fkie_cve-2019-14556
Vulnerability from fkie_nvd
Published
2020-10-05 14:15
Modified
2024-11-21 04:26
Severity ?
Summary
Improper initialization in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow a privileged user to potentially enable denial of service via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F44332FD-46C6-4E7A-B400-7B93D179CD49",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA35154-5EFD-4DF9-B099-6D752452A8D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CCEDC1E-D090-4528-93E7-F10A4A157903",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_8100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76659D14-67EB-4570-B18F-8054DC49B22A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_8100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33B23442-3009-40DE-8C9A-B0FB16BD2178",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFFA071-138D-4538-B809-72380B072899",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_8300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B0830A0-9398-4886-8604-EEFAD40D0453",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_8350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "873C5935-533E-4A71-9871-FBDA99BC1B83",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E280CDC9-5AC0-4EA8-B1F8-C6D8A14FD444",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E72867-C6C3-4E90-8E0D-39C8AE5E15D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "764E99C4-6E89-450F-B1B3-97F235911460",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA26068-CF24-4373-8BAA-28A0B652D48D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89B3CFF2-81F6-4462-B9CA-D740378FA35E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB904621-1216-4C11-A86E-336ACB80F0DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D644F64A-FEA4-464A-BFBC-7B27DFAA5763",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3_9350kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B80D2A9-B009-4084-BB66-B65FEB55D4E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8519F788-4422-4D12-AD34-7F2FC84A8F4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_8400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01C22B03-00B3-4089-8D57-798C1193597B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95295D93-EB33-47AD-B132-576623086FAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_8500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5606CCF0-454C-48F2-9073-85EEAE24A35E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_8600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A953CAF6-93FF-4E7E-BD35-0032A2C68C87",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_8600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0379716-C812-479A-A2E3-335AA69932A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_8600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B60F2B9-0A4C-44AC-85B9-54302DCEDF34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA8492FE-8B9D-43BA-80D1-608720B83B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82039F74-BE0C-43B5-BE08-5D09147E3DE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6569E8E-5D81-4DE2-9BD2-D17466F9C993",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "892F53CC-4113-45D1-8693-F98DE00641D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9500f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AC5E270-73AB-440C-BA1B-1D9CCDEE9F7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30420C2D-F3BE-4D5C-B7CE-04B68F54C437",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA935504-E306-407F-83D3-5100CB4932DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B303953A-487F-45A8-B584-EDE0ED77EA69",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D61995-CB46-403F-9A8D-B3F1D6A75E02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5_9600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C85318F0-C2F5-443E-BF09-4641CD6CE3C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_1060g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD04BA0-473B-48E7-B56C-76DDD4024811",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_1060ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FC29A35-EF34-4034-A119-CA44E458A195",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C837421F-9FB6-4A8E-9267-7064CE199BF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_1068ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AAD2BFC-DDD7-4B14-9D5E-144F701BD3EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_8086k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98D04BB8-B9C1-46F8-8A1D-1958B9BBC403",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD561718-500D-404A-849F-5194EFD83DEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_8700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32FF6953-96D7-4CDB-A2C1-D0FC8B21195C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_8700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0136220-738E-44D1-B2E6-B2E98D9DA36E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_9700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E971296-E033-4B15-9D46-BC44D0060412",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_9700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA34B5AA-F1D9-4F05-9B45-496B7DD3F671",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02EEC32-F9AD-4454-A4C9-79F57DE68618",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_9700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58383912-CAD9-415A-B81D-3CB6B19FE777",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7_9700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5B4FF9-F099-4640-AAEE-89A0C8FB2103",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9_9900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E67CC06F-CD6F-4A52-AE31-B857F31BAEBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9_9900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B29FBC6-ABAA-4651-989D-1D8DE3ACD591",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9_9900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC9A9B0-89BB-45AA-9567-2A10282806E4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9_9900ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B98F76F-B3C3-459F-80F0-F7D3EED64F7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9_9900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "477DCC2F-611F-4C63-BCA2-B58476CF8188",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper initialization in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 \u0026 5000 Series Processors may allow a privileged user to potentially enable denial of service via local access."
},
{
"lang": "es",
"value": "Una inicializaci\u00f3n inapropiada en el firmware de la BIOS para Procesadores de las series 4000 y 5000 del Procesador Intel\u00ae Core\u2122 , Intel\u00ae Celeron\u00ae de la 8va, 9na y 10ma Generaci\u00f3n, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
}
],
"id": "CVE-2019-14556",
"lastModified": "2024-11-21T04:26:57.453",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-10-05T14:15:12.123",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-665"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…