérieures à 1.19.100.3
Intel N/A Intel SSU software versions antérieures à 3.0.0.2
Intel N/A Intel Unite Client software versions antérieures à 4.2.35041
Intel N/A Intel Distribution pour Python 2023.1
Intel N/A Intel VROC software versions antérieures à 8.0.8.1001
Intel N/A Intel CIP software versions antérieures à 2.4.10577
Intel N/A Intel Advisor pour oneAPI versions antérieures à 2023.2.0
Intel N/A Intel QSFP+ Configuration Utility software toutes versions
Intel N/A Intel oneAPI IoT Toolkit versions antérieures à 2023.2.0.
Intel N/A Intel PCM software versions antérieures à 202307
Intel N/A Intel MPI Library software versions antérieures à 2021.11
Intel N/A Intel Cluster Checker 2021.7.3
Intel N/A Intel Integrated Performance Primitives 2021.9.0
Intel N/A Intel oneAPI Deep Neural Network Library versions antérieures à 2023.2.0
Intel N/A Intel Battery Life Diagnostic Tool software versions antérieures à 2.3.1
Intel N/A Intel Chipset Driver Software versions antérieures à 10.1.19444.8378
Intel N/A Intel VTune Profiler pour oneAPI versions antérieures à 2023.2.0
Intel N/A Intel IPP Cryptography versions antérieures à 2021.8.0
Intel N/A Pilote Intel Thunderbolt DCH pour Windows versions antérieures à 88
Intel N/A Intel Optimization pour TensorFlow versions antérieures à 2.13.0
Intel N/A Arm DS software pour Intel SoC FPGA versions antérieures à 2022.2
Intel N/A Installation software pour Intel Ethernet Adapter Complete Driver Pack versions antérieures à 28.2
Intel N/A Sapphire Rapids Eagle Stream avec les processeurs Intel Xeon Scalable de 4e génération versions antérieures à PLR4 Release
Intel N/A Intel oneAPI Math Kernel Library versions antérieures à 2023.2.0.
Intel N/A Intel System Usage Report pour Gameplay Software version 2.0.1901
Intel N/A Intel PM software toutes versions
Intel N/A Intel OFU software versions antérieures à 14.1.31
References
Bulletin de sécurité Intel INTEL-SA-01004 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00947 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00992 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00956 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00969 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00993 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00981 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01003 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00987 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01006 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00959 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01014 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00967 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00954 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00913 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01005 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00998 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00994 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00927 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00851 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00948 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00988 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01011 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00958 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00903 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01000 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00973 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00974 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00928 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00953 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00955 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00930 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00895 du 13 février 2024 None vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00922 du 13 février 2024 None vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel SUR software versions ant\u00e9rieures \u00e0 2.4.10587",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optane PMem 100 Series management software versions ant\u00e9rieures \u00e0 01.00.00.3547",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library versions ant\u00e9rieures \u00e0 2021.10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Unison software versions ant\u00e9rieures \u00e0 C15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Trace Analyzer and Collector 2021.10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SDK pour OpenCL Applications software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Killer Wi-Fi software version ant\u00e9rieures \u00e0 3.1423.712",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel XTU software versions ant\u00e9rieures \u00e0 7.12.0.29",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilotes Intel QAT software pour Windows versions ant\u00e9rieures \u00e0 QAT1.7-W-1.11.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Tous les processeurs Intel Core de 6e, 7e, 8e ou 9e g\u00e9n\u00e9ration avec le pilote Intel Thunderbolt DCH toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SPS versions ant\u00e9rieures \u00e0 SPS_E5_06.01.04.002.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Installation software pour Intel Ethernet Connections Boot Utility, Preboot Images et pilotes EFI s versions ant\u00e9rieures \u00e0 28.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI AI Analytics Toolkit 2023.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "ACAT software maintenu par Intel versions ant\u00e9rieures \u00e0 2.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PROSet/Wireless Wi-Fi software versions ant\u00e9rieures \u00e0 22.240",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optane PMem 200 Series management software versions ant\u00e9rieures \u00e0 02.00.00.3915",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Threading Building Blocks versions ant\u00e9rieures \u00e0 2021.10.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Inspector pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MAS software versions ant\u00e9rieures \u00e0 2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optane PMem 300 Series management software versions ant\u00e9rieures \u00e0 03.00.00.0483",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel ISPC versions ant\u00e9rieures \u00e0 1.21.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Toolkit et du programme d\u0027installation des composants versions ant\u00e9rieures \u00e0 4.3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Installation software pour Administrative Tools pour Intel Network Adapters versions ant\u00e9rieures \u00e0 28.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA software versions ant\u00e9rieures \u00e0 23.4.33",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Micrologiciel du contr\u00f4leur Intel JHL8440 Thunderbolt 4 versions ant\u00e9rieures \u00e0 41",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Binary Configuration Tool software versions ant\u00e9rieures \u00e0 3.4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SGX DCAP software pour Windows versions ant\u00e9rieures \u00e0 1.19.100.