fkie_cve-2021-0110
Vulnerability from fkie_nvd
Published
2021-11-17 20:15
Modified
2024-11-21 05:41
Severity ?
Summary
Improper access control in some Intel(R) Thunderbolt(TM) Windows DCH Drivers before version 1.41.1054.0 may allow unauthenticated user to potentially enable denial of service via local access.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| intel | thunderbolt_dch_driver | * | |
| intel | core_i3-10100y | - | |
| intel | core_i3-10110u | - | |
| intel | core_i3-10110y | - | |
| intel | core_i3-1110g4 | - | |
| intel | core_i3-1115g4 | - | |
| intel | core_i3-1120g4 | - | |
| intel | core_i3-1125g4 | - | |
| intel | core_i5-10210u | - | |
| intel | core_i5-10210y | - | |
| intel | core_i5-10310u | - | |
| intel | core_i5-10310y | - | |
| intel | core_i5-10610u | - | |
| intel | core_i5-1130g7 | - | |
| intel | core_i5-1135g7 | - | |
| intel | core_i7-10510u | - | |
| intel | core_i7-10510y | - | |
| intel | core_i7-10710u | - | |
| intel | core_i7-10810u | - | |
| intel | core_i7-1160g7 | - | |
| intel | core_i7-1165g7 | - | |
| intel | core_i7-1185g7 | - | |
| intel | jhl6240 | - | |
| intel | jhl6340 | - | |
| intel | jhl6540 | - | |
| intel | jhl7340 | - | |
| intel | jhl7440 | - | |
| intel | jhl7540 | - | |
| intel | jhl8440 | - | |
| intel | jhl8540 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "1772E01C-2CDB-4AB5-9123-CDD1BEA9B2EE",
"versionEndExcluding": "1.41.1054.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "208BA1E9-0EB2-4DA9-A7F3-0BB3D2DFE32C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E0F959-4048-421A-A4C5-E37F74409884",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl6340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A80D88F-D41D-4F67-A723-45B43CD6BBC1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl6540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE89352-D051-44C9-8A1A-0CE755438D9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl7340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "151F7864-0189-402B-8246-E6BD069F0BEB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl7440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32C08C67-CC96-4951-B39D-C7531C95AFD7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl7540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F1D4F2-5C5B-4E29-8F69-28B0EBC98601",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl8440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F288B0-A600-4991-BE85-3CAA18C70166",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:jhl8540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82D7E626-65E1-46D4-A996-275BBD06C9F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) Thunderbolt(TM) Windows DCH Drivers before version 1.41.1054.0 may allow unauthenticated user to potentially enable denial of service via local access."
},
{
"lang": "es",
"value": "Un control de acceso inapropiado en algunos controladores Intel\u00ae Thunderbolt\u2122 Windows DCH versiones anteriores a 1.41.1054.0, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
}
],
"id": "CVE-2021-0110",
"lastModified": "2024-11-21T05:41:51.933",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-11-17T20:15:09.033",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…