CERTFR-2025-AVI-0119
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Intel N/A Intel Arc Pro Graphics pour pilote Windows versions antérieures à 31.0.101.5978
Intel N/A Intel Battery Life Diagnostic Tool versions antérieures à 2.4.1
Intel N/A Intel oneAPI Base Toolkit versions antérieures à 2024.2
Intel N/A Intel DSA versions antérieures à 23.4.39
Intel N/A Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.1
Intel N/A Intel MPI Library pour Windows versions antérieures à 2021.13
Intel N/A Intel Ethernet Adapter Complete Driver Pack versions antérieures à 29.3
Intel N/A EPCT versions antérieures à 1.42.8.0
Intel N/A Intel XTU versions antérieures à 7.14.2.14
Intel N/A Intel GPA versions antérieures à 2024.3
Intel N/A Intel 7th-10th Gen Processor Graphics pour pilote Windows versions antérieures à 31.0.101.2130
Intel N/A Intel MLC versions antérieures à v3.11b
Intel N/A Intel Chipset Software Installation Utility version antérieures à 10.1.19867.8574
Intel N/A Intel GPA Framework versions antérieures à 2024.3
Intel N/A Intel Arc Iris Xe graphics pour Windows versions antérieures à 31.0.101.5186_101.5234
Intel N/A Intel Ethernet Connection I219 Series
Intel N/A Intel 7th-10th Gen Processor graphics pour Windows versions antérieures à 31.0.101.2130
Intel N/A Intel DSA versions antérieures à 24.2.19.5
Intel N/A Intel Data Center GPU Flex Series pour pilote Windows versions antérieures à 31.0.101.5768
Intel N/A Intel Arc Iris Xe Graphics pour pilote Windows versions antérieures à 31.0.101.5768
Intel N/A Intel Thread Director Visualizer versions antérieures à 1.0.1
Intel N/A BIOS and System Firmware Update Package for Intel Server M50FCP family versions antérieures à R01.02.0002
Intel N/A Intel Advisor versions antérieures à 2024.2
Intel N/A Intel oneAPI HPC Toolkit versions antérieures à 2024.2
Intel N/A Intel QuickAssist Technology versions antérieures à 2.2.0
Intel N/A Intel Quartus Prime Standard Edition Design Software versions antérieures à 23.1.1 Patch 1.01std
Intel N/A Intel VPL software pour Windows version 2023.4.0
Intel N/A FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler versions antérieures à 2024.2
Intel N/A Intel 800 Series Ethernet Linux Kernel Mode Driver versions antérieures à 1.15.4
Intel N/A Intel High Level Synthesis Compiler versions antérieures à 24.2
Intel N/A Intel RealSense D400 Series Universal Windows Platform (UWP) Driver pour Windows 10 toutes versions
Intel N/A Intel Quartus Prime Lite Edition Design Software versions antérieures à 23.1.1 Patch 1.01std
Intel N/A Intel Arc Pro graphics pour Windows versions antérieures à 31.0.101.5319
Intel N/A Intel Data Center GPU Flex Series pour Windows versions antérieures à 31.0.101.5333
References
Bulletin de sécurité Intel INTEL-SA-01139 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01215 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01120 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01124 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01237 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01230 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01231 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01144 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01224 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01044 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01213 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01218 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01235 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01214 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01203 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01166 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01236 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01228 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01198 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00990 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01194 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01238 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01240 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01207 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01232 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00590 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01156 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01227 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01184 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01152 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-00606 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01233 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01030 2025-02-10 vendor-advisory
Bulletin de sécurité Intel INTEL-SA-01208 2025-02-10 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Arc Pro Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5978",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 2.4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 23.4.39",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MPI Library pour Windows versions ant\u00e9rieures \u00e0 2021.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Adapter Complete Driver Pack versions ant\u00e9rieures \u00e0 29.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "EPCT versions ant\u00e9rieures \u00e0 1.42.8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel XTU versions ant\u00e9rieures \u00e0 7.14.2.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel GPA versions ant\u00e9rieures \u00e0 2024.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 7th-10th Gen Processor Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.2130",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel MLC versions ant\u00e9rieures \u00e0 v3.11b",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Chipset Software Installation Utility version ant\u00e9rieures \u00e0 10.1.19867.8574",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel GPA Framework versions ant\u00e9rieures \u00e0 2024.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Iris Xe graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5186_101.5234",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Ethernet Connection I219 Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 7th-10th Gen Processor graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.2130",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel DSA versions ant\u00e9rieures \u00e0 24.2.19.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center GPU Flex Series pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5768",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Iris Xe Graphics pour pilote Windows versions ant\u00e9rieures \u00e0 31.0.101.5768",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Thread Director Visualizer versions ant\u00e9rieures \u00e0 1.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "BIOS and System Firmware Update Package for Intel Server M50FCP family versions ant\u00e9rieures \u00e0 R01.02.0002",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Advisor versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel QuickAssist Technology versions ant\u00e9rieures \u00e0 2.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Standard Edition Design Software versions ant\u00e9rieures \u00e0 23.1.1 Patch 1.01std",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel VPL software pour Windows version 2023.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "FPGA Support Package for the Intel oneAPI DPC++/C++ Compiler versions ant\u00e9rieures \u00e0 2024.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel 800 Series Ethernet Linux Kernel Mode Driver versions ant\u00e9rieures \u00e0 1.15.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel High Level Synthesis Compiler versions ant\u00e9rieures \u00e0 24.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RealSense D400 Series Universal Windows Platform (UWP) Driver pour Windows 10 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Quartus Prime Lite Edition Design Software versions ant\u00e9rieures \u00e0 23.1.1 Patch 1.01std",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Arc Pro graphics pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5319",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center GPU Flex Series pour Windows versions ant\u00e9rieures \u00e0 31.0.101.5333",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-38310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38310"
    },
    {
      "name": "CVE-2024-25571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25571"
    },
    {
      "name": "CVE-2023-34440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34440"
    },
    {
      "name": "CVE-2024-37020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37020"
    },
    {
      "name": "CVE-2024-29214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29214"
    },
    {
      "name": "CVE-2024-36285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36285"
    },
    {
      "name": "CVE-2024-42410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42410"
    },
    {
      "name": "CVE-2024-24582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24582"
    },
    {
      "name": "CVE-2024-31068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31068"
    },
    {
      "name": "CVE-2024-36280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36280"