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSU software versions ant\u00e9rieures \u00e0 3.0.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Unite Client software versions ant\u00e9rieures \u00e0 4.2.35041",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution pour Python 2023.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VROC software versions ant\u00e9rieures \u00e0 8.0.8.1001",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CIP software versions ant\u00e9rieures \u00e0 2.4.10577",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advisor pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QSFP+ Configuration Utility software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI IoT Toolkit versions ant\u00e9rieures \u00e0 2023.2.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PCM software versions ant\u00e9rieures \u00e0 202307",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library software versions ant\u00e9rieures \u00e0 2021.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Cluster Checker 2021.7.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Integrated Performance Primitives 2021.9.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Deep Neural Network Library versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Battery Life Diagnostic Tool software versions ant\u00e9rieures \u00e0 2.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Chipset Driver Software versions ant\u00e9rieures \u00e0 10.1.19444.8378",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VTune Profiler pour oneAPI versions ant\u00e9rieures \u00e0 2023.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel IPP Cryptography versions ant\u00e9rieures \u00e0 2021.8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Pilote Intel Thunderbolt DCH pour Windows versions ant\u00e9rieures \u00e0 88",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Optimization pour TensorFlow versions ant\u00e9rieures \u00e0 2.13.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Arm DS software pour Intel SoC FPGA versions ant\u00e9rieures \u00e0 2022.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Installation software pour Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 28.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Sapphire Rapids Eagle Stream avec les processeurs Intel Xeon Scalable de 4e g\u00e9n\u00e9ration versions ant\u00e9rieures \u00e0 PLR4 Release",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Math Kernel Library versions ant\u00e9rieures \u00e0 2023.2.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel System Usage Report pour Gameplay Software version 2.0.1901",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PM software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel OFU software versions ant\u00e9rieures \u00e0 14.1.31",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-27307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27307"
    },
    {
      "name": "CVE-2023-25174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25174"
    },
    {
      "name": "CVE-2023-33875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
    },
    {
      "name": "CVE-2023-28374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
    },
    {
      "name": "CVE-2023-34315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34315"
    },
    {
      "name": "CVE-2023-38135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38135"
    },
    {
      "name": "CVE-2023-40161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40161"
    },
    {
      "name": "CVE-2023-32280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32280"
    },
    {
      "name": "CVE-2022-43703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43703"
    },
    {
      "name": "CVE-2023-39432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39432"
    },
    {
      "name": "CVE-2023-22293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22293"
    },
    {
      "name": "CVE-2023-35121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35121"
    },
    {
      "name": "CVE-2023-35062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35062"
    },
    {
      "name": "CVE-2023-33870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33870"
    },
    {
      "name": "CVE-2023-31189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31189"
    },
    {
      "name": "CVE-2023-28396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28396"
    },
    {
      "name": "CVE-2023-25073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25073"
    },
    {
      "name": "CVE-2023-26596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26596"
    },
    {
      "name": "CVE-2023-26592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26592"
    },
    {
      "name": "CVE-2023-28715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28715"
    },
    {
      "name": "CVE-2023-34983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
    },
    {
      "name": "CVE-2023-38561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38561"
    },
    {
      "name": "CVE-2023-38566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38566"
    },
    {
      "name": "CVE-2023-32647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32647"
    },
    {
      "name": "CVE-2023-35769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35769"
    },
    {
      "name": "CVE-2023-28739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28739"
    },
    {
      "name": "CVE-2023-39425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39425"
    },
    {
      "name": "CVE-2023-28407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28407"
    },
    {
      "name": "CVE-2023-35060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35060"
    },
    {
      "name": "CVE-2023-29153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29153"
    },
    {
      "name": "CVE-2023-22390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22390"
    },
    {
      "name": "CVE-2023-24542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24542"
    },
    {
      "name": "CVE-2022-43701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43701"
    },
    {
      "name": "CVE-2023-41252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41252"
    },
    {
      "name": "CVE-2023-27517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27517"
    },
    {
      "name": "CVE-2023-26591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26591"
    },
    {
      "name": "CVE-2023-28745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28745"
    },
    {
      "name": "CVE-2023-2804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
    },
    {
      "name": "CVE-2023-27300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27300"
    },
    {
      "name": "CVE-2023-24463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24463"
    },
    {
      "name": "CVE-2023-35003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35003"
    },
    {
      "name": "CVE-2023-35061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
    },
    {
      "name": "CVE-2023-32644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
    },
    {