    },
    {
      "name": "CVE-2024-40887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40887"
    },
    {
      "name": "CVE-2024-39284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39284"
    },
    {
      "name": "CVE-2024-24852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24852"
    },
    {
      "name": "CVE-2023-48366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48366"
    },
    {
      "name": "CVE-2024-39279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39279"
    },
    {
      "name": "CVE-2024-31858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31858"
    },
    {
      "name": "CVE-2024-39813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39813"
    },
    {
      "name": "CVE-2023-29164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29164"
    },
    {
      "name": "CVE-2023-25192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25192"
    },
    {
      "name": "CVE-2024-32941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32941"
    },
    {
      "name": "CVE-2023-31276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31276"
    },
    {
      "name": "CVE-2023-49615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49615"
    },
    {
      "name": "CVE-2024-39805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39805"
    },
    {
      "name": "CVE-2024-41917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41917"
    },
    {
      "name": "CVE-2024-39779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39779"
    },
    {
      "name": "CVE-2024-42405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42405"
    },
    {
      "name": "CVE-2024-30211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30211"
    },
    {
      "name": "CVE-2024-39797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39797"
    },
    {
      "name": "CVE-2024-36283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36283"
    },
    {
      "name": "CVE-2024-38307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38307"
    },
    {
      "name": "CVE-2024-21859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21859"
    },
    {
      "name": "CVE-2024-39356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39356"
    },
    {
      "name": "CVE-2023-43758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43758"
    },
    {
      "name": "CVE-2024-41168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41168"
    },
    {
      "name": "CVE-2024-37355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37355"
    },
    {
      "name": "CVE-2024-36291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36291"
    },
    {
      "name": "CVE-2023-49618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49618"
    },
    {
      "name": "CVE-2024-39606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39606"
    },
    {
      "name": "CVE-2024-41166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41166"
    },
    {
      "name": "CVE-2025-20097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20097"
    },
    {
      "name": "CVE-2023-49603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49603"
    },
    {
      "name": "CVE-2024-32938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32938"
    },
    {
      "name": "CVE-2024-28047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28047"
    },
    {
      "name": "CVE-2024-39355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39355"
    },
    {
      "name": "CVE-2024-39365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39365"
    },
    {
      "name": "CVE-2024-39271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39271"
    },
    {
      "name": "CVE-2024-36262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36262"
    },
    {
      "name": "CVE-2024-36293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36293"
    },
    {
      "name": "CVE-2024-36274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36274"
    },
    {
      "name": "CVE-2024-39286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
    },
    {
      "name": "CVE-2021-37577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37577"
    },
    {
      "name": "CVE-2023-25191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25191"
    },
    {
      "name": "CVE-2024-42492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42492"
    },
    {
      "name": "CVE-2024-32942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32942"
    },
    {
      "name": "CVE-2024-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21830"
    },
    {
      "name": "CVE-2024-47006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47006"
    },
    {
      "name": "CVE-2024-26021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26021"
    },
    {
      "name": "CVE-2023-32277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32277"
    },
    {
      "name": "CVE-2023-48267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48267"
    },
    {
      "name": "CVE-2024-42419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42419"
    },
    {
      "name": "CVE-2024-28127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28127"
    },
    {
      "name": "CVE-2024-31157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31157"
    },
    {
      "name": "CVE-2024-31153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31153"
    },
    {
      "name": "CVE-2024-41934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41934"
    },
    {
      "name": "CVE-2024-31155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31155"
    },
    {
      "name": "CVE-2024-39372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39372"
    },
    {
      "name": "CVE-2024-29223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29223"
    }
  ],
  "initial_release_date": "2025-02-12T00:00:00",
  "last_revision_date": "2025-02-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0119",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01139",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01215",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01215.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01120",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01120.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01124",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01237",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01237.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01230",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01230.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01231",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01144",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01224",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01044",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01044.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01213",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01218",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01218.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01235",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01214",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01214.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01203",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01166",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01236",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01236.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01228",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01198",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01198.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00990",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01194",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01238",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01238.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01240",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01240.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01207",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01207.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01232",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01232.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00590",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00590.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01156",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01156.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01227",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01227.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01184",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01184.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01152",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01152.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00606",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00606.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01233",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01233.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01030",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01030.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-01208",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01208.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…