      "name": "CVE-2023-25779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25779"
    },
    {
      "name": "CVE-2023-39941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39941"
    },
    {
      "name": "CVE-2023-26585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26585"
    },
    {
      "name": "CVE-2023-27308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27308"
    },
    {
      "name": "CVE-2023-29162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29162"
    },
    {
      "name": "CVE-2023-24591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24591"
    },
    {
      "name": "CVE-2023-34351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34351"
    },
    {
      "name": "CVE-2023-22342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22342"
    },
    {
      "name": "CVE-2023-26586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
    },
    {
      "name": "CVE-2023-36490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36490"
    },
    {
      "name": "CVE-2023-25769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25769"
    },
    {
      "name": "CVE-2023-41231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41231"
    },
    {
      "name": "CVE-2022-43702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43702"
    },
    {
      "name": "CVE-2023-41091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41091"
    },
    {
      "name": "CVE-2023-36493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36493"
    },
    {
      "name": "CVE-2023-27301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27301"
    },
    {
      "name": "CVE-2023-32651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
    },
    {
      "name": "CVE-2023-41090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41090"
    },
    {
      "name": "CVE-2023-32642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
    },
    {
      "name": "CVE-2023-25951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
    },
    {
      "name": "CVE-2023-30767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30767"
    },
    {
      "name": "CVE-2023-31271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31271"
    },
    {
      "name": "CVE-2023-22311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22311"
    },
    {
      "name": "CVE-2023-32646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32646"
    },
    {
      "name": "CVE-2023-42776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42776"
    },
    {
      "name": "CVE-2023-39932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39932"
    },
    {
      "name": "CVE-2023-25777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25777"
    },
    {
      "name": "CVE-2023-22848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22848"
    },
    {
      "name": "CVE-2023-25945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25945"
    },
    {
      "name": "CVE-2023-24589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24589"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2023-40154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40154"
    },
    {
      "name": "CVE-2023-32618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32618"
    },
    {
      "name": "CVE-2023-27303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27303"
    },
    {
      "name": "CVE-2023-40156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40156"
    },
    {
      "name": "CVE-2023-24481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24481"
    },
    {
      "name": "CVE-2023-28720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
    }
  ],
  "initial_release_date": "2024-02-14T00:00:00",
  "last_revision_date": "2024-02-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0124",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Intel\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01004 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01004.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00947 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00992 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00992.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00956 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00969 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00993 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00993.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00981 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00981.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01003 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01003.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00987 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00987.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01006 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00959 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00959.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01014 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01014.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00967 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00954 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00954.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00913 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00913.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01005 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01005.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00998 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00998.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00994 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00994.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00927 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00927.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00851 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00948 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00988 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01011 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00958 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00958.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00903 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00903.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01000 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01000.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00973 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00973.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00974 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00974.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00928 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00928.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00953 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00955 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00930 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00930.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00895 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00895.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00922 du 13 f\u00e9vrier 2024",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…